Sfoglia per Serie  

Opzioni
Vai a: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Mostrati risultati da 36 a 55 di 62
Titolo Data di pubblicazione Autore(i) File
Partially directed animals with a bounded number of holes 1-gen-2021 Massazza, Paolo; Dorigatti, Valentina
Policies for Composed Emergencies in Support of Disaster Management 1-gen-2012 Carminati, Barbara; Ferrari, Elena; Guglielmi, Michele
PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation 1-gen-2022 Son, Hx; Carminati, B; Ferrari, E
Privacy-aware Collaborative Access Control in Web-based Social Networks 1-gen-2008 Carminati, Barbara; Ferrari, Elena
Probabilistic Congruence for Generative Semistochastic Processes 1-gen-2005 Lanotte, Ruggero; Tini, Simone
Processing private queries over an obfuscated database using hidden vector encryption 1-gen-2014 Trombetta, Alberto; Persiano, Giuseppe; Braghin, Stefano
Program Abstraction in a Higher-Order Logic Framework 1-gen-1998 Benini, Marco; Kalvala, S.; Nowotka, D.
Proof-Search in Natural Deduction Calculus for Classical Propositional Logic 1-gen-2015 Ferrari, Mauro; Fiorentini, Camillo
A Proposal for Simplified Model-Based Cost Estimation Models 1-gen-2012 Del Bianco, V.; Lavazza, LUIGI ANTONIO; Morasca, Sandro
Refinements of Orthopairs and IUML-algebras 1-gen-2016 Aguzzoli, Stefano; Boffa, Stefania; Ciucci, Davide; Gerla, Brunella
Requirements Engineering Meets Physiotherapy: An Experience with Motion-Based Games 1-gen-2013 Liliana, Pasquale; Spoletini, Paola; Dario, Pometto; Francesco, Blasi; Tiziana, Redaelli
Rule Formats for Non Interference 1-gen-2003 Tini, Simone
Schur complement matrix and its (elementwise) approximation: a spectral analysis based on GLT sequences 1-gen-2015 Dorostkar, A.; Neytcheva, M.; SERRA CAPIZZANO, Stefano
A second-order Perceptron algorithm 1-gen-2002 Cesa Bianchi, N.; Conconi, A.; Gentile, Claudio
Semantic Analysis of Gossip Protocols for Wireless Sensor Networks 1-gen-2011 Lanotte, Ruggero; Merro, M.
Sequences of orthopairs given by refinements of coverings 1-gen-2017 Gerla, Brunella; Boffa, Stefania
Specifying Access Control Policies on Data Streams 1-gen-2007 Carminati, Barbara; Ferrari, Elena; K. L., Tan
Stark: A Software Tool for the Analysis of Robustness in the unKnown Environment 1-gen-2023 Castiglioni, Valentina; Loreti, Michele; Tini, Simone
State-based firewall for industrial protocols with critical-state prediction monitor 1-gen-2011 Nai Fovino, I.; Carcano, A.; Coletta, A.; Guglielmi, M.; Masera, M.; Trombetta, A.
Taylor Approximation for Hybrid Systems 1-gen-2005 Lanotte, Ruggero; Tini, Simone
Mostrati risultati da 36 a 55 di 62
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile