Sfoglia per Titolo

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 3.786 a 3.805 di 4.757
Titolo Data di pubblicazione Autore(i) File
Scoring rules in experimental procurement 1-gen-2024 Albano, Gian Luigi; Cipollone, Angela; Paolo, Roberto Di; Ponti, Giovanni; Sparro, Marco
Screening for C9ORF72 repeat expansion in FTLD 1-gen-2012 Ferrari, R; Mok, K; Moreno, Jh; Cosentino, S; Goldman, J; Pietrini, P; Mayeux, R; Tierney, Mc; Kapogiannis, D; Jicha, Ga; Murrell, Jr; Ghetti, B; Wassermann, Em; Grafman, J; Hardy, J; Huey, Ed; Momeni, P.
Se stiamo insieme ci sarà un perché: motivazioni e strategie alla base della creazione del Sistema Museale Lucchese 1-gen-2022 Fino, Francesca; Tonga, Yesim; Pellegrini, Emanuele
Second grade modeling for the strain localization analysis of layered materials with damaging interfaces 1-gen-2012 Bacigalupo, A.; Gambarotta, L.
Second-gradient homogenized model for wave propagation in heterogeneous periodic media 1-gen-2014 Bacigalupo, A; Gambarotta, L
Second-order computational homogenization of heterogeneous materials with periodic microstructure 1-gen-2010 Bacigalupo, A; Gambarotta, L
Second-order homogenization of periodic materials based on asymptotic approximation of the strain energy: formulation and validity limits 1-gen-2014 Bacigalupo, A
Secure Service Composition with Symbolic Effects 1-gen-2009 Costa, G; Degano, P; Martinelli, F
Secure Service Orchestration in Open Networks 1-gen-2010 Costa, G; Degano, P; Martinelli, F
Securing android with local policies 1-gen-2015 Costa, G.
Securing cultural heritage? Understanding the law for our monuments, artworks, and archives today 1-gen-2021 Caponigri, Felicia; Casini, Lorenzo; Cassese, Sabino
Securing Interruptible Enclaved Execution on Small Microprocessors 1-gen-2021 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank
Securing IoT communications: at what cost? 1-gen-2016 Bodei, Chiara; Galletta, Letterio
Securing Java with local policies 1-gen-2008 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing Java with local policies 1-gen-2009 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing the ``Bring Your Own Device'' Paradigm 1-gen-2014 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Securing the “bring your own device” policy 1-gen-2012 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel 1-gen-2020 Soderi, Simone
Security in Pervasive Applications: A Survey 1-gen-2013 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio; Mezzett, Gianluca
Security Metrics at Work on the Things in IoT Systems 1-gen-2020 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
Mostrati risultati da 3.786 a 3.805 di 4.757
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile