Modelli di diffusione della scultura in marmo tra VI e V sec. a.C.: la Licia
2010-01-01 Poggio, Alessandro
An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language
2011-01-01 Galletta, L.; Levi, G.
Causal-Consistent Reversibility in a Tuple-Based Language.
2015-01-01 E., Giachino; I., Lanese; Mezzina, C; F., Tiezzi
Enabling BYOD through secure meta-market
2014-01-01 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
A Two-Phase Static Analysis for Reliable Adaptation
2014-01-01 Degano, P.; Ferrari, G. L.; Galletta, L.
Multi-dimensional Secure Service Orchestration
2014-01-01 Costa, G.; Martinelli, F.; Yautsiukhin, A.
Lazy Security Controllers
2013-01-01 Caravagna, G.; Costa, G.; Pardini, G.
A Generalized Stochastic Knapsack Problem with Application in Call Admission Control
2011-01-01 Cello, M; Gnecco, G; Marchese, M; Sanguineti, M
Elective temporal logic
2011-01-01 Costa, G.; Matteucci, I.
Typing progress in communication-centred systems
2013-01-01 MENDES TORRES VIEIRA, H; Vasco Thudichum, Vasconcelos
Dynamic role authorization in multiparty conversations
2014-01-01 Silvia, Ghilezan; Svetlana, Jaksic; Jovanka, Pantovic; Jorge A., Pérez; MENDES TORRES VIEIRA, H
The cost of securing IoT communications
2016-01-01 Bodei, Chiara; Galletta, Letterio
Tracking sensitive and untrustworthy data in IoT
2017-01-01 Bodei, Chiara; Galletta, Letterio
Switching-based adaptive disturbance attenuation with guaranteed robust stability
2015-01-01 Battistelli, Giorgio; Selvi, Daniela; Tesi, Alberto
Space and time modulate faster visual detection in the profound deaf
2008-01-01 Bottari, D; Nava, E; Ley, P; Pavani, F
Intramodal and crossmodal refractory effects: Evidence from oscillatory brain activity
2012-01-01 Bottari, D; Rohlf, S; Hense, M; Habets, B; Roeder, B
Expressive Non-verbal Interaction in String Quartet
2013-01-01 Glowinski, D; Gnecco, G; Camurri, A; Piana, S
A Step Towards Checking Security in IoT
2016-01-01 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio
Representation and Identity in a State Museum: Haghia Sophia, Istanbul
2018-01-01 Tarhan, H; Tonga, Y; Catoni, MARIA LUISA
Opera in a Global World: Internationalization Practices in the Beijing National Centre for the Performing Arts
2015-01-01 Giordano, S; Tonga, Y
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Modelli di diffusione della scultura in marmo tra VI e V sec. a.C.: la Licia | 1-gen-2010 | Poggio, Alessandro | |
An Abstract Semantics for Inference of Types and Effects in a Multi-Tier Web Language | 1-gen-2011 | Galletta, L.; Levi, G. | |
Causal-Consistent Reversibility in a Tuple-Based Language. | 1-gen-2015 | E., Giachino; I., Lanese; Mezzina, C; F., Tiezzi | |
Enabling BYOD through secure meta-market | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
A Two-Phase Static Analysis for Reliable Adaptation | 1-gen-2014 | Degano, P.; Ferrari, G. L.; Galletta, L. | |
Multi-dimensional Secure Service Orchestration | 1-gen-2014 | Costa, G.; Martinelli, F.; Yautsiukhin, A. | |
Lazy Security Controllers | 1-gen-2013 | Caravagna, G.; Costa, G.; Pardini, G. | |
A Generalized Stochastic Knapsack Problem with Application in Call Admission Control | 1-gen-2011 | Cello, M; Gnecco, G; Marchese, M; Sanguineti, M | |
Elective temporal logic | 1-gen-2011 | Costa, G.; Matteucci, I. | |
Typing progress in communication-centred systems | 1-gen-2013 | MENDES TORRES VIEIRA, H; Vasco Thudichum, Vasconcelos | |
Dynamic role authorization in multiparty conversations | 1-gen-2014 | Silvia, Ghilezan; Svetlana, Jaksic; Jovanka, Pantovic; Jorge A., Pérez; MENDES TORRES VIEIRA, H | |
The cost of securing IoT communications | 1-gen-2016 | Bodei, Chiara; Galletta, Letterio | |
Tracking sensitive and untrustworthy data in IoT | 1-gen-2017 | Bodei, Chiara; Galletta, Letterio | |
Switching-based adaptive disturbance attenuation with guaranteed robust stability | 1-gen-2015 | Battistelli, Giorgio; Selvi, Daniela; Tesi, Alberto | |
Space and time modulate faster visual detection in the profound deaf | 1-gen-2008 | Bottari, D; Nava, E; Ley, P; Pavani, F | |
Intramodal and crossmodal refractory effects: Evidence from oscillatory brain activity | 1-gen-2012 | Bottari, D; Rohlf, S; Hense, M; Habets, B; Roeder, B | |
Expressive Non-verbal Interaction in String Quartet | 1-gen-2013 | Glowinski, D; Gnecco, G; Camurri, A; Piana, S | |
A Step Towards Checking Security in IoT | 1-gen-2016 | Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio | |
Representation and Identity in a State Museum: Haghia Sophia, Istanbul | 1-gen-2018 | Tarhan, H; Tonga, Y; Catoni, MARIA LUISA | |
Opera in a Global World: Internationalization Practices in the Beijing National Centre for the Performing Arts | 1-gen-2015 | Giordano, S; Tonga, Y |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile
Scopri
Tipologia
- 4 Contributo in Atti di Convegno ...1075
Data di pubblicazione
- In corso di stampa2
- 2020 - 2025203
- 2010 - 2019561
- 2000 - 2009266
- 1990 - 199937
- 1988 - 19896
Editore
- IEEE101
- Springer54
- Institute of Electrical and Elect...34
- Elsevier33
- Association for Computing Machinery18
- Springer Verlag17
- IEEE Computer Society14
- EURAM11
- CEUR-WS8
- Springer Science and Business Med...8
Rivista
- NEUROIMAGE25
- LECTURE NOTES IN COMPUTER SCIENCE17
- ELECTRONIC PROCEEDINGS IN THEORET...9
- LECTURE NOTES IN COMPUTER SCIENCE6
- SLEEP6
- ENERGY PROCEDIA5
- PROCEEDINGS OF THE IEEE CONFERENC...5
- CEUR WORKSHOP PROCEEDINGS4
- JOURNAL OF SLEEP RESEARCH4
- LECTURE NOTES IN APPLIED AND COMP...3
Serie
- LECTURE NOTES IN COMPUTER SCIENCE41
- IFAC-PAPERSONLINE22
- PROCEEDINGS OF THE IEEE CONFERENC...21
- PROCEEDINGS OF THE ... IEEE CONFE...11
- CEUR WORKSHOP PROCEEDINGS9
- EUROPEAN CONTROL CONFERENCE8
- LECTURE NOTES OF THE INSTITUTE FO...7
- COMMUNICATIONS IN COMPUTER AND IN...6
- PROCEEDINGS OF THE AMERICAN CONTR...6
- COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
- Games7
- security7
- Security6
- Uncertainty6
- Model predictive control5
- Nash equilibrium5
- Software5
- Boundary element method4
- Computer Science (all)4
- Electron tubes4
Lingua
- eng771
- ita94
- und80
- por6
- spa4
- fre1
Accesso al fulltext
- no fulltext675
- reserved268
- open104
- partially open28