This paper presents an approach and a toolset for exploiting the benefits of conceptual modeling in the quality evaluation tasks that take place both before the deployment and dur...
Recent advances in computer power, network bandwidth, information storage, and multimedia/signal processing techniques have led to a proliferation of multimedia data. As a result,...
Lasers can be used by hackers to situations to inject faults in circuits and induce security flaws. On-line detection mechanisms are classically proposed to counter such attacks, ...
We describe how a physical robot can learn about objects from its own autonomous experience in the continuous world. The robot identifies statistical regularities that allow it t...
Results diversification is an approach used in literature to cover the possible interpretations of the results produced by query evaluation. For diversifying search results we pr...