• English
    • italiano
  • English 
    • English
    • italiano
  • Login
Search 
  •   DSpace Home
  • Search
  •   DSpace Home
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 41-60 of 81

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Multiple Object Tracking and Face-based Video Retrieval: Applications of Deep Learning to Video Analysis 

Ciaparrone, Gioele (2021-10-11)
In recent years, deep learning (DL) has obtained numerous successes in analyzing complex data, such as images or audio. A particularly recent area of application is the analysis of videos. This thesis focuses on the ...
Thumbnail

Soft biometrics: emerging traits and applications 

Bisogni, Carmen (2021-04-12)
Biometrics has been a thriving field of Pattern Recognition forlong. Both Academia and Business have thus focused their at-tention in the practical use of biometrics to advance and pro-mote varying applications in ...
Thumbnail

A Study of some ML and DL-based Strategies for Network Security 

Farsimadan, Eslam (2023-06-26)
The Internet and advanced communication networks, such as IoT and cellular net- works, produce enormous and diverse traffic data flows. The behavior of network traffic in these networks is highly intricate due to factors ...
Thumbnail

Enhancing the Sharing and the Management of Personal Data in the Big Data Era 

Desiato, Domenico (2022-02-22)
Nowadays, thanks to the digitalization of business processes and public administrations, many significant Big data collections are available. Users are direct suppliers of data when publishing contents on social networks. ...
Thumbnail

Multi-biometric systems integrating fixed cameras, mobile devices, and drones 

De Maio, Luigi (2022-05-09)
To identify a person by means of fully automatic systems is still an open problem and a matter of social concern. Many of the approaches coping with this problem are based on the combination of biometrics and computer ...
Thumbnail

The Influence of User Interface Design on User Experience - Focus on Accessibility and Situation Awareness 

Di Gregorio, Marianna (2021-11-26)
User expectations, motivations, and feelings when using a system have prompted the need to investigate beyond traditional usability issues by evaluating and designing for the user experience. User eXperience (UX), therefore, ...
Thumbnail

Data Stream Profiling: Evolutionary and Incremental Algorithms for Dependency Discovery 

Cirillo, Stefano (2022-02-22)
Data Profiling represents one of the most crucial processes in data quality assessment. It includes a set of activities to efficiently analyze datasets and provide insights from them. Such activities rely on the identification of ...
Thumbnail

Machine Learning Techniques and Models for Situation Awareness of IoT based Complex Systems 

Santaniello, Domenico (2022-07-15)
The current reality is characterized by a solid technological and pervasive component. These elements are expressed through smart devices, which make the environments we live in pervasive and able to exchange information. ...
Thumbnail

Industrial Facility Management 

Toro Lazo, Alonso (2022-08-07)
Il Facility Management è una disciplina in via di sviluppo che ha ricevuto l'attenzione di professionisti e ricercatori negli ultimi anni. Nell'industria ciò è dovuto principalmente all'importanza dell'efficienza nel ...
Thumbnail

Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms 

Iossa, Antonio (2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is essentially composed by a large number of electronic ...
Thumbnail

A Methodology of Total Audience Management Compliant with GDPR 

Soldani, Amleto (2022-08-22)
Nel primo capitolo si analizzano i punti di congiunzione del regolamento 679/2016 con l’intelligenza artificiale. In particolare, il suddetto regolamento adotta un approccio profondamente innovativo nel disciplinare la ...
Thumbnail

Delayed-Input and Non-Malleable Cryptographic Protocols 

Siniscalchi, Luisa (2018-03-12)
A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
Thumbnail

Relaxed Functional Dependencies: Definition, Discovery and Applications 

Caruccio, Loredana (2018-03-20)
Le dipendenze funzionali (FD) sono state introdotte agli inizi degli anni '70, quando venivano maggiormente utilizzate per valutare la progettazione dei database e garantire la qualità dei dati. Tuttavia, si è avuta la ...
Thumbnail

Synthesis of recursive state machines from libraries of game modules 

De Crescenzo, Ilaria (2016-05-18)
This thesis is focused on synthesis. In formal veri cation synthesis can be referred to the controller synthesis and the system synthesis. This work combines both this area of research. First we focus on synthesizing modular ...
Thumbnail

Forensic Readiness Capability for Cloud Computing 

De Marco, Lucia (2015-10-19)
Cloud computing services represent the actual computation delivery to the most of customer communities. Such services are regulated by a contract called Service Level Agreement (SLA), cosigned between customers and providers. ...
Thumbnail

Enhancing Data Warehouse management through semi-automatic data integration and complex graph generation 

Ciobanu, Madalina Georgeta (2018-05-25)
Strategic information is one of the main assets for many organizations and, in the next future, it will become increasingly more important to enable the decisionmakers answer questions about their business, such as how to ...
Thumbnail

About the development of visual search algorithms and their hardware implementations 

Puglia, Luca (2017-06-23)
The main goal of my work is to exploit the benefits of a hardware implementation of a 3D visual search pipeline. The term visual search refers to the task of searching objects in the environment starting from the real world ...
Thumbnail

Teamwork collaboration around simulation data in an industrial context 

Pirozzi, Donato (2015-04-27)
Nowadays even more small, medium and large enterprises are world-wide and compete on a global market. In order to face the new challenges, industries have multiple co-located and geographically dispersed teams that work ...
Thumbnail

Round and computational efficiency of two-party protocols 

Ciampi, Michele (2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it is ...
Thumbnail

Computer vision methods applied to person tracking and identification 

Narducci, Fabio (2015-04-22)
Computer vision methods for tracking and identification of people in constrained and unconstrained environments have been widely explored in the last decades. De- spite of the active research on these topics, they are still ...
  • 1
  • 2
  • 3
  • 4
  • 5
EleA themes by Ugsiba
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit Date

My Account

LoginRegister

Discover

AuthorAddone, Agnese (1)Antelmi, Alessia (1)Auriemma Citarella, Alessia (1)Avitabile, Gennaro (1)Barbella, Marcello (1)Barra, Paola (1)Bisogni, Carmen (1)Breve, Bernardo (1)Capo, Alessandro (1)Capuano, Nicola (1)... View MoreSubject
INF/01 INFORMATICA (81)
Machine learning (3)Privacy (3)Collaboration (2)Cryptography (2)Deep learning (2)Information visualization (2)Proof system (2)Semantic web (2)Situation awareness (2)... View MoreDate Issued2020 - 2023 (29)2011 - 2019 (52)Has File(s)Yes (81)
EleA themes by Ugsiba