Cerca
Items 1-10 di 45
Discovering hidden structures in high dimensional data space
(2011-03-01)
Il grande volume di dati che viene attualmente collezionato nei vari campi di applicazione non può essere gestito usando le tecniche standard di data mining.
L’obiettivo principale del presente lavoro di tesi è quello di ...
Predicate encryption systems. No query left unanswered
(2011-05-09)
Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables
fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
Beyond Pairwise Relationships: Modeling Real-world Dynamics Via High-order Networks
(2022-04-26)
Every single person, animal, or thing we can see in the world around us
is part of a broader collection of components that can spontaneously self-
organize to exhibit non-trivial global structures and behaviors at ...
New Insights on cryptographic hierarchical access control: models, schemes and analysis
(2016-05-24)
Nowadays the current network-centric world has given rise to several
security concerns regarding the access control management, which ensures that only authorized users are given access to certain resources
or tasks. In ...
The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics
(2016-05-24)
The era of Big Data is leading the generation of large amounts of data,
which require storage and analysis capabilities that can be only ad-
dressed by distributed computing systems. To facilitate large-scale
distributed ...
From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse
(2012-04-03)
The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ...
A Study of some ML and DL-based Strategies for Network Security
(2023-06-26)
The Internet and advanced communication networks, such as IoT and cellular net-
works, produce enormous and diverse traffic data flows. The behavior of network
traffic in these networks is highly intricate due to factors ...
Security and Privacy Concerns within Smart Environments: User-Centered Approaches for Defining Secure Trigger-Action Programs
(2023-06-13)
The advent of the Internet of Things (IoT) paradigm has launched a new world of opportunities, bringing with it a new understand ing of objects and technology that, today, is all around us. In fact, especially in domestic ...
Artificial Intelligence methods for supporting biomedical data analysis
(2022-05-06)
Artificial intelligence (AI) is a fundamental technology useful in many fields, ranging
from finance, weather forecast, to medicine. Positive results are reached especially
in the diagnostic field, where AI provides a great ...
The Influence of User Interface Design on User Experience - Focus on Accessibility and Situation Awareness
(2021-11-26)
User expectations, motivations, and feelings when using a system have
prompted the need to investigate beyond traditional usability issues by
evaluating and designing for the user experience. User eXperience (UX),
therefore, ...