Cerca
Items 1-20 di 60
Compression and protection of multidimensional data
(Universita degli studi di Salerno, 2015-05-05)
The main objective of this thesis is to explore and discuss novel techniques
related to the compression and protection of multidimensional data (i.e., 3-D
medical images, hyperspectral images, 3-D microscopy images and ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(Universita degli studi di Salerno, 2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which en-
sures that only authorized users are given access to certain resources
or tasks. ...
The value of privacy: concerns, attitudes, behaviors online, and information protection measures
(Universita degli studi di Salerno, 2015-04-29)
Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly
the way other people perceive us. One have to careful decide what to expose
and what not. There are a lot of personal and ...
Cyber security and ubiquity: an human-centric approach
(Universita degli studi di Salerno, 2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Enhancing Ubiquitous Computing Environments Through Composition of Heterogeneous Services
(Universita degli studi di Salerno, 2016-01-18)
In recent years the substantial advancements in Information and Communication
Technologies enabled the development of original software solutions that
can provide support to problems people face in their daily activities. ...
Identification of new genetic alterations and potential biomarkers in papillary thyroid carcinoma
(Universita degli studi di Salerno, 2016-05-24)
Papillary thyroid carcinoma (PTC) is the most frequent thyroid malignant
neoplasia. Oncogene activation occurs in more than 70% of the cases. BRAF
mutations occur in about 40% of PTCs, whereas RET rearrangements ...
Search-based approaches for software development effort estimation
(Universita degli studi di Salerno, 2015-06-19)
Effort estimation is a critical activity for planning and monitoring software project development and for delivering the product on time and within budget. Significant over or under-estimates expose a software project to ...
Compression and indexing of genomic data with confidentiality protection
(Universita degli studi di Salerno, 2015-04-30)
The problem of data compression having specific security properties in order to guarantee
user’s privacy is a living matter. On the other hand, high-throughput systems in genomics
(e.g. the so-called Next Generation ...
Round and computational efficiency of two-party protocols
(Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it ...
Reducing the View Selection Problem through Code Modeling: Static and Dynamic approaches
(Universita degli studi di Salerno, 2017-04-20)
Data warehouse systems aim to support decision making by providing users with the appropriate information at the right time. This task is particularly challenging in business contexts where large
amount of data ...
Enhancing Data Warehouse management through semi-automatic data integration and complex graph generation
(Universita degli studi di Salerno, 2018-05-25)
Strategic information is one of the main assets for many organizations and, in the next future, it will become increasingly more important to enable the decisionmakers answer questions about their business, such as how to ...
About the development of visual search algorithms and their hardware implementations
(Universita degli studi di Salerno, 2017-06-23)
The main goal of my work is to exploit the benefits of a hardware implementation
of a 3D visual search pipeline. The term visual search refers
to the task of searching objects in the environment starting from the real
world ...
Information visualization: from petroglyphs to CoDe Graphs
(Universita degli studi di Salerno, 2018-05-30)
Data visualization concerns the communication of data through visual representations and
techniques. It aims at enhancing perception and support data-driven decision making so
enabling insights otherwise hard to achieve. ...
The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics
(Universita degli studi di Salerno, 2016-05-24)
The era of Big Data is leading the generation of large amounts of data,
which require storage and analysis capabilities that can be only ad-
dressed by distributed computing systems. To facilitate large-scale
distributed ...
Computer Music Algorithms. Bio-inspired and Artificial Intelligence Applications
(Universita degli studi di Salerno, 2017-06-01)
Music is one of the arts that have most benefited from the invention of computers. Originally, the term Computer Music was used in the scientific community to identify the application of information technology in music c ...
From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse
(Universita degli studi di Salerno, 2012-04-03)
The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ...
On the verification of parametric and real-time systems
(Universita degli studi di Salerno, 2011-05-06)
Parametric and Real-Time Systems play a central role in the theory underlying
the Verification and Synthesis problems.
Real-time systems are present everywhere and are used in safety critical
applications, such as flight ...
Applicazioni di interfacce aptiche e realtà aumentata in ambiti di manutenzione industriale, formazione, medicina e beni culturali
(Universita degli studi di Salerno, 2011-03-14)
La Realtà Virtuale farà ancora molti passi avanti nell’abbattimento dei tempi di calcolo e
nel perfezionamento del fotorealismo (con l’introduzione di hardware dedicati, con
software di modellazione sempre più sofisticati ...
Predicate encryption systems. No query left unanswered
(Universita degli studi di Salerno, 2011-05-09)
Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables
fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
Discovering hidden structures in high
(Universita degli studi di Salerno, 2011-03-01)
Il grande volume di dati che viene attualmente collezionato nei vari campi di applicazione non può essere gestito usando le tecniche standard di data mining.
L’obiettivo principale del presente lavoro di tesi è quello ...