• Compression and protection of multidimensional data 

      Pizzolante, Raffaele (Universita degli studi di Salerno, 2015-05-05)
      The main objective of this thesis is to explore and discuss novel techniques related to the compression and protection of multidimensional data (i.e., 3-D medical images, hyperspectral images, 3-D microscopy images and ...
    • Coverage in wireless sensor networks: models and algorithms 

      D'Ambrosio, Ciriaco (Università, 2015-05-05)
      Due to technological advances which enabled their deployment in relevant and diverse scenarios, Wireless Sensor Networks (WSNs) have been object of intense study in the last few years. Possible application contexts include ...
    • Models and Algorithms for Some Covering Problems on Graphs 

      Silvestri, Selene (Universita degli studi di Salerno, 2016-05-12)
      Several real-life problems as well as problems of theoretical importance within the field of Operations Research are combinatorial in nature. Combinatorial Optimization deals with decision-making problems defined on a ...
    • Synthesis of recursive state machines from libraries of game modules 

      De Crescenzo, Ilaria (Universita degli studi di Salerno, 2016-05-18)
      This thesis is focused on synthesis. In formal veri cation synthesis can be referred to the controller synthesis and the system synthesis. This work combines both this area of research. First we focus on synthesizing ...
    • Augmenting the Internet with a Trust Ecosystem for inter pares interactions 

      Pascuccio, Fernando Antonio (Universita degli studi di Salerno, 2016-05-23)
      The Internet is an extraordinary communications medium but it is not free from problems that are limiting its potential further development. In this dissertation we analyze and address some of the issues that make it an ...
    • New Insights on cryptographic hierarchical access control: models, schemes and analysis 

      Castiglione, Arcangelo (Universita degli studi di Salerno, 2016-05-24)
      Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which en- sures that only authorized users are given access to certain resources or tasks. ...
    • The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics 

      Roscigno, Gianluca (Universita degli studi di Salerno, 2016-05-24)
      The era of Big Data is leading the generation of large amounts of data, which require storage and analysis capabilities that can be only ad- dressed by distributed computing systems. To facilitate large-scale distributed ...