DE PRISCO, Roberto
 Distribuzione geografica
Continente #
NA - Nord America 3.968
EU - Europa 1.216
AS - Asia 554
Continente sconosciuto - Info sul continente non disponibili 5
AF - Africa 4
SA - Sud America 3
OC - Oceania 2
Totale 5.752
Nazione #
US - Stati Uniti d'America 3.903
IT - Italia 501
CN - Cina 328
UA - Ucraina 299
IE - Irlanda 122
VN - Vietnam 110
DE - Germania 99
TR - Turchia 75
SE - Svezia 71
CA - Canada 64
FI - Finlandia 63
GB - Regno Unito 22
IN - India 11
PH - Filippine 10
RU - Federazione Russa 8
FR - Francia 6
EU - Europa 5
NL - Olanda 5
SG - Singapore 5
ES - Italia 4
TW - Taiwan 4
EG - Egitto 3
HR - Croazia 3
JP - Giappone 3
RO - Romania 3
BY - Bielorussia 2
CH - Svizzera 2
HK - Hong Kong 2
KR - Corea 2
NZ - Nuova Zelanda 2
AE - Emirati Arabi Uniti 1
CL - Cile 1
CM - Camerun 1
EC - Ecuador 1
GR - Grecia 1
ID - Indonesia 1
IR - Iran 1
LU - Lussemburgo 1
MK - Macedonia 1
MX - Messico 1
MY - Malesia 1
NO - Norvegia 1
PE - Perù 1
PL - Polonia 1
PT - Portogallo 1
Totale 5.752
Città #
Ann Arbor 1.123
Chandler 410
Jacksonville 373
Princeton 326
Wilmington 284
Woodbridge 262
Houston 239
Dublin 120
Salerno 118
Ashburn 112
Dong Ket 108
Nanjing 98
Andover 77
Izmir 74
Beijing 73
Dearborn 57
Ottawa 51
Pellezzano 48
Boardman 40
Fairfield 33
Nanchang 30
Hebei 24
Mestre 22
Shenyang 20
Norwalk 19
Redwood City 15
Changsha 14
Jiaxing 14
Düsseldorf 13
Washington 12
Trento 11
Chicago 10
San Diego 10
Alzate Brianza 9
Nocera Inferiore 9
Southend 9
Tianjin 9
Cambridge 7
Montréal 7
Pune 7
Seattle 7
Shanghai 7
Silvi Marina 7
Des Moines 6
Guangzhou 6
Naples 6
Napoli 6
Battipaglia 5
Fisciano 5
Hefei 5
Sorrento 5
Avellino 4
Hangzhou 4
Menlo Park 4
Pisa 4
Rome 4
Singapore 4
Taipei 4
Taytay 4
Acerra 3
Basking Ridge 3
Berlin 3
Cairo 3
Horia 3
Jinan 3
Lappeenranta 3
Mugnano di Napoli 3
Ningbo 3
Nürnberg 3
Padova 3
Rotondi 3
Torino 3
Toronto 3
Wuhan 3
Zagreb 3
Afragola 2
Bera 2
Casale Monferrato 2
Casalnuovo Di Napoli 2
Cava de' Tirreni 2
Como 2
Da Nang 2
Dragoni 2
Edinburgh 2
Galdo 2
Gothenburg 2
Granarolo 2
Groningen 2
Kunming 2
Laurel 2
London 2
Luzzano 2
Montesano Sulla Marcellana 2
Nagpur 2
Noisy-le-sec 2
Pietramelara 2
Portici 2
Potenza 2
San Sebastiano al Vesuvio 2
Seriate 2
Totale 4.492
Nome #
Splicing music composition 178
Chorale Music Splicing System: An Algorithmic Music Composer Inspired by Molecular Splicing 148
Deterministic Truthful Mechanism for Scheduling on Selfish Machines 135
A botnet-based command and control approach relying on swarm intelligence 134
Security and Cryptography for Networks - 8th International Conference, SCN 2012 130
8th International Conference on Security and Cryptography for Networks, SCN 2012 114
Visualization of Music Plagiarism: Analysis and Evaluation 106
On designing truthful mechanisms for online scheduling 100
A Kind of Bio-inspired Learning of mUsic stylE 99
How to Route and Tax Selfish Unsplittable Traffic 93
An Evolutionary Composer for Real-Time Background Music 93
Secure Two-Party Computation: A Visual Way 89
Availability, usage and deployment characteristic of the Domain Name System 88
Routing Selfish Unsplittable Traffic 87
A Bio-Inspired Approach to Infer Functional Rules and Aesthetic Goals from Music Genre Styles 86
6th International Conference on Security and Cryptography for Networks, SCN 2008 86
New Constructions for Mechanisms with Verification 82
EvoBassComposer: a multi-objective genetic algorithm for 4-voice compositions 82
A dynamic view-oriented group communication service 81
A Differential Evolution Algorithm Assisted by ANFIS for Music Fingering 80
How to Forge a Digital Alibi on Mac OS X 80
Music Plagiarism at a glance: metrics of similarity and visualizations 80
Colored Visual Cryptography without Color Darkening 79
The Power of Verification for One-Parameter Agents 79
A Lightweight Approach to Authenticated Web Caching 78
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 78
Reti di calcolatori e Internet 77
Color visual cryptography schemes for black and white secret images 75
A Neural Network for Bass Functional Harmonization 74
Secure computation without computers 74
Using Colors to Improve Visual Cryptography for Black and White Images 73
Evaluation study of Visualisations for Harmonic Analysis of 4-part Music 73
Cheating Immune Threshold Visual Secret Sharing 71
Security and Cryptography in Networks - SCN 2006 70
Do You Trust Your Phone? 68
An Evolutionary Music Composer Algorithm for Bass Harmonization 68
Security and Cryptography for Networks, 6th International Conference 68
On $k$-set consensus problems in asynchronous systems 66
On the relation of random grid and deterministic visual cryptography 66
Understanding the structure of musical compositions: Is visualization an effective approach? 66
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography 66
Visual Cryptography for Color Images 65
A Genetic Algorithm for Dodecaphonic Compositions 64
Certified Email: Design and Implementation of a New Optimistic Protocol 63
Algorithmic problems in distributed systems 63
BAND: A mobile-based collaboration system for composing and playing music 63
On Lower Bounds for the Redundancy of Optimal Codes 62
The power of verification for one-parameter agents 62
A hybrid computational intelligence approach for automatic music composition 62
Optimal Colored Threshold Visual Cryptography Schemes 62
A methodology for estimating interdomain Web traffic demand 61
Revisiting the Paxos algorithm 60
A Dynamic primary configuration group communication service 60
A Customizable Recognizer for Orchestral Conducting Gestures Based on Neural Networks 57
Measure-independent characterization of contrast optimal visual cryptography schemes 57
On K-set consensun problems in asynchronous system 56
On designing truthful Mechanisms for online scheduling 55
Splicing-Inspired Recognition and Composition of Musical Collectives Styles 54
Fuzzy vectorial-based similarity detection of Music Plagiarism 53
On the Data Expansion of the Huffman Compression Algorithm 52
Natural User Interfaces to Support and Enhance Real-Time Music Performance 50
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 49
Performing tasks on restartable message-passing processors 47
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols 47
Probabilistic Visual Cryptography Schemes 46
Visual Cryptography: Models, Issues, Applications and New Directions 46
On the redundancy and data expansion of Huffman codes 45
EvoComposer: An Evolutionary Algorithm for 4-voice Music Compositions 45
Testing and reconfiguration of VLSI linear arrays 44
Cheating Immune (2,n)-threshold Visual Secret Sharing 44
Colored Visual Cryptography without Color Darkening 44
Probabilistic Visual Cryptography Schemes 43
Reducing costs in HSM-based data centers 42
A computational intelligence text-based detection system of music plagiarism 42
Security and Cryptography for Networks 2010 41
An efficient and reliable two-level lightweight authentication protocol 41
Providing music service in Ambient Intelligence: experiments with gym users 41
The Conundrum of Success in Music: Playing it or Talking About it? 40
Optimal Colored Threshold Visual Cryptography Schemes 38
Coordinated cooperative task computing using crash-prone processors with unreliable multicast 35
Induced Emotion-Based Music Recommendation through Reinforcement Learning 34
Probabilistic secret sharing 32
An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering 32
On the equivalence of 2-threshold secret sharing schemes and prefix codes 31
How originality looks like. Integrating visualization and meta-heuristics to dissect music plagiarism 30
An improved privacy attack on smartphones exploiting the accelerometer 29
Secret sharing schemes for infinite sets of participants: A new design technique 28
A multi-objective differential evolution algorithm for 4-voice compositions 25
Ultra-lightweight Authentication 23
Graph embedding of music structures for machine learning approaches 22
Musica Parlata: a methodology to teach music to blind people 21
Human-Machine Teaming in Music: Anchored narrative-graph Visualization and Machine Learning 17
Improved Protocols for Distributed Secret Sharing 15
Gossamer: weaknesses and performance 14
Bounds and Protocols for Graph-Based Distributed Secret Sharing 13
Reducing costs in HSM-based data centers 10
Text-independent voice recognition based on Siamese networks and fusion embeddings 6
Totale 6.003
Categoria #
all - tutte 16.116
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 16.116


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019149 0 0 0 0 0 0 0 0 0 45 97 7
2019/2020793 201 15 76 11 63 33 89 14 69 29 151 42
2020/2021677 12 64 63 9 72 26 67 13 138 13 69 131
2021/2022686 5 0 13 22 34 9 5 42 85 76 99 296
2022/2023965 98 100 20 127 104 198 13 85 123 10 64 23
2023/2024352 62 48 32 34 35 63 24 35 12 7 0 0
Totale 6.003