DE PRISCO, Roberto
 Distribuzione geografica
Continente #
NA - Nord America 3.978
EU - Europa 1.227
AS - Asia 572
Continente sconosciuto - Info sul continente non disponibili 5
AF - Africa 4
SA - Sud America 3
OC - Oceania 2
Totale 5.791
Nazione #
US - Stati Uniti d'America 3.912
IT - Italia 506
CN - Cina 328
UA - Ucraina 299
IE - Irlanda 122
VN - Vietnam 110
DE - Germania 100
TR - Turchia 75
SE - Svezia 71
FI - Finlandia 66
CA - Canada 65
SG - Singapore 23
GB - Regno Unito 22
IN - India 11
PH - Filippine 10
FR - Francia 8
RU - Federazione Russa 8
EU - Europa 5
NL - Olanda 5
ES - Italia 4
TW - Taiwan 4
EG - Egitto 3
HR - Croazia 3
JP - Giappone 3
RO - Romania 3
BY - Bielorussia 2
CH - Svizzera 2
HK - Hong Kong 2
KR - Corea 2
NZ - Nuova Zelanda 2
AE - Emirati Arabi Uniti 1
CL - Cile 1
CM - Camerun 1
EC - Ecuador 1
GR - Grecia 1
ID - Indonesia 1
IR - Iran 1
LU - Lussemburgo 1
MK - Macedonia 1
MX - Messico 1
MY - Malesia 1
NO - Norvegia 1
PE - Perù 1
PL - Polonia 1
PT - Portogallo 1
Totale 5.791
Città #
Ann Arbor 1.123
Chandler 410
Jacksonville 373
Princeton 326
Wilmington 284
Woodbridge 262
Houston 239
Dublin 120
Salerno 118
Ashburn 112
Dong Ket 108
Nanjing 98
Andover 77
Izmir 74
Beijing 73
Dearborn 57
Ottawa 51
Pellezzano 48
Boardman 43
Fairfield 33
Nanchang 30
Hebei 24
Mestre 22
Shenyang 20
Norwalk 19
Singapore 16
Redwood City 15
Changsha 14
Jiaxing 14
Düsseldorf 13
Washington 12
Trento 11
Chicago 10
San Diego 10
Alzate Brianza 9
Nocera Inferiore 9
Southend 9
Tianjin 9
Cambridge 7
Montréal 7
Pune 7
Rome 7
Seattle 7
Shanghai 7
Silvi Marina 7
Des Moines 6
Guangzhou 6
Los Angeles 6
Naples 6
Napoli 6
Battipaglia 5
Fisciano 5
Hefei 5
Sorrento 5
Avellino 4
Berlin 4
Hangzhou 4
Helsinki 4
Menlo Park 4
Pisa 4
Taipei 4
Taytay 4
Acerra 3
Basking Ridge 3
Cairo 3
Horia 3
Jinan 3
Lappeenranta 3
Mugnano di Napoli 3
Ningbo 3
Nürnberg 3
Padova 3
Rotondi 3
Torino 3
Toronto 3
Wuhan 3
Zagreb 3
Afragola 2
Bera 2
Casale Monferrato 2
Casalnuovo Di Napoli 2
Cava de' Tirreni 2
Como 2
Da Nang 2
Dragoni 2
Edinburgh 2
Galdo 2
Gothenburg 2
Granarolo 2
Groningen 2
Kunming 2
Laurel 2
London 2
Luzzano 2
Marano di Napoli 2
Montesano Sulla Marcellana 2
Nagpur 2
Noisy-le-sec 2
Pietramelara 2
Portici 2
Totale 4.517
Nome #
Splicing music composition 179
Chorale Music Splicing System: An Algorithmic Music Composer Inspired by Molecular Splicing 149
Deterministic Truthful Mechanism for Scheduling on Selfish Machines 136
A botnet-based command and control approach relying on swarm intelligence 134
Security and Cryptography for Networks - 8th International Conference, SCN 2012 131
8th International Conference on Security and Cryptography for Networks, SCN 2012 114
Visualization of Music Plagiarism: Analysis and Evaluation 106
On designing truthful mechanisms for online scheduling 100
A Kind of Bio-inspired Learning of mUsic stylE 99
How to Route and Tax Selfish Unsplittable Traffic 94
An Evolutionary Composer for Real-Time Background Music 93
Secure Two-Party Computation: A Visual Way 90
Availability, usage and deployment characteristic of the Domain Name System 88
Routing Selfish Unsplittable Traffic 87
6th International Conference on Security and Cryptography for Networks, SCN 2008 87
A Bio-Inspired Approach to Infer Functional Rules and Aesthetic Goals from Music Genre Styles 86
New Constructions for Mechanisms with Verification 82
EvoBassComposer: a multi-objective genetic algorithm for 4-voice compositions 82
A dynamic view-oriented group communication service 81
How to Forge a Digital Alibi on Mac OS X 81
A Differential Evolution Algorithm Assisted by ANFIS for Music Fingering 80
Music Plagiarism at a glance: metrics of similarity and visualizations 80
Colored Visual Cryptography without Color Darkening 79
The Power of Verification for One-Parameter Agents 79
A Lightweight Approach to Authenticated Web Caching 78
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 78
Reti di calcolatori e Internet 77
Color visual cryptography schemes for black and white secret images 75
A Neural Network for Bass Functional Harmonization 74
Secure computation without computers 74
Evaluation study of Visualisations for Harmonic Analysis of 4-part Music 74
Using Colors to Improve Visual Cryptography for Black and White Images 73
Security and Cryptography in Networks - SCN 2006 72
Cheating Immune Threshold Visual Secret Sharing 71
Do You Trust Your Phone? 69
An Evolutionary Music Composer Algorithm for Bass Harmonization 69
Security and Cryptography for Networks, 6th International Conference 69
On the relation of random grid and deterministic visual cryptography 67
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography 67
On $k$-set consensus problems in asynchronous systems 66
Visual Cryptography for Color Images 66
Understanding the structure of musical compositions: Is visualization an effective approach? 66
A Genetic Algorithm for Dodecaphonic Compositions 64
BAND: A mobile-based collaboration system for composing and playing music 64
Certified Email: Design and Implementation of a New Optimistic Protocol 63
Algorithmic problems in distributed systems 63
On Lower Bounds for the Redundancy of Optimal Codes 62
The power of verification for one-parameter agents 62
A hybrid computational intelligence approach for automatic music composition 62
Optimal Colored Threshold Visual Cryptography Schemes 62
A methodology for estimating interdomain Web traffic demand 61
Revisiting the Paxos algorithm 60
A Dynamic primary configuration group communication service 60
A Customizable Recognizer for Orchestral Conducting Gestures Based on Neural Networks 57
Measure-independent characterization of contrast optimal visual cryptography schemes 57
On K-set consensun problems in asynchronous system 56
On designing truthful Mechanisms for online scheduling 55
Splicing-Inspired Recognition and Composition of Musical Collectives Styles 55
On the Data Expansion of the Huffman Compression Algorithm 53
Fuzzy vectorial-based similarity detection of Music Plagiarism 53
Natural User Interfaces to Support and Enhance Real-Time Music Performance 50
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 50
Performing tasks on restartable message-passing processors 47
Visual Cryptography: Models, Issues, Applications and New Directions 47
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols 47
Probabilistic Visual Cryptography Schemes 46
On the redundancy and data expansion of Huffman codes 45
Cheating Immune (2,n)-threshold Visual Secret Sharing 45
Reducing costs in HSM-based data centers 45
EvoComposer: An Evolutionary Algorithm for 4-voice Music Compositions 45
Testing and reconfiguration of VLSI linear arrays 44
Colored Visual Cryptography without Color Darkening 44
Probabilistic Visual Cryptography Schemes 43
A computational intelligence text-based detection system of music plagiarism 42
Security and Cryptography for Networks 2010 41
An efficient and reliable two-level lightweight authentication protocol 41
Providing music service in Ambient Intelligence: experiments with gym users 41
The Conundrum of Success in Music: Playing it or Talking About it? 40
Optimal Colored Threshold Visual Cryptography Schemes 39
Coordinated cooperative task computing using crash-prone processors with unreliable multicast 36
Induced Emotion-Based Music Recommendation through Reinforcement Learning 34
Probabilistic secret sharing 32
An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering 32
On the equivalence of 2-threshold secret sharing schemes and prefix codes 31
An improved privacy attack on smartphones exploiting the accelerometer 30
How originality looks like. Integrating visualization and meta-heuristics to dissect music plagiarism 30
Secret sharing schemes for infinite sets of participants: A new design technique 28
A multi-objective differential evolution algorithm for 4-voice compositions 25
Ultra-lightweight Authentication 23
Graph embedding of music structures for machine learning approaches 23
Musica Parlata: a methodology to teach music to blind people 21
Human-Machine Teaming in Music: Anchored narrative-graph Visualization and Machine Learning 17
Bounds and Protocols for Graph-Based Distributed Secret Sharing 17
Improved Protocols for Distributed Secret Sharing 15
Gossamer: weaknesses and performance 15
Reducing costs in HSM-based data centers 11
Text-independent voice recognition based on Siamese networks and fusion embeddings 9
Efficient and reliable post-quantum authentication 1
Totale 6.043
Categoria #
all - tutte 17.360
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 17.360


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20197 0 0 0 0 0 0 0 0 0 0 0 7
2019/2020793 201 15 76 11 63 33 89 14 69 29 151 42
2020/2021677 12 64 63 9 72 26 67 13 138 13 69 131
2021/2022686 5 0 13 22 34 9 5 42 85 76 99 296
2022/2023965 98 100 20 127 104 198 13 85 123 10 64 23
2023/2024392 62 48 32 34 35 63 24 35 12 22 25 0
Totale 6.043