Sfoglia per Serie  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 112 a 131 di 136
Titolo Data di pubblicazione Autore(i) File
Simulation-based secure functional encryption in the random oracle model 1-gen-2015 Iovino, V.; Zebroski, K.
Sinc-Based Convolutional Neural Networks for EEG-BCI-Based Motor Imagery Classification 1-gen-2021 Bria, A.; Marrocco, C.; Tortorella, F.
A SLAM Integrated Approach for Digital Heritage Documentation 1-gen-2021 Barba, S.; Ferreyra, C.; Cotella, V. A.; di Filippo, A.; Amalfitano, S.
Social signature: Signing by tweeting 1-gen-2014 Buccafurri, F.; Fotia, L.; Lax, G.
Supporting Interaction in a Virtual Chorus: Results from a Focus Group 1-gen-2021 Francese, R.; Bruno, P.; Tortora, G.
SYCL-bench: A versatile cross-platform benchmark suite for heterogeneous computing 1-gen-2020 Lal, S.; Alpay, A.; Salzmann, P.; Cosenza, B.; Hirsch, A.; Stawinoga, N.; Thoman, P.; Fahringer, T.; Heuveline, V.
Symmetric searchable encryption with sharing and unsharing 1-gen-2018 Patel, S.; Persiano, G.; Yeo, K.
A System for Controlling How Carefully Surgeons Are Cleaning Their Hands 1-gen-2019 Greco, Luca; Percannella, Gennaro; Ritrovato, Pierluigi; Saggese, Alessia; Vento, Mario
TactCube: Designing Mobile Interactions with Ambient Intelligence 1-gen-2021 Battistoni, Pietro; di Gregorio, Marianna; Romano, Marco; Sebillo, Monica; Vitiello, Giuliana
A Tactile User Device to Interact with Smart Environments 1-gen-2021 Battistoni, Pietro; Sebillo, Monica
Tanger MED SEZs: A Logistic and Industrial Hub in the Western Mediterranean 1-gen-2020 Bencardino, Massimiliano; Esposito, Vincenzo
Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems 1-gen-2021 Avitabile, G.; Friolo, D.; Visconti, I.
Tightly-secure PAK(E) 1-gen-2018 Becerra, J.; Iovino, V.; Ostrev, D.; Sala, P.; Skrobot, M.
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks 1-gen-2020 Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F.
Two-Way Greedy: Algorithms for Imperfect Rationality 1-gen-2022 Ferraioli, D.; Penna, P.; Ventre, C.
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens 1-gen-2019 Badrinarayanan, S.; Jain, A.; Ostrovsky, R.; Visconti, I.
Universally Composable Secure Computation with Corrupted Tokens 1-gen-2019 Chandran, N.; Chongchitmate, W.; Ostrovsky, R.; Visconti, I.
Updatable functional encryption 1-gen-2017 Arriaga, A.; Iovino, V.; Tang, Q.
Using selene to verify your vote in JCJ 1-gen-2017 Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A.
Using trust and “utility” for group formation in the cloud of things 1-gen-2019 Fortino, G.; Fotia, L.; Messina, F.; Rosaci, D.; Sarne, G. M. L.
Mostrati risultati da 112 a 131 di 136
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile