4.1 Contributo in Atti di convegno: [1116] Home page tipologia

Sfoglia
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 341 a 360 di 1.116
Titolo Data di pubblicazione Autore(i) File
Fixed-Point Computation of Equilibria in Biochemical Regulatory Networks 1-gen-2019 Pérez Verona, Isabel Cristina; Tribastone, M.; Tschaikowski, M.
UTOPIC: Under-approximation through optimal control 1-gen-2019 Doncel, J.; Gast, N.; Tribastone, M.; Tschaikowski, M.; Vandin, A.
Size expansions of mean field approximation: Transient and steady-state analysis 1-gen-2019 Gast, N.; Bortolussi, L.; Tribastone, M.
Towards software performance by construction 1-gen-2018 Tribastone, M.
Guaranteed error bounds on approximate model abstractions through reachability analysis 1-gen-2018 Cardelli, L.; Tribastone, M.; Tschaikowski, M.; Vandin, A.
Backward Invariance for Linear Differential Algebraic Equations 1-gen-2019 Tognazzi, S.; Tribastone, M.; Tschaikowski, M.; Vandin, A.
PID Control of Biochemical Reaction Networks 1-gen-2019 Whitby, M.; Cardelli, L.; Kwiatkowska, M.; Laurenti, L.; Tribastone, M.; Tschaikowski, M.
Combined Vertical and Horizontal Autoscaling Through Model Predictive Control 1-gen-2018 Incerto, E.; Tribastone, M.; Trubiani, C.
Learning queuing networks by recurrent neural networks 1-gen-2020 Garbi, G.; Incerto, E.; Tribastone, M.
A NERD DOGMA: Introducing CTF to Non-Expert Audience 1-gen-2020 Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners 1-gen-2020 Valenza, Andrea; Costa, Gabriele; Armando, Alessandro
When the Great King Encounters White Marble: A Material Perspective on Western Anatolia 1-gen-2021 Poggio, Alessandro
NF-FF transformation for emissions and security 1-gen-2014 Soderi, S.; Papini, M.; Iinatti, J.; Hamalainen, M.
Emulation of secure Wi-Fi communication: A performance gap analysis against a virtual test-bed 1-gen-2013 Soderi, S.; Viittala, H.; Saloranta, J.; Mancini, A.; Hamalainen, M.; Iinatti, J.
Watermark-based secure communications in safety-related scenarios 1-gen-2016 Soderi, S.; Mucchi, L.; Hamalainen, M.; Piva, A.; Iinatti, J.
Evaluation of WiFi for kart racing monitoring 1-gen-2014 Viittala, H.; Hamalainen, M.; Iinatti, J.; Soderi, S.
Signal fingerprinting in cognitive wireless networks 1-gen-2014 Soderi, S.; Dainelli, G.; Iinatti, J.; Hamalainen, M.
Performance and security evaluation of intra-vehicular communication architecture 1-gen-2016 Liyanage, M.; Kumar, P.; Soderi, S.; Ylianttila, M.; Gurtov, A.
Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-Rate Sensor 1-gen-2019 Soderi, S.
Enhancing security in 6G visible light communications 1-gen-2020 Soderi, S.
Prodotti della tipologia (ordinati per Data di deposito in Decrescente ordine): 341 a 360 di 1.116
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile

Scopri
Tipologia
  • 4 Contributo in Atti di Convegno ...1116
Autore
  • BEMPORAD, ALBERTO224
  • PIETRINI, PIETRO92
  • RICCIARDI, EMILIANO82
  • TRIBASTONE, MIRCO75
  • PAGGI, MARCO66
  • GALLETTA, LETTERIO47
  • Zanon, Mario46
  • Marzi, Giacomo41
  • Bernardi, Giulio36
  • GNECCO, GIORGIO STEFANO33
Data di pubblicazione
  • In corso di stampa2
  • 2020 - 2025240
  • 2010 - 2019565
  • 2000 - 2009266
  • 1990 - 199937
  • 1988 - 19896
Editore
  • IEEE104
  • Springer56
  • Institute of Electrical and Elect...34
  • Elsevier33
  • Association for Computing Machinery20
  • Springer Verlag17
  • IEEE Computer Society15
  • EURAM11
  • Springer Science and Business Med...10
  • Association for Computing Machine...8
Rivista
  • NEUROIMAGE25
  • LECTURE NOTES IN COMPUTER SCIENCE17
  • ELECTRONIC PROCEEDINGS IN THEORET...9
  • LECTURE NOTES IN COMPUTER SCIENCE6
  • SLEEP6
  • ENERGY PROCEDIA5
  • PROCEEDINGS OF THE IEEE CONFERENC...5
  • CEUR WORKSHOP PROCEEDINGS4
  • JOURNAL OF SLEEP RESEARCH4
  • LECTURE NOTES IN APPLIED AND COMP...3
Serie
  • LECTURE NOTES IN COMPUTER SCIENCE50
  • IFAC-PAPERSONLINE22
  • PROCEEDINGS OF THE IEEE CONFERENC...21
  • PROCEEDINGS OF THE ... IEEE CONFE...11
  • CEUR WORKSHOP PROCEEDINGS10
  • EUROPEAN CONTROL CONFERENCE8
  • LECTURE NOTES OF THE INSTITUTE FO...7
  • COMMUNICATIONS IN COMPUTER AND IN...6
  • PROCEEDINGS OF THE AMERICAN CONTR...6
  • COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
  • Games7
  • security7
  • Security6
  • Uncertainty6
  • Machine learning5
  • Model predictive control5
  • Nash equilibrium5
  • Software5
  • Boundary element method4
  • Computer Science (all)4
Lingua
  • eng807
  • ita97
  • und80
  • por6
  • spa4
  • fre1
Accesso al fulltext
  • no fulltext675
  • reserved291
  • open119
  • partially open31