• English
    • italiano
  • English 
    • English
    • italiano
  • Login
Search 
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Search
  •   DSpace Home
  • Tesi di dottorato
  • Area Ingegneria civile, elettronica, industriale
  • Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 16

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Cyber security and ubiquity: an human-centric approach 

Colella, Antonio (Universita degli studi di Salerno, 2017-06-23)
Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, ...
Thumbnail

Enhancing Ubiquitous Computing Environments Through Composition of Heterogeneous Services 

Di Giovanni, Pasquale (Universita degli studi di Salerno, 2016-01-18)
In recent years the substantial advancements in Information and Communication Technologies enabled the development of original software solutions that can provide support to problems people face in their daily activities. ...
Thumbnail

Round and computational efficiency of two-party protocols 

Ciampi, Michele (Universita degli studi di Salerno, 2018-03-03)
A cryptographic protocol is defined by the behaviour of the involved parties and the messages that those parties send to each other. Beside the functionality and the security that a cryptographic protocol provides, it ...
Thumbnail

Enhancing Data Warehouse management through semi-automatic data integration and complex graph generation 

Ciobanu, Madalina Georgeta (Universita degli studi di Salerno, 2018-05-25)
Strategic information is one of the main assets for many organizations and, in the next future, it will become increasingly more important to enable the decisionmakers answer questions about their business, such as how to ...
Thumbnail

About the development of visual search algorithms and their hardware implementations 

Puglia, Luca (Universita degli studi di Salerno, 2017-06-23)
The main goal of my work is to exploit the benefits of a hardware implementation of a 3D visual search pipeline. The term visual search refers to the task of searching objects in the environment starting from the real world ...
Thumbnail

Computer Music Algorithms. Bio-inspired and Artificial Intelligence Applications 

Zaccagnino, Gianluca (Universita degli studi di Salerno, 2017-06-01)
Music is one of the arts that have most benefited from the invention of computers. Originally, the term Computer Music was used in the scientific community to identify the application of information technology in music c ...
Thumbnail

Fuzzy models for group decision making and applications to e-learning and recommender systems 

Capuano, Nicola (Universita degli studi di Salerno, 2018-03-08)
The work presented in the Ph.D. thesis deals with the definition of new fuzzy models for Group Decision Making (GDM) aimed at improving two phases of the decision process: preferences expression and aggregation. In ...
Thumbnail

Un metodo basato su LDA per la sentiment analysis 

Rocca Comite Mascambruno, Paolo (Universita degli studi di Salerno, 2013-03-16)
La progressiva diffusione dei social network, sia generalisti (quali Twitter, Facebook o Google+, la recente piattaforma messa a punto da Google) sia specializzati (ad esempio le comunità professionali di Linkedin), ha ...
Thumbnail

Delayed-Input and Non-Malleable Cryptographic Protocols 

Siniscalchi, Luisa (Universita degli studi di Salerno, 2018-03-12)
A major goal in the design of cryptographic protocols is to re- duce the number of communication rounds. Since a cryptographic protocol usually consists of a composition and interplay of some subprotocols and cryptographic ...
Thumbnail

Forensic Readiness Capability for Cloud Computing 

De Marco, Lucia (Universita degli studi di Salerno, 2015-10-19)
Cloud computing services represent the actual computation delivery to the most of customer communities. Such services are regulated by a contract called Service Level Agreement (SLA), cosigned between customers and ...
  • 1
  • 2
EleA themes by Ugsiba
 

 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsBy Submit DateThis CommunityBy Issue DateAuthorsTitlesSubjectsBy Submit Date

My Account

LoginRegister

Discover

AuthorCapuano, Nicola (1)Ciampi, Michele (1)Ciobanu, Madalina Georgeta (1)Colella, Antonio (1)D'Auria, Matteo (1)De Marco, Lucia (1)Di Giovanni, Pasquale (1)Driouich, Youssef (1)Flores, Manuela (1)Gargiulo, Claudio (1)... View MoreSubject
INF/01 INFORMATICA (16)
Proof system (2)Algorithms (1)Artificial Intelligence (1)Authentication schemes (1)Automatic verification (1)Cloud computing (1)Collaboration (1)Computational science (1)Computer music (1)... View MoreDate Issued2017 (4)2018 (4)2019 (3)2021 (2)2013 (1)2015 (1)2016 (1)Has File(s)Yes (16)
EleA themes by Ugsiba