Search
Now showing items 51-60 of 81
A Methodology of Total Audience Management Compliant with GDPR
(2022-08-22)
Nel primo capitolo si analizzano i punti di congiunzione del regolamento 679/2016 con l’intelligenza
artificiale. In particolare, il suddetto regolamento adotta un approccio profondamente innovativo nel
disciplinare la ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Relaxed Functional Dependencies: Definition, Discovery and Applications
(2018-03-20)
Le dipendenze funzionali (FD) sono state introdotte agli inizi degli anni '70, quando venivano maggiormente utilizzate per valutare la progettazione dei database e garantire la qualità dei dati. Tuttavia, si è avuta la ...
Synthesis of recursive state machines from libraries of game modules
(2016-05-18)
This thesis is focused on synthesis. In formal veri cation synthesis can be
referred to the controller synthesis and the system synthesis. This work
combines both this area of research.
First we focus on synthesizing modular ...
Forensic Readiness Capability for Cloud Computing
(2015-10-19)
Cloud computing services represent the actual computation delivery to the most
of customer communities. Such services are regulated by a contract called Service
Level Agreement (SLA), cosigned between customers and providers. ...
Enhancing Data Warehouse management through semi-automatic data integration and complex graph generation
(2018-05-25)
Strategic information is one of the main assets for many organizations and, in the next future, it will become increasingly more important to enable the decisionmakers answer questions about their business, such as how to ...
About the development of visual search algorithms and their hardware implementations
(2017-06-23)
The main goal of my work is to exploit the benefits of a hardware implementation
of a 3D visual search pipeline. The term visual search refers
to the task of searching objects in the environment starting from the real
world ...
Teamwork collaboration around simulation data in an industrial context
(2015-04-27)
Nowadays even more small, medium and large enterprises are world-wide and compete on a global market. In order to face the new challenges, industries have multiple
co-located and geographically dispersed teams that work ...
Round and computational efficiency of two-party protocols
(2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it is ...
Computer vision methods applied to person tracking and identification
(2015-04-22)
Computer vision methods for tracking and identification of people in constrained
and unconstrained environments have been widely explored in the last decades. De-
spite of the active research on these topics, they are still ...