Electroencephalography (EEG) provides millisecond-scale resolution of neural activity but struggles to accurately localize multiple concurrent sources, especially in spatially close regions. Classical linear inverse methods, such as MNE, sLORETA, and dSPM, address the ill-posed inverse problem...
04b Atto di convegno in volume
-
-
In the last years’ digitalization process, the creation and management of documents in various domains, particularly in Public Administration (PA), have become increasingly complex and diverse. This complexity arises from the need to handle a wide range of document types, often characterized by...
-
Robots playing soccer often rely on hard-coded behaviors that struggle to generalize when the game environment change. In this paper, we propose a temporal logic based approach that allows robots’ behaviors and goals to adapt to the semantics of the environment. In particular, we present a...
-
In its operating life, an agent that needs to act in real environments is required to deal with rules and constraints that humans ask to satisfy. The set of rules specified by the human might influence the role of the agent without changing its goal or its current task. To this end, classical...
-
Smart contracts on modern blockchains pave the way to the development of novel application design paradigms, such as Distributed Applications (DApps). Interestingly, even some safety-critical systems are starting to adopt such a technology to devise new functionalities. However, being software,...
-
Self-protecting systems heavily depend on the quality of information in input in the adaptation loop. Among the others, device and vulnerability inventories play a fundamental role in such systems, and improving their quality is paramount. This paper proposes a new version-based algorithm to filter...
-
Self-protection is a desired property of many modern ICT systems as it enriches them in detecting and reacting to security threats at run-time. Several solutions leveraging vulnerability scanners and attack graphs have recently been proposed to monitor and analyze cyber risks and trigger security...
-
This paper reviews the application of distributed ledger technologies (DLT) in food traceability systems, noting the benefits and growing adoption of DLT despite limited details on implementation and architecture. The study addresses this gap by analyzing the hardware, software, and DLT platforms...
-
Inventories are precious sources of information for security-related processes. As a consequence, the quality of the data in the inventories plays a crucial role in the overall quality of the fed processes. This paper takes this challenge and provides heuristics to improve the accuracy of...
-
In process mining, declarative process discovery aims to extract declarative process models from event logs. Declare is a declarative process modeling language that provides an extensible set of standard templates for modeling declarative processes imposing temporal constraints on the sequence of...