Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
An algorithm is presented for 3-D reconstruction from optical flow observed by an uncalibrated camera. We show that by incorporating a statistical model of image noise, we can not...
Background: As an alternative to the frequently used "reference design" for two-channel microarrays, other designs have been proposed. These designs have been shown to b...
Ana C. Fierro, Raphael Thuret, Kristof Engelen, Gi...
In this paper we describe the development and testing of a tool for self-assessment of affect while interacting with computer systems, meant to be used in many cultures. We discus...
The evaluation of e-learning applications deserves special attention and evaluators need effective methodologies and appropriate guidelines to perform their task. We have proposed...
Carmelo Ardito, Maria Francesca Costabile, Antonel...