
The Reachability of Computer Programs
Would it be possible to explain the emergence of new computational ideas...
read it

Indirect Match Highlights Detection with Deep Convolutional Neural Networks
Highlights in a sport video are usually referred as actions that stimula...
read it

What your Facebook Profile Picture Reveals about your Personality
People spend considerable effort managing the impressions they give othe...
read it

Orthogonal Least Squares Algorithm for the Approximation of a Map and its Derivatives with a RBF Network
Radial Basis Function Networks (RBFNs) are used primarily to solve curve...
read it

Dynamic Consistency of Conditional Simple Temporal Networks via Mean Payoff Games: a SinglyExponential Time DCChecking
Conditional Simple Temporal Network (CSTN) is a constraintbased graphf...
read it

Object Tracking via Dynamic Feature Selection Processes
DFST proposes an optimized visual tracking algorithm based on the realt...
read it

Audio Surveillance: a Systematic Review
Despite surveillance systems are becoming increasingly ubiquitous in our...
read it

From narrative descriptions to MedDRA: automagically encoding adverse drug reactions
The collection of narrative spontaneous reports is an irreplaceable sour...
read it

Automagically encoding Adverse Drug Reactions in MedDRA
Pharmacovigilance is the field of science devoted to the collection, ana...
read it

Bounds on the Entropy of a Function of a Random Variable and their Applications
It is well known that the entropy H(X) of a discrete random variable X i...
read it

Quantum programming made easy
We introduce the functional language IQu ("Haiku") which, under the para...
read it

Homological analysis of multiqubit entanglement
We propose the usage of persistent homologies to characterize multiparti...
read it

Normal edgecolorings of cubic graphs
A normal kedgecoloring of a cubic graph is an edgecoloring with k col...
read it

MXLSTM: mixing tracklets and vislets to jointly forecast trajectories and head poses
Recent approaches on trajectory forecasting use tracklets to predict the...
read it

On Restricted Disjunctive Temporal Problems: Faster Algorithms and Tractability Frontier
In 2005 Kumar studied the Restricted Disjunctive Temporal Problem (RDTP)...
read it

Cachebased Multiquery Optimization for Dataintensive Scalable Computing Frameworks
In modern largescale distributed systems, analytics jobs submitted by v...
read it

Cooperative Queuing Policies for Effective HumanMultiRobot Interaction
We consider multirobot applications, where a team of robots can ask for...
read it

Towards a formal notion of impact metric for cyberphysical attacks (full version)
Industrial facilities and critical infrastructures are transforming into...
read it

Approximation Algorithms for Clustering via Weighted Impurity Measures
An impurity measures I:R^k →R^+ maps a kdimensional vector v to a non...
read it

An Automatabased Abstract Semantics for String Manipulation Languages
In recent years, dynamic languages, such as JavaScript or Python, have f...
read it

Information theoretical clustering is hard to approximate
An impurity measures I: R^d R^+ is a function that assigns a ddimension...
read it

Forecasting People Trajectories and Head Poses by Jointly Reasoning on Tracklets and Vislets
In this work, we explore the correlation between people trajectories and...
read it

MinimumEntropy Couplings and their Applications
Given two discrete random variables X and Y, with probability distributi...
read it

Humancentric light sensing and estimation from RGBD images: The invisible light switch
Lighting design in indoor environments is of primary importance for at l...
read it

On asymptotically efficient maximum likelihood estimation of linear functionals in Laplace measurement error models
Maximum likelihood estimation of linear functionals in the inverse probl...
read it

A Formal Approach to PhysicsBased Attacks in CyberPhysical Systems (Extended Version)
We apply formal methods to lay and streamline theoretical foundations to...
read it

Normal 6edgecolorings of some bridgeless cubic graphs
In an edgecoloring of a cubic graph, an edge is poor or rich, if the se...
read it

Normal 5edgecolorings of a family of Loupekhine snarks
In a proper edgecoloring of a cubic graph an edge uv is called poor or ...
read it

Persistent homology analysis of multiqubit entanglement
We introduce a homologybased technique for the analysis of multiqubit s...
read it

Smarter Features, Simpler Learning?
Earlier work on machine learning for automated reasoning mostly relied o...
read it

High order semiimplicit multistep methods for time dependent partial differential equations
We consider the construction of semiimplicit linear multistep methods w...
read it

A Framework for InVivo Testing of Mobile Applications
The ecosystem in which mobile applications run is highly heterogeneous a...
read it

From omnitigs to macrotigs: a lineartime algorithm for safe walks – common to all closed arccoverings of a directed graph
A partial solution to a problem is called safe if it appears in all solu...
read it

Transformer Networks for Trajectory Forecasting
Most recent successes on forecasting the people motion are based on LSTM...
read it

MultiRI: Fast Subgraph Matching in Labeled Multigraphs
The Subgraph Matching (SM) problem consists of finding all the embedding...
read it

Autonomous task planning and situation awareness in robotic surgery
The use of robots in minimally invasive surgery has improved the quality...
read it

Control with uncertain data of socially structured compartmental epidemic models
The adoption of containment measures to reduce the amplitude of the epid...
read it

Computing all st bridges and articulation points simplified
Given a directed graph G and a pair of nodes s and t, an st bridge of G...
read it

Safety in st Paths, Trails and Walks
Given a directed graph G and a pair of nodes s and t, an st bridge of G...
read it

On the parameterized complexity of the Minimum Path Cover problem in DAGs
A minimum path cover (MPC) of a directed acyclic graph (DAG) G = (V,E) i...
read it

Improving rigid 3D calibration for robotic surgery
Autonomy is the frontier of research in robotic surgery and its aim is t...
read it

MultiTask Temporal Convolutional Networks for Joint Recognition of Surgical Phases and Steps in Gastric Bypass Procedures
Purpose: Automatic segmentation and classification of surgical activity ...
read it

Gradientaugmented Supervised Learning of Optimal Feedback Laws Using Statedependent Riccati Equations
A supervised learning approach for the solution of largescale nonlinear...
read it

Computing the original eBWT faster, simpler, and with less memory
Mantaci et al. [TCS 2007] defined the eBWT to extend the definition of t...
read it

Proof Generation in CDSAT
The main ideas in the CDSAT (ConflictDriven Satisfiability) framework f...
read it

Sparsifying, Shrinking and Splicing for Minimum Path Cover in Parameterized Linear Time
A minimum path cover (MPC) of a directed acyclic graph (DAG) G = (V,E) i...
read it

Polarization and coherence in mean field games driven by private and social utility
We study a mean field game in continuous time over a finite horizon, T, ...
read it

Spatial Data Generators
This gem describes a standard method for generating synthetic spatial da...
read it

Empirical Comparison of Blackbox Test Case Generation Tools for RESTful APIs
In literature, we can find research tools to automatically generate test...
read it

Restats: A Test Coverage Tool for RESTful APIs
Test coverage is a standard measure used to evaluate the completeness of...
read it
University of Verona
Be part of a trusted community of global businesses in the one place built for business opportunities. Say no to websites. Join others like you on Trepup.