Browsing Informatica by Title
Now showing items 15-34 of 44
-
Efficient distributed load balancing for parallel algorithms
(Universita degli studi di Salerno, 2011-04-29)With the advent of massive parallel processing technology, exploiting the power offered by hundreds, or even thousands of processors is all but a trivial task. Computing by using multi-processor, multi-core or many-core ... -
Forensic analysis for digital images
(Universita degli studi di Salerno, 2011-11-23)Nowadays, taking and sharing digital pictures is becoming a very popular activity. This is witnessed by the explosive growth of the digital cameras market: e.g., more than one billion of digital cameras have been ... -
From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse
(Universita degli studi di Salerno, 2012-04-03)The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ... -
Fuzzy concept analysis for semantic knowledge extraction
(Universita degli studi di Salerno, 2012-03-22)Availability of controlled vocabularies, ontologies, and so on is enabling feature to provide some added values in terms of knowledge management. Nevertheless, the design, maintenance and construction of domain ontologies ... -
GeoVisual Analytics methods and techniques for territorial sustainable development
(Universita degli studi di Salerno, 2023-04-13)In order to reduce poverty and improve people’s lives everywhere, territorial development must be sustainable. Data science and analytics can offer fundamental contributions to it. Moreover, to achieve the 17 goals in the ... -
ID-Based Key Agreement for WANETs
(Universita degli studi di Salerno, 2015-04-24)The increasing interest about wireless ad hoc networks (WANETs) is due to some key features not owned by traditional networks such as nodes mobility, network self-organization and the ability to rely on infrastructure-less ... -
Improving Network Anomaly Detection with Independent Component Analysis
(Universita degli studi di Salerno, 2015-05-04)Complexity, sophistication, and rate of growth of modern networks, coupled with the depth, continuity, and pervasiveness of their role in our everyday lives, stress the importance of identifying potential misuse or threats ... -
Intelligent technologies for threat detection in networks security scenarios
(Universita degli studi di Salerno, 2023-06-08)The advent of the Internet of Things (IoT), with the consequent changes in network architectures and communication dynamics, has strongly conditioned the security market by radically shifting traditional per- ceptions ... -
Knowledge management and Discovery for advanced Enterprise Knowledge Engineering
(Universita degli studi di Salerno, 2014-05-02)The research work addresses mainly issues related to the adoption of models, methodologies and knowledge management tools that implement a pervasive use of the latest technologies in the area of Semantic Web for the ... -
Logit dynamics for strategic games mixing time and metastability
(Universita degli studi di Salerno, 2012-04-18)A complex system is generally de_ned as a system emerging from the interaction of several and di_erent components, each one with their properties and their goals, usually subject to external inuences. Nowadays, complex ... -
Metodi matematici e tecnologie per la trasformazione digitale e le tokenizzazioni
(Universita degli studi di Salerno, 2023-03-08)This work has a two-fold objective, achieved through two lines of research. The first, purely industrial, focuses on the technical-scientific difficulties related to collecting, tokenizing, and producing value from ... -
Models and Algorithms for Some Covering Problems on Graphs
(Universita degli studi di Salerno, 2016-05-12)Several real-life problems as well as problems of theoretical importance within the field of Operations Research are combinatorial in nature. Combinatorial Optimization deals with decision-making problems defined on a ... -
Multi-biometric systems integrating fixed cameras, mobile devices, and drones
(Universita degli studi di Salerno, 2022-05-09)To identify a person by means of fully automatic systems is still an open problem and a matter of social concern. Many of the approaches coping with this problem are based on the combination of biometrics and computer ... -
Network anaomaly detection based on the observation of multi-scale traffic dynamics
(Universita degli studi di Salerno, 2012-03-03)Con la sempre più rapida crescita in termini di dimensioni e complessità delle moderne infrastrutture di rete, l’attività di individuazione e prevenzione di abusi e violazioni nell’uso di tali infrastrutture sta diventando ... -
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(Universita degli studi di Salerno, 2016-05-24)Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which en- sures that only authorized users are given access to certain resources or tasks. ... -
New methods, techniques and applications for sketch recognition
(Universita degli studi di Salerno, 2014-04-24)The use of diagrams is common in various disciplines. Typical examples include maps, line graphs, bar charts, engineering blueprints, architects’ sketches, hand drawn schematics, etc.. In general, diagrams can be ... -
On the evolution of digital evidence: novel approaches for cyber investigation
(Universita degli studi di Salerno, 2014-04-23)Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to access it. We develop relationships on social networks and entrust sensitive documents to online services. Desktop applications are being ... -
On the verification of parametric and real-time systems
(Universita degli studi di Salerno, 2011-05-06)Parametric and Real-Time Systems play a central role in the theory underlying the Verification and Synthesis problems. Real-time systems are present everywhere and are used in safety critical applications, such as flight ... -
Predicate encryption systems. No query left unanswered
(Universita degli studi di Salerno, 2011-05-09)Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ... -
Quality and Privacy-aware (Linked) Open Data Exploitation
(Universita degli studi di Salerno, 2022-04-26)Data are the new oil and it is widely recognised the role of publishing them as Open Data to let data consumers freely access and exploit them. Data providers are not only encouraged to publish data but to ensure that ...