DE PRISCO, Roberto
 Distribuzione geografica
Continente #
NA - Nord America 4.002
EU - Europa 1.250
AS - Asia 698
Continente sconosciuto - Info sul continente non disponibili 5
AF - Africa 4
SA - Sud America 3
OC - Oceania 2
Totale 5.964
Nazione #
US - Stati Uniti d'America 3.936
IT - Italia 514
CN - Cina 348
UA - Ucraina 299
SG - Singapore 125
IE - Irlanda 122
VN - Vietnam 110
DE - Germania 106
TR - Turchia 75
SE - Svezia 71
FI - Finlandia 66
CA - Canada 65
GB - Regno Unito 22
IN - India 11
PH - Filippine 10
FR - Francia 8
RU - Federazione Russa 8
CZ - Repubblica Ceca 6
NL - Olanda 6
EU - Europa 5
ES - Italia 4
TW - Taiwan 4
EG - Egitto 3
HR - Croazia 3
JP - Giappone 3
KR - Corea 3
RO - Romania 3
AT - Austria 2
BY - Bielorussia 2
CH - Svizzera 2
HK - Hong Kong 2
ID - Indonesia 2
MY - Malesia 2
NZ - Nuova Zelanda 2
AE - Emirati Arabi Uniti 1
CL - Cile 1
CM - Camerun 1
EC - Ecuador 1
GR - Grecia 1
IR - Iran 1
LU - Lussemburgo 1
MK - Macedonia 1
MX - Messico 1
NO - Norvegia 1
PE - Perù 1
PK - Pakistan 1
PL - Polonia 1
PT - Portogallo 1
Totale 5.964
Città #
Ann Arbor 1.123
Chandler 410
Jacksonville 373
Princeton 326
Wilmington 284
Woodbridge 262
Houston 239
Dublin 120
Salerno 118
Ashburn 112
Dong Ket 108
Nanjing 98
Andover 77
Beijing 76
Izmir 74
Singapore 73
Dearborn 57
Boardman 53
Ottawa 51
Pellezzano 48
Fairfield 33
Nanchang 30
Hebei 24
Mestre 22
Shenyang 20
Norwalk 19
Redwood City 15
Changsha 14
Jiaxing 14
Düsseldorf 13
Washington 12
Trento 11
Chicago 10
San Diego 10
Alzate Brianza 9
Dallas 9
Nocera Inferiore 9
Southend 9
Tianjin 9
Naples 8
Shanghai 8
Cambridge 7
Guangzhou 7
Montréal 7
Pune 7
Rome 7
Seattle 7
Silvi Marina 7
Wuhan 7
Brno 6
Des Moines 6
Los Angeles 6
Napoli 6
Battipaglia 5
Fisciano 5
Hefei 5
Sorrento 5
Avellino 4
Berlin 4
Hangzhou 4
Helsinki 4
Menlo Park 4
Pisa 4
Taipei 4
Taytay 4
Acerra 3
Basking Ridge 3
Cairo 3
Cologne 3
Horia 3
Jinan 3
Lappeenranta 3
Mugnano di Napoli 3
Ningbo 3
Nürnberg 3
Padova 3
Rotondi 3
Torino 3
Toronto 3
Zagreb 3
Afragola 2
Bera 2
Casale Monferrato 2
Casalnuovo Di Napoli 2
Cava de' Tirreni 2
Cesa 2
Como 2
Da Nang 2
Dragoni 2
Edinburgh 2
Galdo 2
Gothenburg 2
Granarolo 2
Groningen 2
Kuala Lumpur 2
Kunming 2
Laurel 2
London 2
Luzzano 2
Marano di Napoli 2
Totale 4.607
Nome #
Splicing music composition 181
Chorale Music Splicing System: An Algorithmic Music Composer Inspired by Molecular Splicing 153
A botnet-based command and control approach relying on swarm intelligence 137
Deterministic Truthful Mechanism for Scheduling on Selfish Machines 136
Security and Cryptography for Networks - 8th International Conference, SCN 2012 131
8th International Conference on Security and Cryptography for Networks, SCN 2012 115
Visualization of Music Plagiarism: Analysis and Evaluation 112
On designing truthful mechanisms for online scheduling 102
A Kind of Bio-inspired Learning of mUsic stylE 101
An Evolutionary Composer for Real-Time Background Music 97
How to Route and Tax Selfish Unsplittable Traffic 94
Secure Two-Party Computation: A Visual Way 92
A Bio-Inspired Approach to Infer Functional Rules and Aesthetic Goals from Music Genre Styles 91
Availability, usage and deployment characteristic of the Domain Name System 90
6th International Conference on Security and Cryptography for Networks, SCN 2008 89
Routing Selfish Unsplittable Traffic 88
New Constructions for Mechanisms with Verification 84
How to Forge a Digital Alibi on Mac OS X 83
Music Plagiarism at a glance: metrics of similarity and visualizations 83
EvoBassComposer: a multi-objective genetic algorithm for 4-voice compositions 83
A Differential Evolution Algorithm Assisted by ANFIS for Music Fingering 82
A dynamic view-oriented group communication service 81
Reti di calcolatori e Internet 81
Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes 81
Colored Visual Cryptography without Color Darkening 80
A Lightweight Approach to Authenticated Web Caching 80
The Power of Verification for One-Parameter Agents 80
A Neural Network for Bass Functional Harmonization 76
Color visual cryptography schemes for black and white secret images 76
Secure computation without computers 76
Evaluation study of Visualisations for Harmonic Analysis of 4-part Music 75
Using Colors to Improve Visual Cryptography for Black and White Images 74
Security and Cryptography in Networks - SCN 2006 73
Cheating Immune Threshold Visual Secret Sharing 71
Understanding the structure of musical compositions: Is visualization an effective approach? 71
Security and Cryptography for Networks, 6th International Conference 71
Do You Trust Your Phone? 70
An Evolutionary Music Composer Algorithm for Bass Harmonization 70
On the relation of random grid and deterministic visual cryptography 69
Visual Cryptography for Color Images 68
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography 68
On $k$-set consensus problems in asynchronous systems 67
Algorithmic problems in distributed systems 66
BAND: A mobile-based collaboration system for composing and playing music 65
A hybrid computational intelligence approach for automatic music composition 65
On Lower Bounds for the Redundancy of Optimal Codes 64
Certified Email: Design and Implementation of a New Optimistic Protocol 64
The power of verification for one-parameter agents 64
A Genetic Algorithm for Dodecaphonic Compositions 64
Optimal Colored Threshold Visual Cryptography Schemes 63
A methodology for estimating interdomain Web traffic demand 62
Revisiting the Paxos algorithm 61
A Dynamic primary configuration group communication service 60
A Customizable Recognizer for Orchestral Conducting Gestures Based on Neural Networks 59
Measure-independent characterization of contrast optimal visual cryptography schemes 58
On designing truthful Mechanisms for online scheduling 57
On K-set consensun problems in asynchronous system 57
Splicing-Inspired Recognition and Composition of Musical Collectives Styles 57
On the Data Expansion of the Huffman Compression Algorithm 54
Natural User Interfaces to Support and Enhance Real-Time Music Performance 54
Fuzzy vectorial-based similarity detection of Music Plagiarism 54
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA 53
Probabilistic Visual Cryptography Schemes 49
Visual Cryptography: Models, Issues, Applications and New Directions 48
Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols 48
Performing tasks on restartable message-passing processors 47
Cheating Immune (2,n)-threshold Visual Secret Sharing 47
On the redundancy and data expansion of Huffman codes 45
Testing and reconfiguration of VLSI linear arrays 45
Colored Visual Cryptography without Color Darkening 45
Reducing costs in HSM-based data centers 45
EvoComposer: An Evolutionary Algorithm for 4-voice Music Compositions 45
Probabilistic Visual Cryptography Schemes 44
A computational intelligence text-based detection system of music plagiarism 44
An efficient and reliable two-level lightweight authentication protocol 44
Security and Cryptography for Networks 2010 43
Providing music service in Ambient Intelligence: experiments with gym users 43
The Conundrum of Success in Music: Playing it or Talking About it? 41
Optimal Colored Threshold Visual Cryptography Schemes 40
Coordinated cooperative task computing using crash-prone processors with unreliable multicast 37
Induced Emotion-Based Music Recommendation through Reinforcement Learning 35
An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering 34
Probabilistic secret sharing 33
An improved privacy attack on smartphones exploiting the accelerometer 32
On the equivalence of 2-threshold secret sharing schemes and prefix codes 32
How originality looks like. Integrating visualization and meta-heuristics to dissect music plagiarism 31
Secret sharing schemes for infinite sets of participants: A new design technique 31
A multi-objective differential evolution algorithm for 4-voice compositions 27
Graph embedding of music structures for machine learning approaches 25
Ultra-lightweight Authentication 24
Musica Parlata: a methodology to teach music to blind people 22
Bounds and Protocols for Graph-Based Distributed Secret Sharing 22
Human-Machine Teaming in Music: Anchored narrative-graph Visualization and Machine Learning 21
Improved Protocols for Distributed Secret Sharing 18
Gossamer: weaknesses and performance 16
Reducing costs in HSM-based data centers 13
Text-independent voice recognition based on Siamese networks and fusion embeddings 11
Efficient and reliable post-quantum authentication 6
Totale 6.216
Categoria #
all - tutte 19.878
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 19.878


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020577 0 0 76 11 63 33 89 14 69 29 151 42
2020/2021677 12 64 63 9 72 26 67 13 138 13 69 131
2021/2022686 5 0 13 22 34 9 5 42 85 76 99 296
2022/2023965 98 100 20 127 104 198 13 85 123 10 64 23
2023/2024489 62 48 32 34 35 63 24 35 12 22 25 97
2024/202576 46 25 5 0 0 0 0 0 0 0 0 0
Totale 6.216