Reconstructing the 3D shape of an object from a set of images is a classical problem in Computer Vision. Photometric stereo is one of the possible ap…

Fingerprint Liveness detection, or presentation attacks detection (PAD), that is, the ability of detecting if a fingerprint submitted to an electroni…

We have proposed a basic model for contracts, building upon a new kind of event structures which allow to cope with circular assume/guarantee constraints. Our event structures feature two enabling relations (the standard enabling ⊢ of [18], and the …

We introduce a basic model for contracts. Our model extends event structures with a new relation, which faithfully captures the circular dependencies…

We describe a fast solver for linear systems with reconstructable Cauchy-like structure, which requires O(rn^2) floating point operations and O(rn) m…

Modeling wind speed is one of the key element when dealing with the production of energy through wind turbines. A good model can be used for forecast…

This paper studies how to forecast daily closing price series of Bitcoin, using data on prices and volumes of prior days. Bitcoin price behaviour is …

We present a novel descriptor for crowd behavior analysis and anomaly detection. The goal is to measure by appropriate patterns the speed of formatio…

The exponential growth of wireless-based solutions, such as those related to the mobile smart devices (e.g., smart-phones and tablets) and Internet o…

In this paper we describe three stochastic models based on a semi-Markov chains approach and its generalizations to study the high frequency price dy…

In this section we will obtain the Hölder regularity of solutions.

By virtue of barrier arguments we prove $C^\alpha$-regularity up to the boundary for the weak solutions of a non-local nonlinear problem driven by th…

In this paper we consider the zero-flux chemotaxis-system \begin{equation*} \begin{cases} u_{t}=\Delta u-\nabla \cdot (u \chi(v)\nabla v) & \textrm{i…

Deep convolutional neural networks (CNNs) obtain outstanding results in tasks that require human-level understanding of data, like image or speech re…

We investigated the threat level of realistic attacks using latent fingerprints against sensors equipped with state-of-art liveness detectors and fin…

In the last five years, deep learning methods, in particular CNN, have attracted considerable attention in the field of face-based recognition, achie…

In this paper we have considered estimation of the Probability of Causation in a number of contexts, including a novel analysis for the case of a mediating variable, in the absence of a direct effect. As we saw in §5 considering such a third variabl…

Given empirical evidence for the dependence of an outcome variable on an exposure variable, we can typically only provide bounds for the "probability…

A Blockchain is a global shared infrastructure where cryptocurrency transactions among addresses are recorded, validated and made publicly available …

We study the geodesics on an invariant surface of a three dimensional Riemannian manifold. The main results are: the characterization of geodesic orb…

We study the price dynamics of 65 stocks from the Dow Jones Composite Average from 1973 until 2014. We show that it is possible to define a Daily Mar…

We propose a class of auxetic three-dimensional lattice structures. The elastic microstructure can be designed in order to have omni-directional Pois…

In this study we investigate a textural processing method of electroencephalography (EEG) signal as an indicator to estimate the driver's vigilance i…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account