• Automatic discovery of drug mode of action and drug repositioning from gene expression data 

      Iorio, Francesco (Universita degli studi di Salerno, 2011-02-18)
      The identification of the molecular pathway that is targeted by a compound, combined with the dissection of the following reactions in the cellular environment, i.e. the drug mode of action, is a key challenge in ...
    • Discovering hidden structures in high 

      Murino, Loredana (Universita degli studi di Salerno, 2011-03-01)
      Il grande volume di dati che viene attualmente collezionato nei vari campi di applicazione non può essere gestito usando le tecniche standard di data mining. L’obiettivo principale del presente lavoro di tesi è quello ...
    • Efficient distributed load balancing for parallel algorithms 

      Cosenza, Biagio (Universita degli studi di Salerno, 2011-04-29)
      With the advent of massive parallel processing technology, exploiting the power offered by hundreds, or even thousands of processors is all but a trivial task. Computing by using multi-processor, multi-core or many-core ...
    • Forensic analysis for digital images 

      Cembalo, Maurizio (Universita degli studi di Salerno, 2011-11-23)
      Nowadays, taking and sharing digital pictures is becoming a very popular activity. This is witnessed by the explosive growth of the digital cameras market: e.g., more than one billion of digital cameras have been ...
    • On the verification of parametric and real-time systems 

      Di Giampaolo, Barbara (Universita degli studi di Salerno, 2011-05-06)
      Parametric and Real-Time Systems play a central role in the theory underlying the Verification and Synthesis problems. Real-time systems are present everywhere and are used in safety critical applications, such as flight ...
    • Predicate encryption systems. No query left unanswered 

      Iovino, Vincenzo (Universita degli studi di Salerno, 2011-05-09)
      Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
    • Secure End-to-End Communications in Mobile Networks 

      Petagna, Fabio (Universita degli studi di Salerno, 2011-05-06)
      Cellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and ...