Cerca
Items 1-20 di 81
Logit dynamics for strategic games mixing time and metastability
(2012-04-18)
A complex system is generally defined as a system emerging from the interaction of
several and different components, each one with their properties and their goals, usually
subject to external inuences. Nowadays, complex ...
Applicazioni di interfacce aptiche e realtà aumentata in ambiti di manutenzione industriale, formazione, medicina e beni culturali
(2011-03-14)
La Realtà Virtuale farà ancora molti passi avanti nell’abbattimento dei tempi di calcolo e
nel perfezionamento del fotorealismo (con l’introduzione di hardware dedicati, con
software di modellazione sempre più sofisticati ...
Discovering hidden structures in high dimensional data space
(2011-03-01)
Il grande volume di dati che viene attualmente collezionato nei vari campi di applicazione non può essere gestito usando le tecniche standard di data mining.
L’obiettivo principale del presente lavoro di tesi è quello di ...
From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse
(2012-04-03)
The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ...
On the verification of parametric and real-time systems
(2011-05-06)
Parametric and Real-Time Systems play a central role in the theory underlying
the Verification and Synthesis problems.
Real-time systems are present everywhere and are used in safety critical
applications, such as flight ...
Predicate encryption systems. No query left unanswered
(2011-05-09)
Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables
fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
Supporting learning activities in virtual worlds: methods, tools and evaluation
(2013-02-27)
Continuing advances and reduced costs in computational power, graphics and network bandwidth let 3D immersive multi‐user Virtual Worlds (VWs) become increasingly accessible while offering an improved and engaging quality ...
Fuzzy concept analysis for semantic knowledge extraction
(2012-03-22)
Availability of controlled vocabularies, ontologies, and so on is enabling feature to provide some added values in terms of knowledge management. Nevertheless, the design, maintenance and construction of domain ontologies ...
Sequence analysis in bioinformatics: methodological and practical aspects
(2013-04-02)
My PhD research activities has focused on the development of new
computational methods for biological sequence analyses.
To overcome an intrinsic problem to protein sequence analysis, whose aim was
to infer homologies in ...
Secure computation under network and physical attacks
(2013-04-22)
This thesis proposes several protocols for achieving secure com-
putation under concurrent and physical attacks. Secure computation
allows many parties to compute a joint function of their inputs, while
keeping the privacy ...
Un metodo basato su LDA per la sentiment analysis
(2013-03-16)
La progressiva diffusione dei social network, sia generalisti (quali Twitter, Facebook o Google+, la recente piattaforma messa a punto da Google) sia specializzati (ad esempio le comunità professionali di Linkedin), ha ...
Memetic algorithms for ontology alignment
(2013-04-24)
Semantic interoperability represents the capability of two or more systems to
meaningfully and accurately interpret the exchanged data so as to produce
useful results. It is an essential feature of all distributed and open ...
Designing usable mobile interfaces for spatial data
(2012-03-29)
This
dissertation
deals
mainly
with
the
discipline
of
Human-‐Computer
Interaction
(HCI),
with
particular
attention
on
the
role
that
it
plays
in
the
domain
of
modern
mobile
devices.
Mobile
devices
today
offer
a
crucial
s ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models
for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences
expression and aggregation. In particular ...
On the Generalizations of Identity-Based Encryption
(2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback
exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the
message other ...
Steganographic methods for information hiding in MS-Office files
(2013-04-20)
The simplest container of digital information is “the file" and among the vast array of files currently available, MS-Office files are probably the most widely used. These files, starting from MS-Office 2007, respect the ...
Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness
(2013-04-29)
The research work focuses on Situation Awareness and Context Awareness topics.
Specifically, Situation Awareness involves being aware of what is happening in the vicinity
to understand how information, events, and one’s ...
Virtual worlds for education: methodology, interaction and evaluation
(2014-05-20)
When students arrive in the classroom they expect to be involved in immersive, fun and challenging learning experiences. There is a high risk that they become quickly bored by the traditional instructional methods. The ...
3D data visualization techniques and applications for visual multidimensional data mining
(2014-04-21)
Despite modern technology provide new tools to measure the world around
us, we are quickly generating massive amounts of high-dimensional, spatialtemporal
data. In this work, I deal with two types of datasets: one in ...
Efficient distributed load balancing for parallel algorithms
(2011-04-29)
With the advent of massive parallel processing technology, exploiting the power
offered by hundreds, or even thousands of processors is all but a trivial task.
Computing by using multi-processor, multi-core or many-core ...