Search
Now showing items 1-10 of 81
Discovering hidden structures in high dimensional data space
(2011-03-01)
Il grande volume di dati che viene attualmente collezionato nei vari campi di applicazione non può essere gestito usando le tecniche standard di data mining.
L’obiettivo principale del presente lavoro di tesi è quello di ...
Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms
(2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most
significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is
essentially composed by a large number of electronic ...
Enhancing Data Warehouse management through semi-automatic data integration and complex graph generation
(2018-05-25)
Strategic information is one of the main assets for many organizations and, in the next future, it will become increasingly more important to enable the decisionmakers answer questions about their business, such as how to ...
A Methodology of Total Audience Management Compliant with GDPR
(2022-08-22)
Nel primo capitolo si analizzano i punti di congiunzione del regolamento 679/2016 con l’intelligenza
artificiale. In particolare, il suddetto regolamento adotta un approccio profondamente innovativo nel
disciplinare la ...
Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness
(2013-04-29)
The research work focuses on Situation Awareness and Context Awareness topics.
Specifically, Situation Awareness involves being aware of what is happening in the vicinity
to understand how information, events, and one’s ...
On the Generalizations of Identity-Based Encryption
(2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback
exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the
message other ...
Predicate encryption systems. No query left unanswered
(2011-05-09)
Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables
fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
Beyond Pairwise Relationships: Modeling Real-world Dynamics Via High-order Networks
(2022-04-26)
Every single person, animal, or thing we can see in the world around us
is part of a broader collection of components that can spontaneously self-
organize to exhibit non-trivial global structures and behaviors at ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which ensures that only authorized users are given access to certain resources
or tasks. In ...
Virtual worlds for education: methodology, interaction and evaluation
(2014-05-20)
When students arrive in the classroom they expect to be involved in immersive, fun and challenging learning experiences. There is a high risk that they become quickly bored by the traditional instructional methods. The ...