DE PRISCO, Roberto
 Distribuzione geografica
Continente #
NA - Nord America 3.842
EU - Europa 1.167
AS - Asia 520
Continente sconosciuto - Info sul continente non disponibili 5
AF - Africa 3
SA - Sud America 3
OC - Oceania 1
Totale 5.541
Nazione #
US - Stati Uniti d'America 3.779
IT - Italia 465
CN - Cina 303
UA - Ucraina 299
IE - Irlanda 118
VN - Vietnam 110
DE - Germania 99
TR - Turchia 75
SE - Svezia 71
CA - Canada 62
FI - Finlandia 58
GB - Regno Unito 20
PH - Filippine 10
RU - Federazione Russa 8
FR - Francia 6
EU - Europa 5
NL - Olanda 5
SG - Singapore 5
TW - Taiwan 4
EG - Egitto 3
HR - Croazia 3
JP - Giappone 3
RO - Romania 3
BY - Bielorussia 2
CH - Svizzera 2
ES - Italia 2
HK - Hong Kong 2
IN - India 2
KR - Corea 2
AE - Emirati Arabi Uniti 1
CL - Cile 1
EC - Ecuador 1
GR - Grecia 1
ID - Indonesia 1
IR - Iran 1
LU - Lussemburgo 1
MK - Macedonia 1
MX - Messico 1
MY - Malesia 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
PE - Perù 1
PL - Polonia 1
PT - Portogallo 1
Totale 5.541
Città #
Ann Arbor 1.123
Chandler 410
Jacksonville 373
Princeton 326
Wilmington 284
Woodbridge 262
Houston 239
Dublin 116
Salerno 112
Dong Ket 108
Nanjing 98
Andover 77
Izmir 74
Beijing 61
Dearborn 57
Ottawa 51
Pellezzano 48
Boardman 37
Fairfield 33
Nanchang 30
Hebei 24
Ashburn 23
Mestre 22
Shenyang 20
Norwalk 19
Redwood City 15
Changsha 14
Jiaxing 14
Düsseldorf 13
Washington 12
Trento 11
Chicago 10
San Diego 10
Southend 9
Tianjin 9
Cambridge 7
Montréal 7
Silvi Marina 7
Des Moines 6
Naples 6
Napoli 6
Battipaglia 5
Hefei 5
Nocera Inferiore 5
Sorrento 5
Avellino 4
Hangzhou 4
Menlo Park 4
Pisa 4
Rome 4
Shanghai 4
Singapore 4
Taipei 4
Taytay 4
Acerra 3
Basking Ridge 3
Berlin 3
Cairo 3
Horia 3
Jinan 3
Mugnano di Napoli 3
Ningbo 3
Nürnberg 3
Padova 3
Rotondi 3
Torino 3
Toronto 3
Wuhan 3
Zagreb 3
Afragola 2
Casale Monferrato 2
Casalnuovo Di Napoli 2
Cava de' Tirreni 2
Como 2
Da Nang 2
Edinburgh 2
Fisciano 2
Galdo 2
Gothenburg 2
Granarolo 2
Groningen 2
Guangzhou 2
Kunming 2
Laurel 2
London 2
Luzzano 2
Montesano Sulla Marcellana 2
Noisy-le-sec 2
Portici 2
Potenza 2
Seattle 2
Seriate 2
Spinea 2
Udine 2
Vitebsk 2
Zurich 2
Aiello Del Sabato 1
Auckland 1
Avella 1
Biarritz 1
Totale 4.342
Nome #
Splicing music composition 178
Chorale Music Splicing System: An Algorithmic Music Composer Inspired by Molecular Splicing 145
Deterministic Truthful Mechanism for Scheduling on Selfish Machines 134
A botnet-based command and control approach relying on swarm intelligence 131
Security and Cryptography for Networks - 8th International Conference, SCN 2012 130
8th International Conference on Security and Cryptography for Networks, SCN 2012 112
Visualization of Music Plagiarism: Analysis and Evaluation 105
On designing truthful mechanisms for online scheduling 99
A Kind of Bio-inspired Learning of mUsic stylE 97
An Evolutionary Composer for Real-Time Background Music 90
Availability, usage and deployment characteristic of the Domain Name System 88
Routing Selfish Unsplittable Traffic 86
How to Route and Tax Selfish Unsplittable Traffic 85
Secure Two-Party Computation: A Visual Way 84
New Constructions for Mechanisms with Verification 82
A Bio-Inspired Approach to Infer Functional Rules and Aesthetic Goals from Music Genre Styles 82
6th International Conference on Security and Cryptography for Networks, SCN 2008 82
EvoBassComposer: a multi-objective genetic algorithm for 4-voice compositions 81
A dynamic view-oriented group communication service 80
How to Forge a Digital Alibi on Mac OS X 80
A Differential Evolution Algorithm Assisted by ANFIS for Music Fingering 79
The Power of Verification for One-Parameter Agents 78
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 78
Reti di calcolatori e Internet 77
Music Plagiarism at a glance: metrics of similarity and visualizations 77
Colored Visual Cryptography without Color Darkening 76
A Lightweight Approach to Authenticated Web Caching 74
Color visual cryptography schemes for black and white secret images 74
Secure computation without computers 74
Using Colors to Improve Visual Cryptography for Black and White Images 71
Cheating Immune Threshold Visual Secret Sharing 71
A Neural Network for Bass Functional Harmonization 70
Security and Cryptography in Networks - SCN 2006 69
Evaluation study of Visualisations for Harmonic Analysis of 4-part Music 69
Do You Trust Your Phone? 66
An Evolutionary Music Composer Algorithm for Bass Harmonization 66
On the relation of random grid and deterministic visual cryptography 66
Understanding the structure of musical compositions: Is visualization an effective approach? 66
Visual Cryptography for Color Images 64
Certified Email: Design and Implementation of a New Optimistic Protocol 63
BAND: A mobile-based collaboration system for composing and playing music 63
Security and Cryptography for Networks, 6th International Conference 63
On $k$-set consensus problems in asynchronous systems 62
The power of verification for one-parameter agents 62
Algorithmic problems in distributed systems 62
A Genetic Algorithm for Dodecaphonic Compositions 61
Revisiting the Paxos algorithm 60
Optimal Colored Threshold Visual Cryptography Schemes 60
A hybrid computational intelligence approach for automatic music composition 59
On Lower Bounds for the Redundancy of Optimal Codes 58
A methodology for estimating interdomain Web traffic demand 58
Measure-independent characterization of contrast optimal visual cryptography schemes 57
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography 57
On K-set consensun problems in asynchronous system 56
On designing truthful Mechanisms for online scheduling 55
A Dynamic primary configuration group communication service 55
A Customizable Recognizer for Orchestral Conducting Gestures Based on Neural Networks 54
Fuzzy vectorial-based similarity detection of Music Plagiarism 53
Splicing-Inspired Recognition and Composition of Musical Collectives Styles 52
On the Data Expansion of the Huffman Compression Algorithm 50
Natural User Interfaces to Support and Enhance Real-Time Music Performance 50
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 47
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols 47
Performing tasks on restartable message-passing processors 46
On the redundancy and data expansion of Huffman codes 45
Visual Cryptography: Models, Issues, Applications and New Directions 45
Testing and reconfiguration of VLSI linear arrays 44
Cheating Immune (2,n)-threshold Visual Secret Sharing 44
Colored Visual Cryptography without Color Darkening 44
EvoComposer: An Evolutionary Algorithm for 4-voice Music Compositions 44
Probabilistic Visual Cryptography Schemes 43
Probabilistic Visual Cryptography Schemes 43
Reducing costs in HSM-based data centers 42
Security and Cryptography for Networks 2010 41
Providing music service in Ambient Intelligence: experiments with gym users 41
An efficient and reliable two-level lightweight authentication protocol 39
Optimal Colored Threshold Visual Cryptography Schemes 38
A computational intelligence text-based detection system of music plagiarism 38
The Conundrum of Success in Music: Playing it or Talking About it? 38
Coordinated cooperative task computing using crash-prone processors with unreliable multicast 35
Probabilistic secret sharing 32
On the equivalence of 2-threshold secret sharing schemes and prefix codes 31
An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering 29
Induced Emotion-Based Music Recommendation through Reinforcement Learning 24
Secret sharing schemes for infinite sets of participants: A new design technique 24
How originality looks like. Integrating visualization and meta-heuristics to dissect music plagiarism 23
Ultra-lightweight Authentication 23
A multi-objective differential evolution algorithm for 4-voice compositions 21
Musica Parlata: a methodology to teach music to blind people 21
null 20
Human-Machine Teaming in Music: Anchored narrative-graph Visualization and Machine Learning 16
Reducing costs in HSM-based data centers 10
Improved Protocols for Distributed Secret Sharing 9
An improved privacy attack on smartphones exploiting the accelerometer 7
Gossamer: weaknesses and performance 7
Graph embedding of music structures for machine learning approaches 1
Bounds and Protocols for Graph-Based Distributed Secret Sharing 1
Totale 5.789
Categoria #
all - tutte 11.992
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 11.992


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019447 0 0 18 50 20 100 36 24 50 45 97 7
2019/2020793 201 15 76 11 63 33 89 14 69 29 151 42
2020/2021677 12 64 63 9 72 26 67 13 138 13 69 131
2021/2022686 5 0 13 22 34 9 5 42 85 76 99 296
2022/2023966 98 100 20 127 104 198 13 85 124 10 64 23
2023/2024137 63 48 26 0 0 0 0 0 0 0 0 0
Totale 5.789