Sfoglia per Serie LECTURE NOTES IN COMPUTER SCIENCE
Safe adaptation through implicit effect coercion
2015-01-01 Basile, Davide; Galletta, Letterio; Mezzetti, Gianluca
Securing android with local policies
2015-01-01 Costa, G.
Security Metrics at Work on the Things in IoT Systems
2020-01-01 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
Should Simplicity Be Always Preferred to Complexity in Supervised Machine Learning?
2020-01-01 Bargagli-Stoffi, Falco; Cevolani, Gustavo; Gnecco, Giorgio
A Systematic Approach to Programming and Verifying Attribute-Based Communication Systems
2019-01-01 De Nicola, R.; Duong, T.; Inverso, O.; Mazzanti, F.
A Systematic Investigation of DeFi Compositions in Ethereum
2023-01-01 Kitzler, S.; Victor, F.; Saggese, P.; Haslhofer, B.
Tight Error Analysis in Fixed-Point Arithmetic
2020-01-01 Simic, S.; Bemporad, A.; Inverso, O.; Tribastone, M.
Towards software performance by construction
2018-01-01 Tribastone, M.
Traffic jams detection using flock mining
2011-01-01 Ong, R.; Pinelli, F.; Trasarti, R.; Nanni, M.; Renso, C.; Rinzivillo, S.; Giannotti, F.
Transcompiling firewalls
2018-01-01 Bodei, Chiara; Degano, Pierpaolo; Focardi, Riccardo; Galletta, Letterio; Tempesta, Mauro
A True Concurrent Model of Smart Contracts Executions
2020-01-01 Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio
A Two-Country Study of Default Risk Prediction Using Bayesian Machine-Learning
2023-01-01 Incerti, Fabio; Bargagli-Stoffi, Falco J.; Riccaboni, Massimo
Using standard typing algorithms incrementally
2019-01-01 Busi, M.; Degano, P.; Galletta, L.
UTOPIC: Under-approximation through optimal control
2019-01-01 Doncel, J.; Gast, N.; Tribastone, M.; Tschaikowski, M.; Vandin, A.
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty
2021-01-01 Degano, P.; Galletta, L.; Gerali, S.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Safe adaptation through implicit effect coercion | 1-gen-2015 | Basile, Davide; Galletta, Letterio; Mezzetti, Gianluca | |
Securing android with local policies | 1-gen-2015 | Costa, G. | |
Security Metrics at Work on the Things in IoT Systems | 1-gen-2020 | Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L. | |
Should Simplicity Be Always Preferred to Complexity in Supervised Machine Learning? | 1-gen-2020 | Bargagli-Stoffi, Falco; Cevolani, Gustavo; Gnecco, Giorgio | |
A Systematic Approach to Programming and Verifying Attribute-Based Communication Systems | 1-gen-2019 | De Nicola, R.; Duong, T.; Inverso, O.; Mazzanti, F. | |
A Systematic Investigation of DeFi Compositions in Ethereum | 1-gen-2023 | Kitzler, S.; Victor, F.; Saggese, P.; Haslhofer, B. | |
Tight Error Analysis in Fixed-Point Arithmetic | 1-gen-2020 | Simic, S.; Bemporad, A.; Inverso, O.; Tribastone, M. | |
Towards software performance by construction | 1-gen-2018 | Tribastone, M. | |
Traffic jams detection using flock mining | 1-gen-2011 | Ong, R.; Pinelli, F.; Trasarti, R.; Nanni, M.; Renso, C.; Rinzivillo, S.; Giannotti, F. | |
Transcompiling firewalls | 1-gen-2018 | Bodei, Chiara; Degano, Pierpaolo; Focardi, Riccardo; Galletta, Letterio; Tempesta, Mauro | |
A True Concurrent Model of Smart Contracts Executions | 1-gen-2020 | Bartoletti, Massimo; Galletta, Letterio; Murgia, Maurizio | |
A Two-Country Study of Default Risk Prediction Using Bayesian Machine-Learning | 1-gen-2023 | Incerti, Fabio; Bargagli-Stoffi, Falco J.; Riccaboni, Massimo | |
Using standard typing algorithms incrementally | 1-gen-2019 | Busi, M.; Degano, P.; Galletta, L. | |
UTOPIC: Under-approximation through optimal control | 1-gen-2019 | Doncel, J.; Gast, N.; Tribastone, M.; Tschaikowski, M.; Vandin, A. | |
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty | 1-gen-2021 | Degano, P.; Galletta, L.; Gerali, S. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile