Hazard Detection for Robotic Applications as Visual Anomaly Detection
Cryptocurrency vs. consensus
XXVIII Dies academicus
Interaction Substitution for Mobile Games Accessibility and Exergaming
CTL* Verification and Synthesis using Existential Horn Clauses
Business Ideas 2024
Workshop of the International Center for Advanced Computing in Medicine (ICAM)
Exploring the Usage of Pre-trained Models for Code-Related Tasks
Eventi correnti
Path planning for mobile robots in the real world: handling multiple objectives, hierarchical structures and partial information
Time Aware Location Recommendations in Location Based Social Networks
Effective Diameter Estimation for Very Large Graphs
"Who is the secret hand behind Elena Ferrante?"
An Object Is Worth a Thousand Words - Reification as the Key to Augmenting Software Development
SLA-Driven Governance for RESTful Systems
The grand four - affine invariant globalizations of Netwon's method
Reconstructing Cancer Progression Models
Advancements in Bayesian network structure learning
Spring Semester Project Presentations 2018
Attuazione del GDPR in Europa... e in Svizzera?
Reusing Constraint Proofs in Symbolic Analysis
A Tribute to the founding dean of the Faculty of Informatics
A fictitious domain approach for fluid structure interactions
Keyword Search in Relational Databases: an open challenge.
Introducing NEM Blockchain + Safekee.io decentralized cryptoassets protection solution
XXII Dies Academicus
Hack the City 2018. L'hackathon della Svizzera italiana
"Was my contribution fairly reviewed?" A Framework to Study the Perception of Fairness in Modern Code Reviews
The Role of Context in Human Memory Augmentation