Search
Now showing items 1-6 of 6
The value of privacy: concerns, attitudes, behaviors online, and information protection measures
(2015-04-29)
Most of our lives takes place on-line. Our on-line activities, affect directly or indirectly
the way other people perceive us. One have to careful decide what to expose
and what not. There are a lot of personal and sensitive ...
Coverage in wireless sensor networks: models and algorithms
(2015-05-05)
Due to technological advances which enabled their deployment in relevant and diverse
scenarios, Wireless Sensor Networks (WSNs) have been object of intense study in the last
few years. Possible application contexts include ...
ID-Based Key Agreement for WANETs
(2015-04-24)
The increasing interest about wireless ad hoc networks (WANETs) is due to some key features not owned by traditional networks such as nodes mobility, network self-organization and the ability to rely on infrastructure-less ...
Teamwork collaboration around simulation data in an industrial context
(2015-04-27)
Nowadays even more small, medium and large enterprises are world-wide and compete on a global market. In order to face the new challenges, industries have multiple
co-located and geographically dispersed teams that work ...
Compression and Protection of Multidimensional Data
(2015-05-05)
The main objective of this thesis is to explore and discuss novel techniques
related to the compression and protection of multidimensional data (i.e., 3-D
medical images, hyperspectral images, 3-D microscopy images and ...
Improving Network Anomaly Detection with Independent Component Analysis
(2015-05-04)
Complexity, sophistication, and rate of growth of modern networks, coupled with the depth, continuity, and pervasiveness of their role in our everyday lives, stress the importance of identifying potential misuse or threats ...