In this context, handwritten signature is one of the most traditionally used and most socially accepted biometric identification ways. The PhD. Thesis of Juan…
The IST-funded WIN project is using what happened during the Prestige oil spill as one scenario with which to test the integrated risk management solution it…
The CAPANINA project, which uses balloons, airships or unmanned solar-powered planes as high-altitude platforms (HAPs) to relay wireless and optical…
The system, which immerses an individual in what looks like a life-size computer game, has been created as part of a joint project between The University's…
SOA is a fundamentally new approach to software development. Instead of designing individual programs that perform hundreds of functions, the SOA concept is to…
Malaria is responsible for about a million deaths every year in sub-Saharan Africa, and is the single biggest killer in children under five. The…
But what does 'global computing' actually mean? The term refers to abstractions such as overlay computers, which involves access to distributed mobile…
The aim is to build a computer which mimics how nerve cells in the brain interact in a bid to engineer more ‘fault tolerant’ electronics.The computer will be…
“The aim of our simulation campaign is to train the flight control teams to react to any unexpected situation. We started in March with two simulations per…
The use of ITS and other high-tech learning tools is increasing across the nation, but the effects are often below expectations. “Intelligent tutoring systems…
The IST-funded DIADEM Firewall project has developed a novel and comprehensive security solution for secure broadband services, focusing on denial of service…
The codes and the methods used to extract them were published in the June issue of GPS World.The navigational satellite, GIOVE-A (Galileo In-Orbit Validation…
A team of researchers working with Alexander Gaeta, Cornell professor of applied and engineering physics, and Michal Lipson, assistant professor of electrical…
“Certainly, attempts were made before us to make something similar to this device in terms of purpose, but not execution, says Alexy Kosik. However, when…
Computer science professor Yuanyuan Zhou and her students have assembled a suite of software tools that can find and correct bugs by inferring the programmer's…
In this context, security and dependability are absolutely vital if all stakeholders, including companies and consumers, are to adopt new technologies. To…