Fixed-Point Computation of Equilibria in Biochemical Regulatory Networks
2019 Pérez Verona, Isabel Cristina; Tribastone, M.; Tschaikowski, M.
UTOPIC: Under-approximation through optimal control
2019 Doncel, J.; Gast, N.; Tribastone, M.; Tschaikowski, M.; Vandin, A.
Size expansions of mean field approximation: Transient and steady-state analysis
2019 Gast, N.; Bortolussi, L.; Tribastone, M.
Towards software performance by construction
2018 Tribastone, M.
Guaranteed error bounds on approximate model abstractions through reachability analysis
2018 Cardelli, L.; Tribastone, M.; Tschaikowski, M.; Vandin, A.
Backward Invariance for Linear Differential Algebraic Equations
2019 Tognazzi, S.; Tribastone, M.; Tschaikowski, M.; Vandin, A.
PID Control of Biochemical Reaction Networks
2019 Whitby, M.; Cardelli, L.; Kwiatkowska, M.; Laurenti, L.; Tribastone, M.; Tschaikowski, M.
Combined Vertical and Horizontal Autoscaling Through Model Predictive Control
2018 Incerto, E.; Tribastone, M.; Trubiani, C.
Learning queuing networks by recurrent neural networks
2020 Garbi, G.; Incerto, E.; Tribastone, M.
A NERD DOGMA: Introducing CTF to Non-Expert Audience
2020 Costa, Gabriele; Lualdi, Martina; Ribaudo, Marina; Valenza, Andrea
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners
2020 Valenza, Andrea; Costa, Gabriele; Armando, Alessandro
When the Great King Encounters White Marble: A Material Perspective on Western Anatolia
2021 Poggio, Alessandro
NF-FF transformation for emissions and security
2014 Soderi, S.; Papini, M.; Iinatti, J.; Hamalainen, M.
Emulation of secure Wi-Fi communication: A performance gap analysis against a virtual test-bed
2013 Soderi, S.; Viittala, H.; Saloranta, J.; Mancini, A.; Hamalainen, M.; Iinatti, J.
Watermark-based secure communications in safety-related scenarios
2016 Soderi, S.; Mucchi, L.; Hamalainen, M.; Piva, A.; Iinatti, J.
Evaluation of WiFi for kart racing monitoring
2014 Viittala, H.; Hamalainen, M.; Iinatti, J.; Soderi, S.
Signal fingerprinting in cognitive wireless networks
2014 Soderi, S.; Dainelli, G.; Iinatti, J.; Hamalainen, M.
Performance and security evaluation of intra-vehicular communication architecture
2016 Liyanage, M.; Kumar, P.; Soderi, S.; Ylianttila, M.; Gurtov, A.
Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-Rate Sensor
2019 Soderi, S.
Enhancing security in 6G visible light communications
2020 Soderi, S.
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile
Scopri
Tipologia
- 4 Contributo in Atti di Convegno ...1116
Data di pubblicazione
- In corso di stampa2
- 2020 - 2025240
- 2010 - 2019565
- 2000 - 2009266
- 1990 - 199937
- 1988 - 19896
Editore
- IEEE104
- Springer56
- Institute of Electrical and Elect...34
- Elsevier33
- Association for Computing Machinery20
- Springer Verlag17
- IEEE Computer Society15
- EURAM11
- Springer Science and Business Med...10
- Association for Computing Machine...8
Rivista
- NEUROIMAGE25
- LECTURE NOTES IN COMPUTER SCIENCE17
- ELECTRONIC PROCEEDINGS IN THEORET...9
- LECTURE NOTES IN COMPUTER SCIENCE6
- SLEEP6
- ENERGY PROCEDIA5
- PROCEEDINGS OF THE IEEE CONFERENC...5
- CEUR WORKSHOP PROCEEDINGS4
- JOURNAL OF SLEEP RESEARCH4
- LECTURE NOTES IN APPLIED AND COMP...3
Serie
- LECTURE NOTES IN COMPUTER SCIENCE50
- IFAC-PAPERSONLINE22
- PROCEEDINGS OF THE IEEE CONFERENC...21
- PROCEEDINGS OF THE ... IEEE CONFE...11
- CEUR WORKSHOP PROCEEDINGS10
- EUROPEAN CONTROL CONFERENCE8
- LECTURE NOTES OF THE INSTITUTE FO...7
- COMMUNICATIONS IN COMPUTER AND IN...6
- PROCEEDINGS OF THE AMERICAN CONTR...6
- COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
- Games7
- security7
- Security6
- Uncertainty6
- Machine learning5
- Model predictive control5
- Nash equilibrium5
- Software5
- Boundary element method4
- Computer Science (all)4
Lingua
- eng807
- ita97
- und80
- por6
- spa4
- fre1
Accesso al fulltext
- no fulltext675
- reserved291
- open119
- partially open31