• 3D data visualization techniques and applications for visual multidimensional data mining 

      Torre, Fabrizio (Universita degli studi di Salerno, 2014-04-21)
      Despite modern technology provide new tools to measure the world around us, we are quickly generating massive amounts of high-dimensional, spatialtemporal data. In this work, I deal with two types of datasets: one in ...
    • Compression and protection of multidimensional data 

      Pizzolante, Raffaele (Universita degli studi di Salerno, 2015-05-05)
      The main objective of this thesis is to explore and discuss novel techniques related to the compression and protection of multidimensional data (i.e., 3-D medical images, hyperspectral images, 3-D microscopy images and ...
    • Designing usable mobile interfaces for spatial data 

      Romano, Marco (Universita degli studi di Salerno, 2012-03-29)
      This dissertation deals mainly with the discipline of Human-­‐Computer Interaction (HCI), with particular attention on the role that it plays in the domain of modern mobile devices. Mobile dev ...
    • From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse 

      De Chiara, Davide (Universita degli studi di Salerno, 2012-04-03)
      The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ...
    • Fuzzy concept analysis for semantic knowledge extraction 

      De Maio, Carmen (Universita degli studi di Salerno, 2012-03-22)
      Availability of controlled vocabularies, ontologies, and so on is enabling feature to provide some added values in terms of knowledge management. Nevertheless, the design, maintenance and construction of domain ontologies ...
    • ID-Based Key Agreement for WANETs 

      Rossi, Francesco (Universita degli studi di Salerno, 2015-04-24)
      The increasing interest about wireless ad hoc networks (WANETs) is due to some key features not owned by traditional networks such as nodes mobility, network self-organization and the ability to rely on infrastructure-less ...
    • Improving Network Anomaly Detection with Independent Component Analysis 

      Fiore, Ugo (Universita degli studi di Salerno, 2015-05-04)
      Complexity, sophistication, and rate of growth of modern networks, coupled with the depth, continuity, and pervasiveness of their role in our everyday lives, stress the importance of identifying potential misuse or threats ...
    • Knowledge management and Discovery for advanced Enterprise Knowledge Engineering 

      Novi, Daniele (Universita degli studi di Salerno, 2014-05-02)
      The research work addresses mainly issues related to the adoption of models, methodologies and knowledge management tools that implement a pervasive use of the latest technologies in the area of Semantic Web for the ...
    • Logit dynamics for strategic games mixing time and metastability 

      Ferraioli, Diodato (Universita degli studi di Salerno, 2012-04-18)
      A complex system is generally de_ned as a system emerging from the interaction of several and di_erent components, each one with their properties and their goals, usually subject to external inuences. Nowadays, complex ...
    • Network anaomaly detection based on the observation of multi-scale traffic dynamics 

      Palmieri, Francesco (Universita degli studi di Salerno, 2012-03-03)
      Con la sempre più rapida crescita in termini di dimensioni e complessità delle moderne infrastrutture di rete, l’attività di individuazione e prevenzione di abusi e violazioni nell’uso di tali infrastrutture sta diventando ...
    • New methods, techniques and applications for sketch recognition 

      De Rosa, Mattia (Universita degli studi di Salerno, 2014-04-24)
      The use of diagrams is common in various disciplines. Typical examples include maps, line graphs, bar charts, engineering blueprints, architects’ sketches, hand drawn schematics, etc.. In general, diagrams can be ...
    • On the evolution of digital evidence: novel approaches for cyber investigation 

      De Maio, Giancarlo (Universita degli studi di Salerno, 2014-04-23)
      Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to access it. We develop relationships on social networks and entrust sensitive documents to online services. Desktop applications are being ...
    • Predicate encryption systems. No query left unanswered 

      Iovino, Vincenzo (Universita degli studi di Salerno, 2011-05-09)
      Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
    • Synthesis of recursive state machines from libraries of game modules 

      De Crescenzo, Ilaria (Universita degli studi di Salerno, 2016-05-18)
      This thesis is focused on synthesis. In formal veri cation synthesis can be referred to the controller synthesis and the system synthesis. This work combines both this area of research. First we focus on synthesizing ...
    • Teamwork collaboration around simulation data in an industrial context 

      Pirozzi, Donato (Universita degli studi di Salerno, 2015-04-27)
      Nowadays even more small, medium and large enterprises are world-wide and com- pete on a global market. In order to face the new challenges, industries have multiple co-located and geographically dispersed teams that ...
    • The value of privacy: concerns, attitudes, behaviors online, and information protection measures 

      Spinelli, Raffaele (Universita degli studi di Salerno, 2015-04-29)
      Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly the way other people perceive us. One have to careful decide what to expose and what not. There are a lot of personal and ...