Cerca
Items 21-40 di 52
Fuzzy concept analysis for semantic knowledge extraction
(Universita degli studi di Salerno, 2012-03-22)
Availability of controlled vocabularies, ontologies, and so on is enabling feature to provide some added values in terms of knowledge management. Nevertheless, the design, maintenance and construction of domain ontologies ...
Sequence analysis in bioinformatics: methodological and practical aspects
(Universita degli studi di Salerno, 2013-04-02)
My PhD research activities has focused on the development of new
computational methods for biological sequence analyses.
To overcome an intrinsic problem to protein sequence analysis, whose aim was
to infer homologies ...
Supporting learning activities in virtual worlds: methods, tools and evaluation
(Universita degli studi di Salerno, 2013-02-27)
Continuing advances and reduced costs in computational power, graphics and network bandwidth let 3D immersive multi‐user Virtual Worlds (VWs) become increasingly accessible while offering an improved and engaging quality ...
Logit dynamics for strategic games mixing time and metastability
(Universita degli studi di Salerno, 2012-04-18)
A complex system is generally de_ned as a system emerging from the interaction of
several and di_erent components, each one with their properties and their goals, usually
subject to external inuences. Nowadays, complex ...
New methods, techniques and applications for sketch recognition
(Universita degli studi di Salerno, 2014-04-24)
The use of diagrams is common in various disciplines. Typical examples
include maps, line graphs, bar charts, engineering blueprints, architects’
sketches, hand drawn schematics, etc.. In general, diagrams can be ...
On the evolution of digital evidence: novel approaches for cyber investigation
(Universita degli studi di Salerno, 2014-04-23)
Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to
access it. We develop relationships on social networks and entrust sensitive documents to
online services. Desktop applications are being ...
Secure End-to-End Communications in Mobile Networks
(Universita degli studi di Salerno, 2011-05-06)
Cellular communication has become an important part of our daily life.
Besides using cell phones for voice communication, we are now able to access
the Internet, conduct monetary transactions, send voice, video and ...
Fuzzy models for group decision making and applications to e-learning and recommender systems
(Universita degli studi di Salerno, 2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models
for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences
expression and aggregation. In ...
Secure computation under network and physical attacks
(Universita degli studi di Salerno, 2013-04-22)
This thesis proposes several protocols for achieving secure com-
putation under concurrent and physical attacks. Secure computation
allows many parties to compute a joint function of their inputs, while
keeping the ...
Un metodo basato su LDA per la sentiment analysis
(Universita degli studi di Salerno, 2013-03-16)
La progressiva diffusione dei social network, sia generalisti (quali Twitter, Facebook o Google+, la recente piattaforma messa a punto da Google) sia specializzati (ad esempio le comunità professionali di Linkedin), ha ...
Memetic algorithms for ontology alignment
(Universita degli studi di Salerno, 2013-04-24)
Semantic interoperability represents the capability of two or more systems to
meaningfully and accurately interpret the exchanged data so as to produce
useful results. It is an essential feature of all distributed and ...
3D data visualization techniques and applications for visual multidimensional data mining
(Universita degli studi di Salerno, 2014-04-21)
Despite modern technology provide new tools to measure the world around
us, we are quickly generating massive amounts of high-dimensional, spatialtemporal
data. In this work, I deal with two types of datasets: one in ...
A framework to access risks and derive requirements for a complex systems
(Universita degli studi di Salerno, 2014-04-22)
This thesis provides an innovative framework, based on the risk assessment methodology, to support the design of a pioneering complex systems, strongly ICT based, whose failures could threaten people, environment and society ...
Relaxed functional dependencies: definition, discovery and applications
(Universita degli studi di Salerno, 2018-03-20)
Functional dependencies (FDs) were conceived in the early '70s, and were mainly used to verify database design and assess data quality. However, to solve several issues in emerging application domains, such as the ...
Computer vision methods applied to person tracking and identification
(Universita degli studi di Salerno, 2015-04-22)
Computer vision methods for tracking and identification of people in constrained
and unconstrained environments have been widely explored in the last decades. De-
spite of the active research on these topics, they are ...
Progettazione di un biosensore ottico per la determinazione atmosferica del benzene
(Universita degli studi di Salerno, 2016-04-15)
In recent years, environmental pollution, particularly air pollution, is a subject of great scientific and public interests. The reason is due to the strong impact on human health. Air pollution is due to the placing in ...
Synthesis of recursive state machines from libraries of game modules
(Universita degli studi di Salerno, 2016-05-18)
This thesis is focused on synthesis. In formal veri cation synthesis can be
referred to the controller synthesis and the system synthesis. This work
combines both this area of research.
First we focus on synthesizing ...
Augmenting the Internet with a Trust Ecosystem for inter pares interactions
(Universita degli studi di Salerno, 2016-05-23)
The Internet is an extraordinary communications medium but it is not free from
problems that are limiting its potential further development. In this dissertation we
analyze and address some of the issues that make it an ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Forensic Readiness Capability for Cloud Computing
(Universita degli studi di Salerno, 2015-10-19)
Cloud computing services represent the actual computation delivery to the most
of customer communities. Such services are regulated by a contract called Service
Level Agreement (SLA), cosigned between customers and ...