Search
Now showing items 1-10 of 46
Supporting learning activities in virtual worlds: methods, tools and evaluation
(2013-02-27)
Continuing advances and reduced costs in computational power, graphics and network bandwidth let 3D immersive multi‐user Virtual Worlds (VWs) become increasingly accessible while offering an improved and engaging quality ...
Search-based approaches for software development effort estimation
(2015-06-19)
Effort estimation is a critical activity for planning and monitoring software project development and for delivering the product on time and within budget. Significant over or under-estimates expose a software project to ...
Computer vision methods applied to person tracking and identification
(2015-04-22)
Computer vision methods for tracking and identification of people in constrained
and unconstrained environments have been widely explored in the last decades. De-
spite of the active research on these topics, they are still ...
Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness
(2013-04-29)
The research work focuses on Situation Awareness and Context Awareness topics.
Specifically, Situation Awareness involves being aware of what is happening in the vicinity
to understand how information, events, and one’s ...
Secure computation under network and physical attacks
(2013-04-22)
This thesis proposes several protocols for achieving secure com-
putation under concurrent and physical attacks. Secure computation
allows many parties to compute a joint function of their inputs, while
keeping the privacy ...
Steganographic methods for information hiding in MS-Office files
(2013-04-20)
The simplest container of digital information is “the file" and among the vast array of files currently available, MS-Office files are probably the most widely used. These files, starting from MS-Office 2007, respect the ...
On the Generalizations of Identity-Based Encryption
(2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback
exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the
message other ...
Memetic algorithms for ontology alignment
(2013-04-24)
Semantic interoperability represents the capability of two or more systems to
meaningfully and accurately interpret the exchanged data so as to produce
useful results. It is an essential feature of all distributed and open ...
A framework to access risks and derive requirements for a complex systems
(2014-04-22)
This thesis provides an innovative framework, based on the risk assessment methodology, to support the design of a pioneering complex systems, strongly ICT based, whose failures could threaten people, environment and society ...
Virtual worlds for education: methodology, interaction and evaluation
(2014-05-20)
When students arrive in the classroom they expect to be involved in immersive, fun and challenging learning experiences. There is a high risk that they become quickly bored by the traditional instructional methods. The ...