Sfoglia per Autore
Game Theoretic Optimal User Association in Emergency Networks
2019-01-01 Esposito, C.; Zhao, Z.; Alcarria, R.; Rizzo, G.
IEEE access special section editorial: Recent advances on radio access and security methods in 5G networks
2019-01-01 Han, G.; Yu, F. R.; Chen, H. -C.; Shen, B.; Esposito, C.; Su, X.
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications
2019-01-01 Su, X.; Sperli, G.; Moscato, V.; Picariello, A.; Esposito, C.; Choi, C.
Localization and detection of targets in underwater wireless sensor using distance and angle based algorithms
2019-01-01 Ullah, I.; Chen, J.; Su, X.; Esposito, C.; Choi, C.
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication
2019-01-01 Lee, K.; Esposito, C.; Lee, S. -Y.
CNN-based anti-spoofing two-tier multi-factor authentication system
2019-01-01 Sajjad, M.; Khan, S.; Hussain, T.; Muhammad, K.; Sangaiah, A. K.; Castiglione, A.; Esposito, C.; Baik, S. W.
On data sovereignty in cloud-based computation offloading for smart cities applications
2019-01-01 Esposito, C.; Castiglione, A.; Frattini, F.; Cinque, M.; Yang, Y.; Choo, K. -K. R.
Metamorphic malicious code behavior detection using probabilistic inference methods
2019-01-01 Choi, C.; Esposito, C.; Lee, M.; Choi, J.
Asymptotic Load Balancing Algorithm for Many Task Scheduling
2019-01-01 Oncioiu, A. -R.; Pop, F.; Esposito, C.
Emergency Networks for Post-Disaster Scenarios
2020-01-01 Rizzo, Gianluca; Ristov, Sasko; Fahringer, Thomas; Gusev, Marjan; Dzanko, Matija; Bilic, Ivana; Esposito, Christian; Braun, Torsten
Resilience of 5G Mobile Communication Systems to Massive Disruptions
2020-01-01 Cinkler, Tibor; Ladanyi, Akos; Rak, Jacek; Esposito, Christian; Rizzo, Gianluca
Routing in Post-Disaster Scenarios
2020-01-01 Esposito, Christian; Zhao, Zhongliang; Rizzo, Gianluca; Pop, Florin; Apostol, Elena; Leordeanu, Cătălin; Preda, Stefan
Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions
2020-01-01 Esposito, C.; Tamburis, O.; Choi, C.
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks
2020-01-01 Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F.
Evolutionary game theoretical on-line event detection over tweet streams
2020-01-01 Di Girolamo, Rocco; Esposito, Christian; Moscato, Vincenzo; Sperlí, Giancarlo
Blockchain-empowered decentralised trust management for the Internet of Vehicles security
2020-01-01 Cinque, Marcello; Esposito, Christian; Russo, Stefano; Tamburis, Oscar
Reinforced Secure Gossiping against DoS Attacks in Post-Disaster Scenarios
2020-01-01 Esposito, Christian; Zhao, Zhongliang; Rak, Jacek
A night at the opera: A conceptual framework for an integrated distributed sensor network-based system to figure out safety protocols for animals under risk of fire †
2020-01-01 Tamburis, O.; Giannino, F.; D'Arco, M.; Tocchi, A.; Esposito, C.; Fiore, G. D.; Piscopo, N.; Esposito, L.
Process mining as support to simulation modeling: A hospital-based case study
2020-01-01 Tamburis, Oscar; Esposito, Christian
A Localization Based on Unscented Kalman Filter and Particle Filter Localization Algorithms
2020-01-01 Ullah, Inam; Shen, Yu; Su, Xin; Esposito, Christian; Choi, Chang
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Game Theoretic Optimal User Association in Emergency Networks | 1-gen-2019 | Esposito, C.; Zhao, Z.; Alcarria, R.; Rizzo, G. | |
IEEE access special section editorial: Recent advances on radio access and security methods in 5G networks | 1-gen-2019 | Han, G.; Yu, F. R.; Chen, H. -C.; Shen, B.; Esposito, C.; Su, X. | |
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications | 1-gen-2019 | Su, X.; Sperli, G.; Moscato, V.; Picariello, A.; Esposito, C.; Choi, C. | |
Localization and detection of targets in underwater wireless sensor using distance and angle based algorithms | 1-gen-2019 | Ullah, I.; Chen, J.; Su, X.; Esposito, C.; Choi, C. | |
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication | 1-gen-2019 | Lee, K.; Esposito, C.; Lee, S. -Y. | |
CNN-based anti-spoofing two-tier multi-factor authentication system | 1-gen-2019 | Sajjad, M.; Khan, S.; Hussain, T.; Muhammad, K.; Sangaiah, A. K.; Castiglione, A.; Esposito, C.; Baik, S. W. | |
On data sovereignty in cloud-based computation offloading for smart cities applications | 1-gen-2019 | Esposito, C.; Castiglione, A.; Frattini, F.; Cinque, M.; Yang, Y.; Choo, K. -K. R. | |
Metamorphic malicious code behavior detection using probabilistic inference methods | 1-gen-2019 | Choi, C.; Esposito, C.; Lee, M.; Choi, J. | |
Asymptotic Load Balancing Algorithm for Many Task Scheduling | 1-gen-2019 | Oncioiu, A. -R.; Pop, F.; Esposito, C. | |
Emergency Networks for Post-Disaster Scenarios | 1-gen-2020 | Rizzo, Gianluca; Ristov, Sasko; Fahringer, Thomas; Gusev, Marjan; Dzanko, Matija; Bilic, Ivana; Esposito, Christian; Braun, Torsten | |
Resilience of 5G Mobile Communication Systems to Massive Disruptions | 1-gen-2020 | Cinkler, Tibor; Ladanyi, Akos; Rak, Jacek; Esposito, Christian; Rizzo, Gianluca | |
Routing in Post-Disaster Scenarios | 1-gen-2020 | Esposito, Christian; Zhao, Zhongliang; Rizzo, Gianluca; Pop, Florin; Apostol, Elena; Leordeanu, Cătălin; Preda, Stefan | |
Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions | 1-gen-2020 | Esposito, C.; Tamburis, O.; Choi, C. | |
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks | 1-gen-2020 | Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F. | |
Evolutionary game theoretical on-line event detection over tweet streams | 1-gen-2020 | Di Girolamo, Rocco; Esposito, Christian; Moscato, Vincenzo; Sperlí, Giancarlo | |
Blockchain-empowered decentralised trust management for the Internet of Vehicles security | 1-gen-2020 | Cinque, Marcello; Esposito, Christian; Russo, Stefano; Tamburis, Oscar | |
Reinforced Secure Gossiping against DoS Attacks in Post-Disaster Scenarios | 1-gen-2020 | Esposito, Christian; Zhao, Zhongliang; Rak, Jacek | |
A night at the opera: A conceptual framework for an integrated distributed sensor network-based system to figure out safety protocols for animals under risk of fire † | 1-gen-2020 | Tamburis, O.; Giannino, F.; D'Arco, M.; Tocchi, A.; Esposito, C.; Fiore, G. D.; Piscopo, N.; Esposito, L. | |
Process mining as support to simulation modeling: A hospital-based case study | 1-gen-2020 | Tamburis, Oscar; Esposito, Christian | |
A Localization Based on Unscented Kalman Filter and Particle Filter Localization Algorithms | 1-gen-2020 | Ullah, Inam; Shen, Yu; Su, Xin; Esposito, Christian; Choi, Chang |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile