Search
Now showing items 1-10 of 37
Compression and protection of multidimensional data
(Universita degli studi di Salerno, 2015-05-05)
The main objective of this thesis is to explore and discuss novel techniques
related to the compression and protection of multidimensional data (i.e., 3-D
medical images, hyperspectral images, 3-D microscopy images and ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(Universita degli studi di Salerno, 2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which en-
sures that only authorized users are given access to certain resources
or tasks. ...
The value of privacy: concerns, attitudes, behaviors online, and information protection measures
(Universita degli studi di Salerno, 2015-04-29)
Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly
the way other people perceive us. One have to careful decide what to expose
and what not. There are a lot of personal and ...
Coverage in wireless sensor networks: models and algorithms
(Università, 2015-05-05)
Due to technological advances which enabled their deployment in relevant and diverse
scenarios, Wireless Sensor Networks (WSNs) have been object of intense study in the last
few years. Possible application contexts include ...
Models and Algorithms for Some Covering Problems on Graphs
(Universita degli studi di Salerno, 2016-05-12)
Several real-life problems as well as problems of theoretical importance
within the field of Operations Research are combinatorial in nature.
Combinatorial Optimization deals with decision-making problems defined
on a ...
ID-Based Key Agreement for WANETs
(Universita degli studi di Salerno, 2015-04-24)
The increasing interest about wireless ad hoc networks (WANETs) is due to some key features not owned by traditional networks such as nodes mobility, network self-organization and the ability to rely on infrastructure-less ...
Improving Network Anomaly Detection with Independent Component Analysis
(Universita degli studi di Salerno, 2015-05-04)
Complexity, sophistication, and rate of growth of modern networks, coupled with the depth, continuity, and pervasiveness of their role in our everyday lives, stress the importance of identifying potential misuse or threats ...
The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics
(Universita degli studi di Salerno, 2016-05-24)
The era of Big Data is leading the generation of large amounts of data,
which require storage and analysis capabilities that can be only ad-
dressed by distributed computing systems. To facilitate large-scale
distributed ...
From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse
(Universita degli studi di Salerno, 2012-04-03)
The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ...
On the verification of parametric and real-time systems
(Universita degli studi di Salerno, 2011-05-06)
Parametric and Real-Time Systems play a central role in the theory underlying
the Verification and Synthesis problems.
Real-time systems are present everywhere and are used in safety critical
applications, such as flight ...