Human activities represent a major source of information for smart home automation. While performing their daily activities, humans trigger sensors producing measurements that flow into a sensor log. Vast majority of techniques to recognize and exploit the occurrences of human activities are...
04b Atto di convegno in volume
-
-
Industry 4.0 refers to the last revolution involving the manufacturing domain. Particularly, it is characterized by the introduction of innovative technologies and systems able to establish a high level of digitization. The adoption of these technologies is crucial to the development of more...
-
Blockchain is a shared, immutable distributed ledger that facilitates the process of recording transactions and tracking assets in a business network. The paper discusses the BinTraWine project, which aims to develop a blockchain-based platform that can offer simultaneous and shared management of...
-
In this paper, we explore how Knowledge Graphs (KGs) can potentially benefit Record Linkage (RL). RL is the process of identifying and resolving duplicate records across different data sources, including structured, semi-structured, and unstructured data (e.g, in data lakes). RL is a critical task...
-
This paper presents a centralised model predictive control (MPC) approach for the control of the recharging process of a fleet of plug-in electric vehicles (PEVs). The first control goal is to recharge the PEVs so that the user preferences on the final desired state of charge, and on the time...
-
Brain-Computer Interfaces based on Motor Imagery (MI-BCI) have been validated as promising systems to support rehabilitative protocols for the post-stroke motor recovery of the upper limb. To date, the long-term effects of MI-BCI training in post-stroke patients need to be clarified. In order to...
-
----
-
---
-
We present a formalization of multi-agent planning problems in which agents are explicitly represented. In contrast with previous formalisations, we discuss the advantages of representing agents explicitly and show the implementation in the Unified Planning formalism and some practical examples....
-
Type confusion bugs are a common source of security problems whenever software makes use of type hierarchies, as an inadvertent downcast to an incompatible type is hard to detect at compile time and easily leads to memory corruption at runtime. Where existing research mostly studies type confusion...