• English
    • italiano
  • italiano 
    • English
    • italiano
  • Login
Cerca 
  •   DSpace Home
  • Tesi di dottorato
  • Area Scienze chimiche, fisiche, matematiche
  • Informatica
  • Cerca
  •   DSpace Home
  • Tesi di dottorato
  • Area Scienze chimiche, fisiche, matematiche
  • Informatica
  • Cerca
JavaScript is disabled for your browser. Some features of this site may not work without it.

Cerca

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Items 1-10 di 45

  • Sort Options:
  • Relevance
  • Title Asc
  • Title Desc
  • Issue Date Asc
  • Issue Date Desc
  • Results Per Page:
  • 5
  • 10
  • 20
  • 40
  • 60
  • 80
  • 100
Thumbnail

Discovering hidden structures in high dimensional data space 

Murino, Loredana (2011-03-01)
Il grande volume di dati che viene attualmente collezionato nei vari campi di applicazione non può essere gestito usando le tecniche standard di data mining. L’obiettivo principale del presente lavoro di tesi è quello di ...
Thumbnail

Predicate encryption systems. No query left unanswered 

Iovino, Vincenzo (2011-05-09)
Predicate encryption is an important cryptographic primitive (see [7, 14, 28]) that enables fine-grained control on the decryption keys. Let T be a class of binary predicates. Roughly speaking, in a predicate encryption ...
Thumbnail

Beyond Pairwise Relationships: Modeling Real-world Dynamics Via High-order Networks 

Antelmi, Alessia (2022-04-26)
Every single person, animal, or thing we can see in the world around us is part of a broader collection of components that can spontaneously self- organize to exhibit non-trivial global structures and behaviors at ...
Thumbnail

New Insights on cryptographic hierarchical access control: models, schemes and analysis 

Castiglione, Arcangelo (2016-05-24)
Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which ensures that only authorized users are given access to certain resources or tasks. In ...
Thumbnail

The Role of Distributed Computing in Big Data Science: Case Studies in Forensics and Bioinformatics 

Roscigno, Gianluca (2016-05-24)
The era of Big Data is leading the generation of large amounts of data, which require storage and analysis capabilities that can be only ad- dressed by distributed computing systems. To facilitate large-scale distributed ...
Thumbnail

From GeoVisualization to visual-analytics: methodologies and techniques for human-information discourse 

De Chiara, Davide (2012-04-03)
The objective of our research is to give support to decision makers when facing problems which require rapid solutions in spite of the complexity of scenarios under investigation. In order to achieve this goal our studies ...
Thumbnail

A Study of some ML and DL-based Strategies for Network Security 

Farsimadan, Eslam (2023-06-26)
The Internet and advanced communication networks, such as IoT and cellular net- works, produce enormous and diverse traffic data flows. The behavior of network traffic in these networks is highly intricate due to factors ...
Thumbnail

Security and Privacy Concerns within Smart Environments: User-Centered Approaches for Defining Secure Trigger-Action Programs 

Breve, Bernardo (2023-06-13)
The advent of the Internet of Things (IoT) paradigm has launched a new world of opportunities, bringing with it a new understand ing of objects and technology that, today, is all around us. In fact, especially in domestic ...
Thumbnail

Artificial Intelligence methods for supporting biomedical data analysis 

Frasca, Maria (2022-05-06)
Artificial intelligence (AI) is a fundamental technology useful in many fields, ranging from finance, weather forecast, to medicine. Positive results are reached especially in the diagnostic field, where AI provides a great ...
Thumbnail

The Influence of User Interface Design on User Experience - Focus on Accessibility and Situation Awareness 

Di Gregorio, Marianna (2021-11-26)
User expectations, motivations, and feelings when using a system have prompted the need to investigate beyond traditional usability issues by evaluating and designing for the user experience. User eXperience (UX), therefore, ...
  • 1
  • 2
  • 3
  • 4
  • . . .
  • 5
EleA themes by Ugsiba
 

 

Ricerca

Tutto DSpaceArchivi & CollezioniData di pubblicazioneAutoriTitoliSoggettiData di immissioneQuesta CollezioneData di pubblicazioneAutoriTitoliSoggettiData di immissione

My Account

LoginRegistrazione

Discover

AutoreAddone, Agnese (1)Antelmi, Alessia (1)Auriemma Citarella, Alessia (1)Barbella, Marcello (1)Battistoni, Pietro (1)Breve, Bernardo (1)Cascone, Lucia (1)Castiglione, Arcangelo (1)Cembalo, Maurizio (1)Cirillo, Stefano (1)... View MoreSoggettoINF/01 INFORMATICA (36)ING-INF/05 SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI (3)Cryptography (2)Fuzzy formal concept analysis (2)INF/01 - Informatica (2)Knowledge extraction (2)Ontology (2)Security (2)Semantic web (2)Synthesis (2)... View MoreDate Issued2020 - 2023 (18)2011 - 2019 (27)Has File(s)Yes (45)
EleA themes by Ugsiba