Search
Now showing items 41-60 of 81
Multiple Object Tracking and Face-based Video Retrieval: Applications of Deep Learning to Video Analysis
(2021-10-11)
In recent years, deep learning (DL) has obtained numerous successes in
analyzing complex data, such as images or audio. A particularly recent area
of application is the analysis of videos.
This thesis focuses on the ...
Soft biometrics: emerging traits and applications
(2021-04-12)
Biometrics has been a thriving field of Pattern Recognition forlong. Both Academia and Business
have thus focused their at-tention in the practical use of biometrics to advance and pro-mote varying
applications in ...
A Study of some ML and DL-based Strategies for Network Security
(2023-06-26)
The Internet and advanced communication networks, such as IoT and cellular net-
works, produce enormous and diverse traffic data flows. The behavior of network
traffic in these networks is highly intricate due to factors ...
Enhancing the Sharing and the Management of Personal Data in the Big Data Era
(2022-02-22)
Nowadays, thanks to the digitalization of business processes and public
administrations, many significant Big data collections are available. Users are direct
suppliers of data when publishing contents on social networks. ...
Multi-biometric systems integrating fixed cameras, mobile devices, and drones
(2022-05-09)
To identify a person by means of fully automatic systems is still an open problem and a
matter of social concern. Many of the approaches coping with this problem are based on
the combination of biometrics and computer ...
The Influence of User Interface Design on User Experience - Focus on Accessibility and Situation Awareness
(2021-11-26)
User expectations, motivations, and feelings when using a system have
prompted the need to investigate beyond traditional usability issues by
evaluating and designing for the user experience. User eXperience (UX),
therefore, ...
Data Stream Profiling: Evolutionary and Incremental Algorithms for Dependency Discovery
(2022-02-22)
Data Profiling represents one of the most crucial processes in data quality
assessment. It includes a set of activities to efficiently analyze datasets
and provide insights from them. Such activities rely on the identification
of ...
Machine Learning Techniques and Models for Situation Awareness of IoT based Complex Systems
(2022-07-15)
The current reality is characterized by a solid technological and pervasive component. These elements are
expressed through smart devices, which make the environments we live in pervasive and able to exchange
information. ...
Industrial Facility Management
(2022-08-07)
Il Facility Management è una disciplina in via di sviluppo che ha ricevuto l'attenzione di professionisti
e ricercatori negli ultimi anni. Nell'industria ciò è dovuto principalmente all'importanza
dell'efficienza nel ...
Coverage in Wireless Sensor Networks with additional operating time constraints: efficient algorithms
(2021-06-11)
Nowadays there is a growing interest in wireless sensor networks, one of the most
significant technologies of the 21𝑠𝑡 century. A wireless sensor network (WSN) is
essentially composed by a large number of electronic ...
A Methodology of Total Audience Management Compliant with GDPR
(2022-08-22)
Nel primo capitolo si analizzano i punti di congiunzione del regolamento 679/2016 con l’intelligenza
artificiale. In particolare, il suddetto regolamento adotta un approccio profondamente innovativo nel
disciplinare la ...
Delayed-Input and Non-Malleable Cryptographic Protocols
(2018-03-12)
A major goal in the design of cryptographic protocols is to re-
duce the number of communication rounds. Since a cryptographic
protocol usually consists of a composition and interplay of some
subprotocols and cryptographic ...
Relaxed Functional Dependencies: Definition, Discovery and Applications
(2018-03-20)
Le dipendenze funzionali (FD) sono state introdotte agli inizi degli anni '70, quando venivano maggiormente utilizzate per valutare la progettazione dei database e garantire la qualità dei dati. Tuttavia, si è avuta la ...
Synthesis of recursive state machines from libraries of game modules
(2016-05-18)
This thesis is focused on synthesis. In formal veri cation synthesis can be
referred to the controller synthesis and the system synthesis. This work
combines both this area of research.
First we focus on synthesizing modular ...
Forensic Readiness Capability for Cloud Computing
(2015-10-19)
Cloud computing services represent the actual computation delivery to the most
of customer communities. Such services are regulated by a contract called Service
Level Agreement (SLA), cosigned between customers and providers. ...
Enhancing Data Warehouse management through semi-automatic data integration and complex graph generation
(2018-05-25)
Strategic information is one of the main assets for many organizations and, in the next future, it will become increasingly more important to enable the decisionmakers answer questions about their business, such as how to ...
About the development of visual search algorithms and their hardware implementations
(2017-06-23)
The main goal of my work is to exploit the benefits of a hardware implementation
of a 3D visual search pipeline. The term visual search refers
to the task of searching objects in the environment starting from the real
world ...
Teamwork collaboration around simulation data in an industrial context
(2015-04-27)
Nowadays even more small, medium and large enterprises are world-wide and compete on a global market. In order to face the new challenges, industries have multiple
co-located and geographically dispersed teams that work ...
Round and computational efficiency of two-party protocols
(2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages
that those parties send to each other. Beside the functionality and the security that a cryptographic
protocol provides, it is ...
Computer vision methods applied to person tracking and identification
(2015-04-22)
Computer vision methods for tracking and identification of people in constrained
and unconstrained environments have been widely explored in the last decades. De-
spite of the active research on these topics, they are still ...