Lazy Security Controllers
2013 Caravagna, G.; Costa, G.; Pardini, G.
A Generalized Stochastic Knapsack Problem with Application in Call Admission Control
2011 Cello, M; Gnecco, G; Marchese, M; Sanguineti, M
Elective temporal logic
2011 Costa, G.; Matteucci, I.
Typing progress in communication-centred systems
2013 MENDES TORRES VIEIRA, H; Vasco Thudichum, Vasconcelos
Dynamic role authorization in multiparty conversations
2014 Silvia, Ghilezan; Svetlana, Jaksic; Jovanka, Pantovic; Jorge A., Pérez; MENDES TORRES VIEIRA, H
Tracking sensitive and untrustworthy data in IoT
2017 Bodei, Chiara; Galletta, Letterio
The cost of securing IoT communications
2016 Bodei, Chiara; Galletta, Letterio
Switching-based adaptive disturbance attenuation with guaranteed robust stability
2015 Battistelli, Giorgio; Selvi, Daniela; Tesi, Alberto
Intramodal and crossmodal refractory effects: Evidence from oscillatory brain activity
2012 Bottari, D; Rohlf, S; Hense, M; Habets, B; Roeder, B
Space and time modulate faster visual detection in the profound deaf
2008 Bottari, D; Nava, E; Ley, P; Pavani, F
A Step Towards Checking Security in IoT
2016 Bodei, Chiara; Degano, Pierpaolo; Ferrari, Gian-Luigi; Galletta, Letterio
Expressive Non-verbal Interaction in String Quartet
2013 Glowinski, D; Gnecco, G; Camurri, A; Piana, S
Representation and Identity in a State Museum: Haghia Sophia, Istanbul
2018 Tarhan, H; Tonga, Y; Catoni, MARIA LUISA
Opera in a Global World: Internationalization Practices in the Beijing National Centre for the Performing Arts
2015 Giordano, S; Tonga, Y
Challenges for Cultural Tourism: Conservation and Sustainable Development
2012 Matiz Lopez, P J; Tonga, Y
On-the-Fly Adaptation of Dynamic Service-Based Systems: Incrementality, Reduction and Reuse
2013 Bucchiarone, A.; Marconi, A.; Mezzina, C; Pistore, M.; Raik, H.
Strong authentication for e-banking: A survey on european regulations and implementations
2017 Sinigaglia, F; Carbone, R; Costa, G
Causal-Consistent Reversible Debugging
2014 Giachino, E; Lanese, I; Mezzina, C
PolEnA: Enforcing fine-grained permission policies in android
2017 Costa, G; Sinigaglia, F; Carbone, R
Concurrent Flexible Reversibility
2013 Lanese, I; Lienhardt, M; Mezzina, C; Schmitt, A; Stefani, J-B
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile
Scopri
Tipologia
- 4 Contributo in Atti di Convegno ...1129
Data di pubblicazione
- In corso di stampa2
- 2020 - 2025251
- 2010 - 2019567
- 2000 - 2009266
- 1990 - 199937
- 1988 - 19896
Editore
- IEEE104
- Springer57
- Institute of Electrical and Elect...34
- Elsevier33
- Association for Computing Machinery20
- Springer Verlag17
- IEEE Computer Society15
- EURAM11
- Springer Science and Business Med...10
- Association for Computing Machine...8
Rivista
- NEUROIMAGE25
- LECTURE NOTES IN COMPUTER SCIENCE17
- ELECTRONIC PROCEEDINGS IN THEORET...9
- LECTURE NOTES IN COMPUTER SCIENCE6
- SLEEP6
- ENERGY PROCEDIA5
- PROCEEDINGS OF THE IEEE CONFERENC...5
- CEUR WORKSHOP PROCEEDINGS4
- JOURNAL OF SLEEP RESEARCH4
- LECTURE NOTES IN APPLIED AND COMP...3
Serie
- LECTURE NOTES IN COMPUTER SCIENCE50
- IFAC-PAPERSONLINE22
- PROCEEDINGS OF THE IEEE CONFERENC...21
- CEUR WORKSHOP PROCEEDINGS12
- PROCEEDINGS OF THE ... IEEE CONFE...11
- EUROPEAN CONTROL CONFERENCE8
- LECTURE NOTES OF THE INSTITUTE FO...7
- COMMUNICATIONS IN COMPUTER AND IN...6
- PROCEEDINGS OF THE AMERICAN CONTR...6
- COMPUTER-AIDED CHEMICAL ENGINEERING5
Keyword
- Games7
- security7
- Machine learning6
- Security6
- Uncertainty6
- Model predictive control5
- Nash equilibrium5
- Optimization5
- Software5
- Boundary element method4
Lingua
- eng818
- ita99
- und80
- por6
- spa4
- fre1
Accesso al fulltext
- no fulltext677
- reserved297
- open123
- partially open32