Sfoglia per Serie LECTURE NOTES IN ARTIFICIAL INTELLIGENCE
TactCube: Designing Mobile Interactions with Ambient Intelligence
2021-01-01 Battistoni, Pietro; di Gregorio, Marianna; Romano, Marco; Sebillo, Monica; Vitiello, Giuliana
A Tactile User Device to Interact with Smart Environments
2021-01-01 Battistoni, Pietro; Sebillo, Monica
Tanger MED SEZs: A Logistic and Industrial Hub in the Western Mediterranean
2020-01-01 Bencardino, Massimiliano; Esposito, Vincenzo
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems
2021-01-01 Avitabile, G.; Friolo, D.; Visconti, I.
Tightly-secure PAK(E)
2018-01-01 Becerra, J.; Iovino, V.; Ostrev, D.; Sala, P.; Skrobot, M.
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks
2020-01-01 Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F.
Two-Way Greedy: Algorithms for Imperfect Rationality
2022-01-01 Ferraioli, D.; Penna, P.; Ventre, C.
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens
2019-01-01 Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; Visconti, I.
Universally Composable Secure Computation with Corrupted Tokens
2019-01-01 Chandran, N.; Chongchitmate, W.; Ostrovsky, R.; Visconti, I.
Updatable functional encryption
2017-01-01 Arriaga, A.; Iovino, V.; Tang, Q.
Using selene to verify your vote in JCJ
2017-01-01 Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A.
Using trust and “utility” for group formation in the cloud of things
2019-01-01 Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarne, G. M. L.
Verifiable Inner Product Encryption Scheme
2020-01-01 Soroush, N.; Iovino, V.; Rial, A.; Roenne, P. B.; Ryan, P. Y. A.
The VF3-light subgraph isomorphism algorithm: When doing less is more effective
2018-01-01 Carletti, V.; Foggia, P.; Greco, A.; Saggese, A.; Vento, M.
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities
2020-01-01 Castiglione, A.; Palmieri, F.; Petraglia, M.; Pizzolante, R.
Water Distribution Network Perspective in RAFAEL Project, A System for Critical Infrastructure Risk Analysis and Forecast
2021-01-01 Longobardi, Antonia; Fattoruso, Grazia; Guarnieri, Guido; Di Pietro, Antonio; La Porta, Luigi; Tofani, Alberto; Pollino, Maurizio
Water Losses and Maintenance Investment. An Econometric Model for the Sustainable Management of Water Services
2021-01-01 Dolores, L.; Macchiaroli, M.; De Mare, G.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
TactCube: Designing Mobile Interactions with Ambient Intelligence | 1-gen-2021 | Battistoni, Pietro; di Gregorio, Marianna; Romano, Marco; Sebillo, Monica; Vitiello, Giuliana | |
A Tactile User Device to Interact with Smart Environments | 1-gen-2021 | Battistoni, Pietro; Sebillo, Monica | |
Tanger MED SEZs: A Logistic and Industrial Hub in the Western Mediterranean | 1-gen-2020 | Bencardino, Massimiliano; Esposito, Vincenzo | |
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems | 1-gen-2021 | Avitabile, G.; Friolo, D.; Visconti, I. | |
Tightly-secure PAK(E) | 1-gen-2018 | Becerra, J.; Iovino, V.; Ostrev, D.; Sala, P.; Skrobot, M. | |
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks | 1-gen-2020 | Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F. | |
Two-Way Greedy: Algorithms for Imperfect Rationality | 1-gen-2022 | Ferraioli, D.; Penna, P.; Ventre, C. | |
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens | 1-gen-2019 | Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; Visconti, I. | |
Universally Composable Secure Computation with Corrupted Tokens | 1-gen-2019 | Chandran, N.; Chongchitmate, W.; Ostrovsky, R.; Visconti, I. | |
Updatable functional encryption | 1-gen-2017 | Arriaga, A.; Iovino, V.; Tang, Q. | |
Using selene to verify your vote in JCJ | 1-gen-2017 | Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A. | |
Using trust and “utility” for group formation in the cloud of things | 1-gen-2019 | Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarne, G. M. L. | |
Verifiable Inner Product Encryption Scheme | 1-gen-2020 | Soroush, N.; Iovino, V.; Rial, A.; Roenne, P. B.; Ryan, P. Y. A. | |
The VF3-light subgraph isomorphism algorithm: When doing less is more effective | 1-gen-2018 | Carletti, V.; Foggia, P.; Greco, A.; Saggese, A.; Vento, M. | |
Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities | 1-gen-2020 | Castiglione, A.; Palmieri, F.; Petraglia, M.; Pizzolante, R. | |
Water Distribution Network Perspective in RAFAEL Project, A System for Critical Infrastructure Risk Analysis and Forecast | 1-gen-2021 | Longobardi, Antonia; Fattoruso, Grazia; Guarnieri, Guido; Di Pietro, Antonio; La Porta, Luigi; Tofani, Alberto; Pollino, Maurizio | |
Water Losses and Maintenance Investment. An Econometric Model for the Sustainable Management of Water Services | 1-gen-2021 | Dolores, L.; Macchiaroli, M.; De Mare, G. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile