• English
    • italiano
  • English 
    • English
    • italiano
  • Login
Search 
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Search
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Informatica ed Ingegneria dell'Informazione
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 20

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Cyber security and ubiquity: an human-centric approach 

Colella, Antonio (Universita degli studi di Salerno, 2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Thumbnail

A neurocomputational model of reward-based motor learning 

Ragonetti, Gianmarco (Universita degli studi di Salerno, 2017-09-22)
The following thesis deals with computational models of nervous system employed in motor reinforcement learning. The novel contribution of this work is that it includes a methodology of experiments for evaluating learning ...
Thumbnail

Real-time face analysis for gender recognition on video sequences 

Greco, Antonio (Universita degli studi di Salerno, 2018-03-05)
This research work has been produced with the aim of performing gender recognition in real-time on face images extracted from real video sequences. The task may appear easy for a human, but it is not so simple for a computer ...
Thumbnail

Round and computational efficiency of two-party protocols 

Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
Thumbnail

Methods and algorithms for power devices losses behavioral modeling 

Migliaro, Mario (Universita degli studi di Salerno, 2017-08-07)
Power electronics is since decades in the focus of very important technology innovations, as the characteristics and the performances of power supplies can severely condition and limit the performances of the system to ...
Thumbnail

Fuzzy models for group decision making and applications to e-learning and recommender systems 

Capuano, Nicola (Universita degli studi di Salerno, 2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ...
Thumbnail

Delayed-Input and Non-Malleable Cryptographic Protocols 

Siniscalchi, Luisa (Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
Thumbnail

Teamwork collaboration around CAE models in an industrial context 

Gargiulo, Claudio (Universita degli studi di Salerno, 2017-09-05)
Medium and Large Companies must compete every day in a global context. To achieve greater efficiency in their products/processes they are forced to globalize by opening multiple locations in geographically distant places. ...
Thumbnail

Statistical models for the characterization, identification and mitigation of distributed attacks in data networks 

Di Mauro, Mario (Universita degli studi di Salerno, 2018-03-09)
The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental ...
Thumbnail

Building functional neuromarkers from resting state fMRI to describe physiopathological traits 

Galdi, Paola (Universita degli studi di Salerno, 2018-03-02)
The overarching goal of this work has been that of devising novel methods for building functional neuromarkers from resting-state fMRI data to describe healthy and pathological human behaviour. Observing spontaneous ...
  • 1
  • 2
EleA themes by Ugsiba
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit DateThis CollectionBy Issue DateAuthorsTitlesSubjectsBy Submit Date

My Account

LoginRegister

Discover

AuthorCapuano, Nicola (1)Cavaliere, Danilo (1)Ciampi, Michele (1)Colella, Antonio (1)D'Aniello, Giuseppe (1)D'Auria, Matteo (1)Di Marino, Emiliano (1)Di Mauro, Mario (1)Driouich, Youssef (1)Ferrentino, Enrico (1)... View MoreSubjectINF/01 INFORMATICA (9)ING-INF/04 AUTOMATICA (4)ING-INF/05 SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI (3)ING-INF/01 ELETTRONICA (2)Proof system (2)Algorithms (1)Auction-based architectures (1)Authentication schemes (1)Automatic verification (1)Collaboration (1)... View MoreDate Issued2018 (7)2017 (4)2019 (4)2020 (3)2021 (2)Has File(s)
Yes (20)
EleA themes by Ugsiba