Research in face-to-face communication has identified a variety of largely unconscious patterns of behavior that are used by collaborators to coordinate their conversation, build ...
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
— Many tasks examined for robotic application like rescue missions or humanitarian demining require a robotic vehicle to navigate in unstructured natural terrain. This paper intr...
Case-based reasoning and multicriteria decision making have common grounds: they are both problem solving methodologies; both involve the selection, ranking and aggregation of bes...
We propose a framework to compute the utility of an agreement w.r.t. a preference set in a negotiation process. In particular, we refer to preferences expressed as weighted formula...
Azzurra Ragone, Tommaso Di Noia, Francesco M. Doni...