Skip to main content
In this paper we discuss design principles, educational goals, implementation issues and practical results of the Codinj laboratory organized at the Genova Science Festival to promote computational thinking to a broad audience via a novel... more
    • by  and +1
    •   9  
      Computer ScienceEducational TechnologyComputer Supported Collaborative LearningICT in Education
Except for W.J.Hutchins books, no other book gives such a wide overview of the major concepts of machine translation (MT) and machine-aided translation (MAT). Indeed this volume of 300 pages presents (almost all) the major translation... more
    • by 
    •   5  
      Cognitive ScienceMachine TranslationLinguisticsSpeech Communication
Dr. Patricia Jean Flanagan and Dr. Angelo Fraietta. 2019. Tracing the Intangible: The Curious Gestures of Crafts’ Cultural Heritage. In Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous... more
    • by 
    •   11  
      Interaction DesignSound and Music ComputingIntangible cultural heritageModeling and Simulation
Corruption is a major global financial problem with billions of dollars rendered lost or unaccountable annually. Corruption through contract fraud is often conducted by withholding and/or altering financial information. When such scandals... more
    • by 
    •   13  
      EconomicsSupply Chain ManagementContract LawInternational Law
This article provides an empirical statistical analysis and discussion of the predictive abilities of selected customer lifetime value (CLV) models that could be used in online shopping within e-commerce business settings. The comparison... more
    • by  and +3
    •   7  
      Computational ModellingStatistical AnalysisMarketing ManagementCustomer lifetime value
Except for W.J.Hutchins books, no other book gives such a wide overview of the major concepts of machine translation (MT) and machine-aided translation (MAT). Indeed this volume of 300 pages presents (almost all) the major translation... more
    • by 
    •   5  
      Cognitive ScienceMachine TranslationLinguisticsSpeech Communication
This study investigates COVID-19's impact on the education system. It captures a multidimensional representation of teachers, students, and parents' use of information communication technologies (ICTs) to mitigate this disruption caused... more
    • by 
    •   16  
      Human Computer InteractionEducationDistance EducationMobile Learning
This paper presents a comparison between two implementations of the elliptic curve cryptography (ECC) algorithm based on El-Gamal. Each implementation uses different cryptographic libraries: MIRACL and RELIC. The application of this... more
    • by  and +1
    • Applied Computing
1 In this paper, we present the results of the "City as a platform" case study which has been initiated to the city of Kavala, Greece. This is part of the EU-funded Digital Transformation Strategy programme to drive the transformation of... more
    • by 
    •   2  
      E-GovernmentApplied Computing
    • by 
    •   3  
      Error CorrectionApplied ComputingWord Processing
This piece explores algorithmic governance as a strength and a vulnerability in the experience of building participatory communities known as "Decentralized Autonomous Organizations". The Cypherpunks were terrified of surveillance. They... more
    • by 
    •   7  
      HumanitiesEthnographyOrganisational DevelopmentPeer-to-Peer
    • by 
    •   9  
      Computer ScienceHumanitiesEthnographyOrganisational Development
Text mining is the process of discovering new, hidden information from texts- structured, semi-structured and unstructured. There are so many benefits, valuable insights, discoveries and useful information that can be derived from... more
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceText MiningApplied Computing
Text mining is the process of discovering new, hidden information from texts-structured, semi-structured and unstructured. There are so many benefits, valuable insights, discoveries and useful information that can be derived from... more
    • by 
    •   7  
      RoboticsComputer ScienceData MiningEmbedded Systems
This paper describes our lightweight prototype XML based client-server architecture for creating, managing and presenting virtual cultural exhibitions. ARCOLite provides a low cost solution for museums to assemble multimedia content into... more
    • by 
    •   3  
      Augmented RealityApplied ComputingClient-Server Architecture
Classification of coins is an important but laborious aspect of numismatics - the field that studies coins and currency. It is particularly challenging in the case of ancient coins. Due to the way they were manufactured, as well as wear... more
    • by 
    •   65  
      EngineeringHistoryComputer ScienceSoftware Engineering
A large corpus of data obtained by means of empirical study of neuromuscular adaptation is currently of limited use to athletes and their coaches. One of the reasons lies in the unclear direct practical utility of many individual trials.... more
    • by 
    •   81  
      EngineeringPhysiologyHuman PhysiologyApplied Mathematics
The noticeable rise in electricity bills is one of the most major factors leading to an economic crisis for all parts of the world today. It causes many negative impacts on the economic lifestyle of society. This is due to the depletion... more
    • by 
    •   5  
      Energy EconomicsEnergy efficiencyApplied ComputingIOT
IPv6 is the next Internet Protocol version designed to eventually replace IPv4 as the amount of potentially allocated IPv4 addresses is insufficient. The vulnerabilities of IPv6 protocols and the attacks against them demand more attention... more
    • by 
    • Applied Computing
We first consider network security services and then review threats, vulnerabilities and failure modes. This review is based on standard texts, using well-known concepts, categorizations, and methods, e.g. risk analysis using asset-based... more
    • by 
    •   5  
      Network SecurityRisk AnalysisCyber SecurityApplied Computing
This paper studies energy consumption in peer-to-peer protocols in the context of file distribution among border devices and wireless sensors, which are limited in processing power and battery duration. Gnutella, Chord, CAN, Pastry, and... more
    • by 
    •   2  
      AppliedApplied Computing
This article presents an experience report on using Google Apps for Education in a computer science laboratory at the Federal University of Santa Maria, Brazil. Google Apps platform offers a range of applications in a SaaS (Software as a... more
    • by 
    • Applied Computing
This paper describes our lightweight prototype XML based client-server architecture for creating, managing and presenting virtual cultural exhibitions. ARCOLite provides a low cost solution for museums to assemble multimedia content into... more
    • by 
    •   3  
      Augmented RealityApplied ComputingClient-Server Architecture
Deadly earthquakes are events that are unpredictable, relatively rare and have a huge impact upon the lives of those who suffer their consequences. Furthermore, each earthquake has specific characteristics (location, magnitude,... more
    • by 
    •   6  
      EngineeringComputer ScienceCivil ProtectionComputer Simulation
This paper introduces a preliminary taxonomy to bring the condition of air into the foreground of human perception. To create this taxonomy, we drew on the foundations of atmospheric research and studies in the field of human-computer... more
    • by 
    •   5  
      Human Computer InteractionHuman Centered ComputingApplied ComputingHaptic devices
The authors present details of a stochastic, event-driven simulation model of the population dynamics of a representative herd of white-tailed deer. With the inclusion of simulated hunters into the model, it is shown how a variety of... more
    • by 
    •   15  
      HistoryZoologyNatural ResourcesProject Management
MyFIRE, a support action project under the FIRE initiative funded by the EU, was designed to identify best practices, gaps and future challenges for the FIRE Future Internet Experimental Facilities-EFs. Building on these gaps,... more
    • by  and +3
    • Applied Computing
This paper presents the results regarding a technique that can be used as an underlying mechanism for situation prediction. We analysed a hybrid neural network called Multi-output Adaptive Neural Fuzzy Inference System (MANFIS) and... more
    • by 
    • Applied Computing
This article provides an empirical statistical analysis and discussion of the predictive abilities of selected customer lifetime value (CLV) models that could be used in online shopping within e-commerce business settings. The comparison... more
    • by 
    •   9  
      Computer ScienceInformaticsComputational ModellingStatistical Analysis
... speaker. Table 3. Confusion matrix for recognition (%) using monophone models Digit Spo-ken Correct Recognition (%) Phun Ama Ani Ahum Mari Manga Taruk Taret Nipan Mapan Tara Phun 85.2 9.8 5 Ama 85 9.76 5.24 Ani ...
    • by 
    •   4  
      Computer ScienceSpeech RecognitionApplied ComputingContinuous Speech Recognition
The widespread use of the Internet comes accompanied with severe threats for web applications security. Intrusion Detection Systems (IDS) have been considered to deal with the diversity and complexity of web attacks. In this context, this... more
    • by 
    •   2  
      AppliedApplied Computing
Sensor networks have been used in a wide range of applications. In Digital Cities they play an important role in gathering real-time data in urban scale. However, the heterogeneous and complex technologies applied in such applications... more
    • by 
    • Applied Computing
Opportunistic Networks (ONs) are mobile networks that support intermittent links and long delays. ON nodes exchange data in brief moments called contacts, when another node is within radio range. Contacts are ephemeral and unpredictable,... more
    • by 
    • Applied Computing
The widespread use of the Internet comes accompanied with severe threats for web applications security. Intrusion Detection Systems (IDS) have been considered to deal with the diversity and complexity of web attacks. In this context, this... more
    • by  and +1
    •   2  
      AppliedApplied Computing
A spate of recent accidents and a lawsuit involving Tesla's 'selfdriving' cars highlights the growing need for meaningful accountability when harms are caused by AI systems. Tort (or civil liability) lawsuits are one important way for... more
    • by 
    •   19  
      Artificial IntelligenceMachine LearningCivil LitigationCivil Procedure
Diabetes mellitus has a significant impact on people's lives and drugs financial burden. On the other hand, diabetes also has substantial economic effects on countries and national health systems. Most countries spend between 5% and... more
    • by 
    •   2  
      Computer ScienceApplied Computing
In this paper we report the preliminary results of an evaluation in the wild of a storytelling app, the Lions of Time, presenting an archeological story, based on the swipe story approach. A swipe story is a digital story that, with a... more
    • by 
    •   4  
      StorytellingHuman Centered ComputingArts and HumanitiesApplied Computing
MyFIRE, a support action project under the FIRE initiative funded by the EU, was designed to identify best practices, gaps and future challenges for the FIRE Future Internet Experimental Facilities-EFs. Building on these gaps,... more
    • by 
    •   2  
      EngineeringApplied Computing
Page 1. A Spreadsheet Method for Studying Neural Networks Donna1 C. Walter, Michael M. McMillan Arkansas Children's Hospital University of Arkansas for Medical Sciences Abstract Exploring the characteristics of diverse ...
    • by 
    •   12  
      PediatricsComputational ModelingComputer NetworksNeural Networks
Advances in ubiquitous computing are enabling the emergence of opportunities in many areas; among them we highlight the health-related applications. In this area, there is a trend toward developing many applications that enable care... more
    • by 
    • Applied Computing
Nowadays, Brazil has an expected growth in the tourism sector due to the FIFA World Cup (which had a huge success) and the Olympics in Rio de Janeiro. However, there is a lack of tourism applications for Brazil, such as Electronic Tourism... more
    • by 
    • Applied Computing
Primary health care centers in the Chilean public system implement a family healthcare model with collaboration of several professional disciplines. This collaboration is often through multidisciplinary case analysis meetings, but it has... more
    • by  and +1
    •   9  
      Interaction DesignHuman Centered ComputingUser Centered DesignHealth Care Information Systems
Many healthcare systems around the world are noted as fragmented, complex and low-quality, leaving patients and caregivers with no choice but to engage in "infrastructuring work" to make it function for them. However, the work patients do... more
    • by 
    •   2  
      Human Centered ComputingApplied Computing
Informal caregivers take care of someone (usually a close family member) who suffers from a chronic illness. In this stressful situation, caregivers have a high risk of depression or loneliness, because their social network is weakened.... more
    • by 
    •   3  
      Medical SciencesLife SciencesApplied Computing
The widespread use of the Internet comes accompanied with severe threats for web applications security. Intrusion Detection Systems (IDS) have been considered to deal with the diversity and complexity of web attacks. In this context, this... more
    • by  and +2
    •   2  
      AppliedApplied Computing