Sfoglia per Titolo

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 3.859 a 3.878 di 4.849
Titolo Data di pubblicazione Autore(i) File
A Screening Role of Enforcement Institutions 1-gen-2016 Huremovic, Kenan
Se stiamo insieme ci sarà un perché: motivazioni e strategie alla base della creazione del Sistema Museale Lucchese 1-gen-2022 Fino, Francesca; Tonga, Yesim; Pellegrini, Emanuele
Second grade modeling for the strain localization analysis of layered materials with damaging interfaces 1-gen-2012 Bacigalupo, A.; Gambarotta, L.
Second-gradient homogenized model for wave propagation in heterogeneous periodic media 1-gen-2014 Bacigalupo, A; Gambarotta, L
Second-order computational homogenization of heterogeneous materials with periodic microstructure 1-gen-2010 Bacigalupo, A; Gambarotta, L
Second-order homogenization of periodic materials based on asymptotic approximation of the strain energy: formulation and validity limits 1-gen-2014 Bacigalupo, A
Secure Service Composition with Symbolic Effects 1-gen-2009 Costa, G; Degano, P; Martinelli, F
Secure Service Orchestration in Open Networks 1-gen-2010 Costa, G; Degano, P; Martinelli, F
Securing android with local policies 1-gen-2015 Costa, G.
Securing cultural heritage? Understanding the law for our monuments, artworks, and archives today 1-gen-2021 Caponigri, Felicia; Casini, Lorenzo; Cassese, Sabino
Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques 1-gen-2024 Soderi, S.; Sarestoniemi, M.; Fuada, S.; Hamalainen, M.; Katz, M.; Iinatti, J.
Securing Interruptible Enclaved Execution on Small Microprocessors 1-gen-2021 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank
Securing IoT communications: at what cost? 1-gen-2016 Bodei, Chiara; Galletta, Letterio
Securing Java with local policies 1-gen-2008 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing Java with local policies 1-gen-2009 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing the ``Bring Your Own Device'' Paradigm 1-gen-2014 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Securing the “bring your own device” policy 1-gen-2012 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel 1-gen-2020 Soderi, Simone
Security in Pervasive Applications: A Survey 1-gen-2013 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio; Mezzett, Gianluca
Security Metrics at Work on the Things in IoT Systems 1-gen-2020 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
Mostrati risultati da 3.859 a 3.878 di 4.849
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile