DE PRISCO, Roberto
 Distribuzione geografica
Continente #
NA - Nord America 4.245
AS - Asia 3.244
EU - Europa 1.700
SA - Sud America 204
AF - Africa 21
Continente sconosciuto - Info sul continente non disponibili 6
OC - Oceania 2
Totale 9.422
Nazione #
US - Stati Uniti d'America 4.165
HK - Hong Kong 2.094
IT - Italia 574
CN - Cina 422
SG - Singapore 385
UA - Ucraina 303
RU - Federazione Russa 253
BR - Brasile 181
DE - Germania 165
IE - Irlanda 124
VN - Vietnam 120
TR - Turchia 84
FI - Finlandia 79
CA - Canada 72
SE - Svezia 71
KR - Corea 52
GB - Regno Unito 44
IN - India 27
FR - Francia 13
AT - Austria 12
NL - Olanda 12
PL - Polonia 11
ES - Italia 10
PH - Filippine 10
JP - Giappone 9
CZ - Repubblica Ceca 8
EC - Ecuador 7
AR - Argentina 6
IQ - Iraq 6
MX - Messico 6
EU - Europa 5
MA - Marocco 5
OM - Oman 5
PK - Pakistan 5
RO - Romania 5
ZA - Sudafrica 5
BD - Bangladesh 4
TW - Taiwan 4
AZ - Azerbaigian 3
CH - Svizzera 3
CL - Cile 3
DZ - Algeria 3
EG - Egitto 3
GR - Grecia 3
HR - Croazia 3
KE - Kenya 3
AE - Emirati Arabi Uniti 2
BY - Bielorussia 2
CO - Colombia 2
ID - Indonesia 2
MY - Malesia 2
NZ - Nuova Zelanda 2
PE - Perù 2
PT - Portogallo 2
PY - Paraguay 2
UZ - Uzbekistan 2
BN - Brunei Darussalam 1
CM - Camerun 1
CR - Costa Rica 1
IL - Israele 1
IR - Iran 1
JO - Giordania 1
LB - Libano 1
LU - Lussemburgo 1
MK - Macedonia 1
NG - Nigeria 1
NO - Norvegia 1
NP - Nepal 1
TT - Trinidad e Tobago 1
VE - Venezuela 1
XK - ???statistics.table.value.countryCode.XK??? 1
Totale 9.422
Città #
Hong Kong 2.091
Ann Arbor 1.123
Chandler 410
Jacksonville 373
Princeton 326
Wilmington 284
Woodbridge 262
Houston 240
Singapore 173
Ashburn 133
Dublin 121
Salerno 119
Dong Ket 108
Nanjing 98
Beijing 82
Andover 77
Izmir 74
Dearborn 57
Boardman 53
Ottawa 52
Moscow 49
Pellezzano 48
Munich 46
Fairfield 33
Nanchang 30
Los Angeles 26
Hebei 24
Mestre 22
Shenyang 20
Fisciano 19
Norwalk 19
Chicago 18
Dallas 17
Naples 17
Redwood City 15
São Paulo 15
Changsha 14
Jiaxing 14
Düsseldorf 13
Brooklyn 12
Turku 12
Washington 12
Nuremberg 11
Rome 11
Santa Clara 11
The Dalles 11
Trento 11
Council Bluffs 10
London 10
San Diego 10
Alzate Brianza 9
Charlotte 9
Nocera Inferiore 9
San Francisco 9
Southend 9
Tianjin 9
Warsaw 9
Chennai 8
Guangzhou 8
Seattle 8
Shanghai 8
Wuhan 8
Cambridge 7
Montréal 7
New York 7
Pune 7
Silvi Marina 7
Afragola 6
Amsterdam 6
Boston 6
Brno 6
Des Moines 6
Napoli 6
Phoenix 6
Sarno 6
Tokyo 6
Vienna 6
Battipaglia 5
Caserta 5
Hefei 5
Manchester 5
Pisa 5
Pomigliano d'Arco 5
Sorrento 5
Avellino 4
Berlin 4
Hangzhou 4
Hanoi 4
Helsinki 4
Johannesburg 4
Lappeenranta 4
Menlo Park 4
Muscat 4
Porto Alegre 4
Taipei 4
Taytay 4
Toronto 4
Acerra 3
Ankara 3
Atlanta 3
Totale 7.130
Nome #
Natural User Interfaces to Support and Enhance Real-Time Music Performance 881
Visualization of Music Plagiarism: Analysis and Evaluation 361
Deterministic Truthful Mechanism for Scheduling on Selfish Machines 244
Splicing music composition 238
A Kind of Bio-inspired Learning of mUsic stylE 213
EvoBassComposer: a multi-objective genetic algorithm for 4-voice compositions 206
Chorale Music Splicing System: An Algorithmic Music Composer Inspired by Molecular Splicing 191
The Power of Verification for One-Parameter Agents 182
Security and Cryptography for Networks - 8th International Conference, SCN 2012 170
Splicing-Inspired Recognition and Composition of Musical Collectives Styles 165
A botnet-based command and control approach relying on swarm intelligence 163
The power of verification for one-parameter agents 159
Old and New Results on Alphabetic Codes 151
8th International Conference on Security and Cryptography for Networks, SCN 2012 137
Understanding the structure of musical compositions: Is visualization an effective approach? 123
On designing truthful mechanisms for online scheduling 122
Music Plagiarism at a glance: metrics of similarity and visualizations 119
6th International Conference on Security and Cryptography for Networks, SCN 2008 119
A Bio-Inspired Approach to Infer Functional Rules and Aesthetic Goals from Music Genre Styles 117
How to Route and Tax Selfish Unsplittable Traffic 116
An Evolutionary Composer for Real-Time Background Music 112
Routing Selfish Unsplittable Traffic 109
A Differential Evolution Algorithm Assisted by ANFIS for Music Fingering 108
A Customizable Recognizer for Orchestral Conducting Gestures Based on Neural Networks 107
New Constructions for Mechanisms with Verification 105
Secure Two-Party Computation: A Visual Way 100
Availability, usage and deployment characteristic of the Domain Name System 98
A Lightweight Approach to Authenticated Web Caching 98
Security and Cryptography for Networks, 6th International Conference 98
Evaluation study of Visualisations for Harmonic Analysis of 4-part Music 97
A dynamic view-oriented group communication service 95
How to Forge a Digital Alibi on Mac OS X 92
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 91
A Neural Network for Bass Functional Harmonization 90
Colored Visual Cryptography without Color Darkening 88
Secure computation without computers 87
Fuzzy vectorial-based similarity detection of Music Plagiarism 86
Reti di calcolatori e Internet 85
An Evolutionary Music Composer Algorithm for Bass Harmonization 85
Color visual cryptography schemes for black and white secret images 84
BAND: A mobile-based collaboration system for composing and playing music 83
EvoComposer: An Evolutionary Algorithm for 4-voice Music Compositions 82
Using Colors to Improve Visual Cryptography for Black and White Images 81
A multi-objective differential evolution algorithm for 4-voice compositions 81
A Genetic Algorithm for Dodecaphonic Compositions 80
Security and Cryptography in Networks - SCN 2006 79
Algorithmic problems in distributed systems 79
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 79
A hybrid computational intelligence approach for automatic music composition 79
Visual Cryptography for Color Images 78
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography 78
Cheating Immune Threshold Visual Secret Sharing 77
Do You Trust Your Phone? 76
On the relation of random grid and deterministic visual cryptography 76
On designing truthful Mechanisms for online scheduling 75
Certified Email: Design and Implementation of a New Optimistic Protocol 75
A Dynamic primary configuration group communication service 75
Revisiting the Paxos algorithm 74
Optimal Colored Threshold Visual Cryptography Schemes 74
A methodology for estimating interdomain Web traffic demand 72
On $k$-set consensus problems in asynchronous systems 71
Measure-independent characterization of contrast optimal visual cryptography schemes 70
On Lower Bounds for the Redundancy of Optimal Codes 68
Probabilistic Visual Cryptography Schemes 66
An efficient and reliable two-level lightweight authentication protocol 66
A computational intelligence text-based detection system of music plagiarism 64
Induced Emotion-Based Music Recommendation through Reinforcement Learning 63
On K-set consensun problems in asynchronous system 61
On the Data Expansion of the Huffman Compression Algorithm 60
How originality looks like. Integrating visualization and meta-heuristics to dissect music plagiarism 59
Probabilistic Visual Cryptography Schemes 57
Visual Cryptography: Models, Issues, Applications and New Directions 57
Performing tasks on restartable message-passing processors 56
Providing music service in Ambient Intelligence: experiments with gym users 56
The Conundrum of Success in Music: Playing it or Talking About it? 55
Reducing costs in HSM-based data centers 54
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols 54
An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering 54
Cheating Immune (2,n)-threshold Visual Secret Sharing 53
Colored Visual Cryptography without Color Darkening 53
On the redundancy and data expansion of Huffman codes 51
Graph embedding of music structures for machine learning approaches 51
An improved privacy attack on smartphones exploiting the accelerometer 49
Security and Cryptography for Networks 2010 49
Testing and reconfiguration of VLSI linear arrays 48
Optimal Colored Threshold Visual Cryptography Schemes 47
Coordinated cooperative task computing using crash-prone processors with unreliable multicast 46
Bounds and Protocols for Graph-Based Distributed Secret Sharing 44
On the equivalence of 2-threshold secret sharing schemes and prefix codes 43
Probabilistic secret sharing 43
Human-Machine Teaming in Music: Anchored narrative-graph Visualization and Machine Learning 41
Secret sharing schemes for infinite sets of participants: A new design technique 40
Musica Parlata: a methodology to teach music to blind people 35
Bounds and Algorithms for Alphabetic Codes and Binary Search Trees 34
Improved Protocols for Distributed Secret Sharing 33
Ultra-lightweight Authentication 33
Gossamer: weaknesses and performance 26
Visual Music Perception for Stochastic Music Composition 26
Efficient and reliable post-quantum authentication 25
Reducing costs in HSM-based data centers 25
Totale 9.631
Categoria #
all - tutte 32.309
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 32.309


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021665 0 64 63 9 72 26 67 13 138 13 69 131
2021/2022686 5 0 13 22 34 9 5 42 85 76 99 296
2022/2023965 98 100 20 127 104 198 13 85 123 10 64 23
2023/2024489 62 48 32 34 35 63 24 35 12 22 25 97
2024/20251.265 46 25 29 93 47 114 201 100 170 89 183 168
2025/20262.280 883 1.397 0 0 0 0 0 0 0 0 0 0
Totale 9.685