• English
    • italiano
  • italiano 
    • English
    • italiano
  • Login
Cerca 
  •   DSpace Home
  • Cerca
  •   DSpace Home
  • Cerca
JavaScript is disabled for your browser. Some features of this site may not work without it.

Cerca

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Items 1-8 di 8

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Supporting learning activities in virtual worlds: methods, tools and evaluation 

Murad, Sharefa (2013-02-27)
Continuing advances and reduced costs in computational power, graphics and network bandwidth let 3D immersive multi‐user Virtual Worlds (VWs) become increasingly accessible while offering an improved and engaging quality ...
Thumbnail

Sequence analysis in bioinformatics: methodological and practical aspects 

Fortino, Vittorio (2013-04-02)
My PhD research activities has focused on the development of new computational methods for biological sequence analyses. To overcome an intrinsic problem to protein sequence analysis, whose aim was to infer homologies in ...
Thumbnail

Secure computation under network and physical attacks 

Scafuro, Alessandra (2013-04-22)
This thesis proposes several protocols for achieving secure com- putation under concurrent and physical attacks. Secure computation allows many parties to compute a joint function of their inputs, while keeping the privacy ...
Thumbnail

Un metodo basato su LDA per la sentiment analysis 

Rocca Comite Mascambruno, Paolo (2013-03-16)
La progressiva diffusione dei social network, sia generalisti (quali Twitter, Facebook o Google+, la recente piattaforma messa a punto da Google) sia specializzati (ad esempio le comunità professionali di Linkedin), ha ...
Thumbnail

Memetic algorithms for ontology alignment 

Vitiello, Autilia (2013-04-24)
Semantic interoperability represents the capability of two or more systems to meaningfully and accurately interpret the exchanged data so as to produce useful results. It is an essential feature of all distributed and open ...
Thumbnail

On the Generalizations of Identity-Based Encryption 

De Caro, Angelo (2013-04-16)
Today public-key cryptographic is widely deployed and successfully used but still a major drawback exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the message other ...
Thumbnail

Steganographic methods for information hiding in MS-Office files 

D'Alessio, Bonaventura (2013-04-20)
The simplest container of digital information is “the file" and among the vast array of files currently available, MS-Office files are probably the most widely used. These files, starting from MS-Office 2007, respect the ...
Thumbnail

Hybrid approaches based on computational intelligence and semantic web for distributed situation and context awareness 

Furno, Domenico (2013-04-29)
The research work focuses on Situation Awareness and Context Awareness topics. Specifically, Situation Awareness involves being aware of what is happening in the vicinity to understand how information, events, and one’s ...
EleA themes by Ugsiba
 

 

Ricerca

Tutto DSpaceArchivi & CollezioniData di pubblicazioneAutoriTitoliSoggettiData di immissione

My Account

LoginRegistrazione

Discover

AutoreD'Alessio, Bonaventura (1)De Caro, Angelo (1)Fortino, Vittorio (1)Furno, Domenico (1)Murad, Sharefa (1)Rocca Comite Mascambruno, Paolo (1)Scafuro, Alessandra (1)Vitiello, Autilia (1)Soggetto
INF/01 INFORMATICA (8)
Algoritmi memetici (1)Allineamento ontologico (1)Computational intelligence (1)Context awareness (1)Criptography (1)DNA (1)E-Learning (1)Evaluation (1)Evoluzione dei genomi (1)... View MoreDate Issued
2013 (8)
Has File(s)
Yes (8)
EleA themes by Ugsiba