Sfoglia per Titolo
Se stiamo insieme ci sarà un perché: motivazioni e strategie alla base della creazione del Sistema Museale Lucchese
2022-01-01 Fino, Francesca; Tonga, Yesim; Pellegrini, Emanuele
Second grade modeling for the strain localization analysis of layered materials with damaging interfaces
2012-01-01 Bacigalupo, A.; Gambarotta, L.
Second-gradient homogenized model for wave propagation in heterogeneous periodic media
2014-01-01 Bacigalupo, A; Gambarotta, L
Second-order computational homogenization of heterogeneous materials with periodic microstructure
2010-01-01 Bacigalupo, A; Gambarotta, L
Second-order homogenization of periodic materials based on asymptotic approximation of the strain energy: formulation and validity limits
2014-01-01 Bacigalupo, A
Secure Service Composition with Symbolic Effects
2009-01-01 Costa, G; Degano, P; Martinelli, F
Secure Service Orchestration in Open Networks
2010-01-01 Costa, G; Degano, P; Martinelli, F
Securing android with local policies
2015-01-01 Costa, G.
Securing cultural heritage? Understanding the law for our monuments, artworks, and archives today
2021-01-01 Caponigri, Felicia; Casini, Lorenzo; Cassese, Sabino
Securing Hybrid Wireless Body Area Networks (HyWBAN): Advancements in Semantic Communications and Jamming Techniques
2024-01-01 Soderi, S.; Sarestoniemi, M.; Fuada, S.; Hamalainen, M.; Katz, M.; Iinatti, J.
Securing Interruptible Enclaved Execution on Small Microprocessors
2021-01-01 Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Mühlberg, Jan Tobias; Piessens, Frank
Securing IoT communications: at what cost?
2016-01-01 Bodei, Chiara; Galletta, Letterio
Securing Java with local policies
2008-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing Java with local policies
2009-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Securing the ``Bring Your Own Device'' Paradigm
2014-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Securing the “bring your own device” policy
2012-01-01 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Security in Body Networks: Watermark-Based Communications on Air-Gap Acoustic Channel
2020-01-01 Soderi, Simone
Security in Pervasive Applications: A Survey
2013-01-01 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio; Mezzett, Gianluca
Security Metrics at Work on the Things in IoT Systems
2020-01-01 Bodei, C.; Degano, P.; Ferrari, G. -L.; Galletta, L.
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario
2013-01-01 Soderi, S.; Viittala, H.; Saloranta, J.; Hamalainen, M.; Iinatti, J.; Gurtov, A.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile