Sfoglia per Autore  

Opzioni
Mostrati risultati da 41 a 60 di 85
Titolo Data di pubblicazione Autore(i) File
Asymptotic Load Balancing Algorithm for Many Task Scheduling 1-gen-2019 Oncioiu, A. -R.; Pop, F.; Esposito, C.
Metamorphic malicious code behavior detection using probabilistic inference methods 1-gen-2019 Choi, C.; Esposito, C.; Lee, M.; Choi, J.
CNN-based anti-spoofing two-tier multi-factor authentication system 1-gen-2019 Sajjad, M.; Khan, S.; Hussain, T.; Muhammad, K.; Sangaiah, A. K.; Castiglione, A.; Esposito, C.; Baik, S. W.
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications 1-gen-2019 Su, X.; Sperli, G.; Moscato, V.; Picariello, A.; Esposito, C.; Choi, C.
On data sovereignty in cloud-based computation offloading for smart cities applications 1-gen-2019 Esposito, C.; Castiglione, A.; Frattini, F.; Cinque, M.; Yang, Y.; Choo, K. -K. R.
Floater: Post-disaster Communications via Floating Content 1-gen-2019 Bonvin, F.; Manzo, G.; Esposito, C.; Braun, T.; Rizzo, G.
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication 1-gen-2019 Lee, K.; Esposito, C.; Lee, S. -Y.
Game Theoretic Optimal User Association in Emergency Networks 1-gen-2019 Esposito, C.; Zhao, Z.; Alcarria, R.; Rizzo, G.
IEEE access special section editorial: Recent advances on radio access and security methods in 5G networks 1-gen-2019 Han, G.; Yu, F. R.; Chen, H. -C.; Shen, B.; Esposito, C.; Su, X.
Emergency Networks for Post-Disaster Scenarios 1-gen-2020 Rizzo, Gianluca; Ristov, Sasko; Fahringer, Thomas; Gusev, Marjan; Dzanko, Matija; Bilic, Ivana; Esposito, Christian; Braun, Torsten
Resilience of 5G Mobile Communication Systems to Massive Disruptions 1-gen-2020 Cinkler, Tibor; Ladanyi, Akos; Rak, Jacek; Esposito, Christian; Rizzo, Gianluca
Routing in Post-Disaster Scenarios 1-gen-2020 Esposito, Christian; Zhao, Zhongliang; Rizzo, Gianluca; Pop, Florin; Apostol, Elena; Leordeanu, Cătălin; Preda, Stefan
Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions 1-gen-2020 Esposito, C.; Tamburis, O.; Choi, C.
Distributed Group Key Management for Event Notification Confidentiality among Sensors 1-gen-2020 Esposito, Christian; Ficco, Massimo; Castiglione, Aniello; Palmieri, Francesco; De Santis, Alfredo
Adaptive Optimization Method in Digital Twin Conveyor Systems via Range-Inspection Control 1-gen-2020 Wang, Tian; Cheng, Jiaxiang; Yang, Yi; Esposito, Christian; Snoussi, Hichem; Tao, Fei
FUSION—Fog Computing and Blockchain for Trusted Industrial Internet of Things 1-gen-2020 Ceccarelli, Andrea; Cinque, Marcello; Esposito, Christian; Foschini, Luca; Giannelli, Carlo; Lollini, Paolo
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks 1-gen-2020 Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F.
Robust Decentralised Trust Management for the Internet of Things by Using Game Theory 1-gen-2020 Esposito, Christiancarmine; Tamburis, Oscar; Su, Xin; Choi, Chang
A night at the opera: A conceptual framework for an integrated distributed sensor network-based system to figure out safety protocols for animals under risk of fire † 1-gen-2020 Tamburis, O.; Giannino, F.; D'Arco, M.; Tocchi, A.; Esposito, C.; Fiore, G. D.; Piscopo, N.; Esposito, L.
Evolutionary game theoretical on-line event detection over tweet streams 1-gen-2020 Di Girolamo, Rocco; Esposito, Christian; Moscato, Vincenzo; Sperlí, Giancarlo
Mostrati risultati da 41 a 60 di 85
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile