Sfoglia per Titolo
Scoring rules in experimental procurement
2024-01-01 Albano, Gian Luigi; Cipollone, Angela; Paolo, Roberto Di; Ponti, Giovanni; Sparro, Marco
Screening for C9ORF72 repeat expansion in FTLD
2012-01-01 Ferrari, R; Mok, K; Moreno, Jh; Cosentino, S; Goldman, J; Pietrini, P; Mayeux, R; Tierney, Mc; Kapogiannis, D; Jicha, Ga; Murrell, Jr; Ghetti, B; Wassermann, Em; Grafman, J; Hardy, J; Huey, Ed; Momeni, P.
Se stiamo insieme ci sarà un perché: motivazioni e strategie alla base della creazione del Sistema Museale Lucchese
2022-01-01 Fino, Francesca; Tonga, Yesim; Pellegrini, Emanuele
Second grade modeling for the strain localization analysis of layered materials with damaging interfaces
2012-01-01 Bacigalupo, A.; Gambarotta, L.
Second-gradient homogenized model for wave propagation in heterogeneous periodic media
2014-01-01 Bacigalupo, A; Gambarotta, L
Second-order computational homogenization of heterogeneous materials with periodic microstructure
2010-01-01 Bacigalupo, A; Gambarotta, L
Second-order homogenization of periodic materials based on asymptotic approximation of the strain energy: formulation and validity limits
2014-01-01 Bacigalupo, A
Secure Service Composition with Symbolic Effects
2009-01-01 Costa, G; Degano, P; Martinelli, F
Secure Service Orchestration in Open Networks
2010-01-01 Costa, G; Degano, P; Martinelli, F
Securing android with local policies
2015-01-01 Costa, G.
Securing cultural heritage? Understanding the law for our monuments, artworks, and archives today
2021-01-01 Caponigri, Felicia; Casini, Lorenzo; Cassese, Sabino
Securing Interruptible Enclaved Execution on Small Microprocessors
2021-01-01 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank
Securing IoT communications: at what cost?
2016-01-01 Bodei, Chiara; Galletta, Letterio
Securing Java with local policies
2008-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing Java with local policies
2009-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing the ``Bring Your Own Device'' Paradigm
2014-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Securing the “bring your own device” policy
2012-01-01 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel
2020-01-01 Soderi, Simone
Security in Pervasive Applications: A Survey
2013-01-01 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio; Mezzett, Gianluca
Security Metrics at Work on the Things in IoT Systems
2020-01-01 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Scoring rules in experimental procurement | 1-gen-2024 | Albano, Gian Luigi; Cipollone, Angela; Paolo, Roberto Di; Ponti, Giovanni; Sparro, Marco | |
Screening for C9ORF72 repeat expansion in FTLD | 1-gen-2012 | Ferrari, R; Mok, K; Moreno, Jh; Cosentino, S; Goldman, J; Pietrini, P; Mayeux, R; Tierney, Mc; Kapogiannis, D; Jicha, Ga; Murrell, Jr; Ghetti, B; Wassermann, Em; Grafman, J; Hardy, J; Huey, Ed; Momeni, P. | |
Se stiamo insieme ci sarà un perché: motivazioni e strategie alla base della creazione del Sistema Museale Lucchese | 1-gen-2022 | Fino, Francesca; Tonga, Yesim; Pellegrini, Emanuele | |
Second grade modeling for the strain localization analysis of layered materials with damaging interfaces | 1-gen-2012 | Bacigalupo, A.; Gambarotta, L. | |
Second-gradient homogenized model for wave propagation in heterogeneous periodic media | 1-gen-2014 | Bacigalupo, A; Gambarotta, L | |
Second-order computational homogenization of heterogeneous materials with periodic microstructure | 1-gen-2010 | Bacigalupo, A; Gambarotta, L | |
Second-order homogenization of periodic materials based on asymptotic approximation of the strain energy: formulation and validity limits | 1-gen-2014 | Bacigalupo, A | |
Secure Service Composition with Symbolic Effects | 1-gen-2009 | Costa, G; Degano, P; Martinelli, F | |
Secure Service Orchestration in Open Networks | 1-gen-2010 | Costa, G; Degano, P; Martinelli, F | |
Securing android with local policies | 1-gen-2015 | Costa, G. | |
Securing cultural heritage? Understanding the law for our monuments, artworks, and archives today | 1-gen-2021 | Caponigri, Felicia; Casini, Lorenzo; Cassese, Sabino | |
Securing Interruptible Enclaved Execution on Small Microprocessors | 1-gen-2021 | Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank | |
Securing IoT communications: at what cost? | 1-gen-2016 | Bodei, Chiara; Galletta, Letterio | |
Securing Java with local policies | 1-gen-2008 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
Securing Java with local policies | 1-gen-2009 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
Securing the ``Bring Your Own Device'' Paradigm | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Securing the “bring your own device” policy | 1-gen-2012 | Armando, A.; Costa, G.; Merlo, A.; Verderame, L. | |
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel | 1-gen-2020 | Soderi, Simone | |
Security in Pervasive Applications: A Survey | 1-gen-2013 | Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio; Mezzett, Gianluca | |
Security Metrics at Work on the Things in IoT Systems | 1-gen-2020 | Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile