Search
Now showing items 1-10 of 39
Compression and protection of multidimensional data
(Universita degli studi di Salerno, 2015-05-05)
The main objective of this thesis is to explore and discuss novel techniques
related to the compression and protection of multidimensional data (i.e., 3-D
medical images, hyperspectral images, 3-D microscopy images and ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(Universita degli studi di Salerno, 2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which en-
sures that only authorized users are given access to certain resources
or tasks. ...
The value of privacy: concerns, attitudes, behaviors online, and information protection measures
(Universita degli studi di Salerno, 2015-04-29)
Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly
the way other people perceive us. One have to careful decide what to expose
and what not. There are a lot of personal and ...
Search-based approaches for software development effort estimation
(Universita degli studi di Salerno, 2015-06-19)
Effort estimation is a critical activity for planning and monitoring software project development and for delivering the product on time and within budget. Significant over or under-estimates expose a software project to ...
The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics
(Universita degli studi di Salerno, 2016-05-24)
The era of Big Data is leading the generation of large amounts of data,
which require storage and analysis capabilities that can be only ad-
dressed by distributed computing systems. To facilitate large-scale
distributed ...
From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse
(Universita degli studi di Salerno, 2012-04-03)
The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ...
On the verification of parametric and real-time systems
(Universita degli studi di Salerno, 2011-05-06)
Parametric and Real-Time Systems play a central role in the theory underlying
the Verification and Synthesis problems.
Real-time systems are present everywhere and are used in safety critical
applications, such as flight ...
Predicate encryption systems. No query left unanswered
(Universita degli studi di Salerno, 2011-05-09)
Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables
fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
Discovering hidden structures in high
(Universita degli studi di Salerno, 2011-03-01)
Il grande volume di dati che viene attualmente collezionato nei vari campi di applicazione non può essere gestito usando le tecniche standard di data mining.
L’obiettivo principale del presente lavoro di tesi è quello ...
Fuzzy concept analysis for semantic knowledge extraction
(Universita degli studi di Salerno, 2012-03-22)
Availability of controlled vocabularies, ontologies, and so on is enabling feature to provide some added values in terms of knowledge management. Nevertheless, the design, maintenance and construction of domain ontologies ...