Sfoglia per Titolo
Second-order homogenization of periodic materials based on asymptotic approximation of the strain energy: formulation and validity limits
2014-01-01 Bacigalupo, A
Secure Service Composition with Symbolic Effects
2009-01-01 Costa, G; Degano, P; Martinelli, F
Secure Service Orchestration in Open Networks
2010-01-01 Costa, G; Degano, P; Martinelli, F
Securing android with local policies
2015-01-01 Costa, G.
Securing cultural heritage? Understanding the law for our monuments, artworks, and archives today
2021-01-01 Caponigri, Felicia; Casini, Lorenzo; Cassese, Sabino
Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques
2024-01-01 Soderi, S.; Sarestoniemi, M.; Fuada, S.; Hamalainen, M.; Katz, M.; Iinatti, J.
Securing Interruptible Enclaved Execution on Small Microprocessors
2021-01-01 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank
Securing IoT communications: at what cost?
2016-01-01 Bodei, Chiara; Galletta, Letterio
Securing Java with local policies
2009-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing Java with local policies
2008-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing the ``Bring Your Own Device'' Paradigm
2014-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Securing the “bring your own device” policy
2012-01-01 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel
2020-01-01 Soderi, Simone
Security in Pervasive Applications: A Survey
2013-01-01 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio; Mezzett, Gianluca
Security Metrics at Work on the Things in IoT Systems
2020-01-01 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario
2013-01-01 Soderi, S.; Viittala, H.; Saloranta, J.; Hamalainen, M.; Iinatti, J.; Gurtov, A.
Seeing among foliage with LiDAR and machine learning: towards a transferable archaeological pipeline
2022-01-01 Mazzacca, G.; Grilli, E.; Cirigliano, G. P.; Remondino, F.; Campana, S.
Seeing with one's hands: Supramodal cortical organization of perception in the human brain revealed by fMRI
2002-01-01 Pietrini, P; Furey, Ml; Ricciardi, E; Gobbini, Mi; Guazzelli, M; Haxby, Jv
Segesta, aree del bouleuterion e della Stoa meridionale dell’agora (SAS 3; 2002-2005)
2003-01-01 Facella, Antonino; Olivito, Riccardo
Segesta. Agora. Area della Stoa Nord (SAS 4; 2014-2015)
2016-01-01 Olivito, Riccardo; Serra, Alfonsa
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Second-order homogenization of periodic materials based on asymptotic approximation of the strain energy: formulation and validity limits | 1-gen-2014 | Bacigalupo, A | |
Secure Service Composition with Symbolic Effects | 1-gen-2009 | Costa, G; Degano, P; Martinelli, F | |
Secure Service Orchestration in Open Networks | 1-gen-2010 | Costa, G; Degano, P; Martinelli, F | |
Securing android with local policies | 1-gen-2015 | Costa, G. | |
Securing cultural heritage? Understanding the law for our monuments, artworks, and archives today | 1-gen-2021 | Caponigri, Felicia; Casini, Lorenzo; Cassese, Sabino | |
Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques | 1-gen-2024 | Soderi, S.; Sarestoniemi, M.; Fuada, S.; Hamalainen, M.; Katz, M.; Iinatti, J. | |
Securing Interruptible Enclaved Execution on Small Microprocessors | 1-gen-2021 | Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank | |
Securing IoT communications: at what cost? | 1-gen-2016 | Bodei, Chiara; Galletta, Letterio | |
Securing Java with local policies | 1-gen-2009 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
Securing Java with local policies | 1-gen-2008 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
Securing the ``Bring Your Own Device'' Paradigm | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Securing the “bring your own device” policy | 1-gen-2012 | Armando, A.; Costa, G.; Merlo, A.; Verderame, L. | |
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel | 1-gen-2020 | Soderi, Simone | |
Security in Pervasive Applications: A Survey | 1-gen-2013 | Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio; Mezzett, Gianluca | |
Security Metrics at Work on the Things in IoT Systems | 1-gen-2020 | Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L. | |
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario | 1-gen-2013 | Soderi, S.; Viittala, H.; Saloranta, J.; Hamalainen, M.; Iinatti, J.; Gurtov, A. | |
Seeing among foliage with LiDAR and machine learning: towards a transferable archaeological pipeline | 1-gen-2022 | Mazzacca, G.; Grilli, E.; Cirigliano, G. P.; Remondino, F.; Campana, S. | |
Seeing with one's hands: Supramodal cortical organization of perception in the human brain revealed by fMRI | 1-gen-2002 | Pietrini, P; Furey, Ml; Ricciardi, E; Gobbini, Mi; Guazzelli, M; Haxby, Jv | |
Segesta, aree del bouleuterion e della Stoa meridionale dell’agora (SAS 3; 2002-2005) | 1-gen-2003 | Facella, Antonino; Olivito, Riccardo | |
Segesta. Agora. Area della Stoa Nord (SAS 4; 2014-2015) | 1-gen-2016 | Olivito, Riccardo; Serra, Alfonsa |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile