Search
Now showing items 1-10 of 14
Fuzzy models for group decision making and applications to e-learning and recommender systems
(2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models
for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences
expression and aggregation. In particular ...
Teamwork collaboration around CAE models in an industrial context
(2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve
greater efficiency in their products/processes they are forced to globalize by opening
multiple locations in geographically distant places. ...
Empowering computational science through extreme scalability
(2021-05-24)
Computational science is an ever-expanding research eld. It combines tech-
nologies, modern computational methods, and simulations to address prob-
lems too complex to be e ectively predicted by theory alone or too ...
Soft biometrics: emerging traits and applications
(2021-04-12)
Biometrics has been a thriving field of Pattern Recognition forlong. Both Academia and Business
have thus focused their at-tention in the practical use of biometrics to advance and pro-mote varying
applications in ...
Enhancing the Sharing and the Management of Personal Data in the Big Data Era
(2022-02-22)
Nowadays, thanks to the digitalization of business processes and public
administrations, many significant Big data collections are available. Users are direct
suppliers of data when publishing contents on social networks. ...
Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms
(2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most
significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is
essentially composed by a large number of electronic ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Round and computational efficiency of two-party protocols
(2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it is ...
Cyber security and ubiquity: an human-centric approach
(2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Model Checking Cyber-Physical Systems
(2019-03-12)
Cyber-Physical Systems (CPSs) are integrations of computation with physical
processes. Applications of CPS arguably have the potential to overshadow the
20-th century IT revolution. Nowadays, CPSs application to many sectors ...