PUMA

Modulo lista

Seleziona tipo di lista:


 

 

 

 

 


Righe per pag.:

 

IIT - Istituto di Informatica e Telematica (Pisa)


Selezione da: 1 a: 100   Icona documento Documento accesso libero  Icona documentoRiservato  Icona documentoProtetto

        

Icona documento cnr.iit/2016-A0-001 Bilateral Symmetry of Visual Function Loss in Cone-Rod Dystrophies
Icona documento cnr.iit/2016-A0-002 The car as an ambient sensing platform
Icona documento cnr.iit/2016-A0-003 Usage Control on Cloud Systems
Icona documento cnr.iit/2016-A0-004 Impromptu crisis mapping to prioritize emergency response
Icona documento cnr.iit/2016-A0-005 Stateful Data Usage Control for Android Mobile Devices
Icona documento cnr.iit/2016-A0-006 In-silico prediction and deep-DNA sequencing validation indicate phase variation in 115 Neisseria meningitidis genes
Icona documento cnr.iit/2016-A0-007 Protein complex prediction for large protein protein interaction networks with the Core&Peel
Icona documento cnr.iit/2016-A0-008 Bioinspired Security Analysis of Wireless Protocols
Icona documento cnr.iit/2016-A0-009 Information diffusion in distributed OSN: The impact of trusted relationships
Icona documento cnr.iit/2016-A0-010 Multidimensional range queries on hierarchical Voronoi overlays
Icona documento cnr.iit/2016-A0-011 Design and evaluation of a cognitive approach for disseminating semantic knowledge and content in opportunistic networks
Icona documento cnr.iit/2016-A0-012 People-centric computing and communications in smart cities
Icona documento cnr.iit/2016-A0-013 Ego Network Structure in Online Social Networks and its Impact on Information Diffusion
Icona documento cnr.iit/2016-A0-014 Risk analysis of Android applications: A user-centric solution
Icona documento cnr.iit/2016-A0-015 A personalized recommender system for pervasive social networks
Icona documento cnr.iit/2016-A0-016 Predictability or Early Warning: Using Social Media in Modern Emergency Response
Icona documento cnr.iit/2016-A0-017 Facebook: a New Tool for Collecting Health Data?
Icona documento cnr.iit/2016-A0-018 Angela R.: a familial Alzheimer's disease case in the days of Auguste D.
Icona documento cnr.iit/2016-A0-019 Enhanced copy number variants detection from whole-exome sequencing data using EXCAVATOR2
Icona documento cnr.iit/2016-A0-020 IEEE 802.11p VANets: Experimental Evaluation of Packet Inter-Reception Time
Icona documento cnr.iit/2016-A0-021 Accurate and Efficient Modeling of 802.15.4 Unslotted CSMA/CA through Event Chains Computation
Icona documento cnr.iit/2016-A0-022 A framework for detecting unfolding emergencies using humans as sensors
Icona documento cnr.iit/2016-A0-023 Next generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions and open challenges
Icona documento cnr.iit/2016-A0-024 Analyzing visually impaired people's touch gestures on smartphones
Icona documento cnr.iit/2016-A0-025 Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks
Icona documento cnr.iit/2016-A0-026 Madam: Effective and efficient behavior-based android malware detection and prevention
Icona documento cnr.iit/2016-A0-027 DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection
Icona documento cnr.iit/2016-A0-028 Online Social Networks
Icona documento cnr.iit/2016-A0-029 Editorial: repetitive Structures in Biological Sequences: algorithms and applications
Icona documento cnr.iit/2016-A0-030 Internet of Things: Research challenges and Solutions
Icona documento cnr.iit/2016-A0-031 Special Section on Challenged Networks
Icona documento cnr.iit/2016-A0-032 Editorial 2016
cnr.iit/2016-A1-001 Repetitive Structures in Biological Sequences: Algorithms and Applications
Icona documento cnr.iit/2016-A2-001 Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach
Icona documento cnr.iit/2016-A2-002 Google web searches and Wikipedia results: a measurement study.
Icona documento cnr.iit/2016-A2-003 Spotting the diffusion of New Psychoactive Substances over the Internet
Icona documento cnr.iit/2016-A2-004 On the Abstraction of a Categorical Clustering Algorithm
Icona documento cnr.iit/2016-A2-005 Security by insurance for services
Icona documento cnr.iit/2016-A2-006 Privacy-preserving Data Allocation in Decentralized Online Social Networks
Icona documento cnr.iit/2016-A2-007 Interference-aware Time-Based Fairness for Multihop Wireless Networks
Icona documento cnr.iit/2016-A2-008 A Machine-Learned Ranking Algorithm for Dynamic and Personalised Car Pooling Services
Icona documento cnr.iit/2016-A2-009 MIB at SemEval-2016 Task 4a: Exploiting lexicon-based features for sentiment analysis in Twitter
Icona documento cnr.iit/2016-A2-010 Mobile edge clouds for Information-Centric IoT services
Icona documento cnr.iit/2016-A2-011 Hypothesis Transfer Learning for Efficient Data Computing in Smart Cities Environments
Icona documento cnr.iit/2016-A2-012 The Italian origins of FAO and Paul Otlet
Icona documento cnr.iit/2016-A2-013 Internetopoli: an app to discover the Internet
Icona documento cnr.iit/2016-A2-014 A Survey over Low-Level Security Issues in Heavy Duty Vehicles
Icona documento cnr.iit/2016-A2-015 Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers
Icona documento cnr.iit/2016-A2-016 Text Encoder and Annotator: an all-in-one editor for transcribing and annotating manuscripts with RDF
Icona documento cnr.iit/2016-A2-017 Characterising demand and usage patterns in a large station-based car sharing system
Icona documento cnr.iit/2016-A2-018 Accuracy vs. traffic trade-off of Learning IoT Data Patterns at the Edge with Hypothesis Transfer Learning
Icona documento cnr.iit/2016-A2-019 An holistic approach for high-level programming of next-generation data-intensive applications targeting distributed heterogeneous computing environment
Icona documento cnr.iit/2016-A2-020 Distributed Coverage of Ego networks in F2F Online Social Networks
Icona documento cnr.iit/2016-A2-021 LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks
Icona documento cnr.iit/2016-A2-022 A Generic Software Framework for Car-Sharing Modelling based on a Large-Scale Multi-Agent Traffic Simulation Platform
Icona documento cnr.iit/2016-A2-023 LVS: A WiFi-based system to tackle Location Spoofing in location-based services
Icona documento cnr.iit/2016-A2-024 Demo: Here&Now ? Data-centric local social interactions through opportunistic networks
Icona documento cnr.iit/2016-A2-025 Text Encoder and Annotator: an all-in-one editor for transcribing and annotating manuscripts with RDF (Extended Version)
Icona documento cnr.iit/2016-A2-026 Optimal Deployment of Stations for a Car Sharing System with Stochastic Demands: a Queueing Theoretical Perspective
Icona documento cnr.iit/2016-A2-027 A Lifecycle for Data Sharing Agreements: How it works out
Icona documento cnr.iit/2016-A2-028 Exploiting Vehicles' Reputation to Mitigate DoS Attack.
Icona documento cnr.iit/2016-A2-029 Experimental measures of news personalization in Google News
Icona documento cnr.iit/2016-A2-030 Semi-supervised knowledge extraction for detection of drugs and their effects
Icona documento cnr.iit/2016-A2-031 PLIERS: a popularity-based recommender system for content dissemination in online social networks
Icona documento cnr.iit/2016-A2-032 Let's Bit!: alla scoperta di Internet con la peer education
Icona documento cnr.iit/2016-A2-033 Towards a Usage Control based Video Surveillance Framework
Icona documento cnr.iit/2016-A2-034 Can data mining help car sharing?
Icona documento cnr.iit/2016-A2-035 Automated adaptation via quantitative partial model checking.
Icona documento cnr.iit/2016-A2-036 Analysis of Co-Authorship Ego Networks
Icona documento cnr.iit/2016-A2-037 A matter of words: NLP for quality evaluation of Wikipedia medical articles
Icona documento cnr.iit/2016-A2-038 Enforcement of U-XACML History-Based Usage Control Policy
Icona documento cnr.iit/2016-A2-039 Decomposing Global Quantitative Properties into Local Ones.
Icona documento cnr.iit/2016-A2-040 Experimental set-up of DC PEV charging station supported by open and interoperable communication technologies
Icona documento cnr.iit/2016-A2-041 Enhancing Android Permission through Usage Control: A BYOD Use-Case
Icona documento cnr.iit/2016-A2-042 A proposed evolution for the Italian certified electronic mail system
Icona documento cnr.iit/2016-A2-043 Stereo Visualisation of Historical Aerial Photos - an Useful and Important Aerial Archeology Research Tool
Icona documento cnr.iit/2016-A2-044 Logical Key Hierarchy for Groups Management in Distributed Online Social Network
Icona documento cnr.iit/2016-A2-045 Privacy-aware Data Sharing in a Tree-based Categorical Clustering Algorithm
Icona documento cnr.iit/2016-A2-046 Online User Behavioural Modeling with Applications to Price Steering
Icona documento cnr.iit/2016-A2-047 Correlating Languages and Sentiment Analysis on the basis of Text-based Reviews
Icona documento cnr.iit/2016-A2-048 MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes
Icona documento cnr.iit/2016-A2-049 Practical Privacy Preserving Medical Diagnosis using Homomorphic Encryption
Icona documento cnr.iit/2016-A2-050 Data-Sluice: Fine-grained traffic control for Android application
Icona documento cnr.iit/2016-A2-051 Learning games for the cognitively impaired people
Icona documento cnr.iit/2016-A2-052 A Formal and Run-time Framework for the Adaptation of Local Behaviours to Match a Global Property
Icona documento cnr.iit/2016-A2-053 A multi-criteria ranking of security countermeasures.
Icona documento cnr.iit/2016-A2-054 On Probabilistic Application Compliance
Icona documento cnr.iit/2016-A2-055 Self-optimising Decentralised Service Placement in Heterogeneous Cloud Federation
Icona documento cnr.iit/2016-A6-001 Towards an Automated Analysis of the Online Supply Chain of Novel Psychoactive Substances
Icona documento cnr.iit/2016-A6-002 When Traditional Ontologies are not Enough: Modelling and Visualizing Dynamic Ontologies in Semantic-Based Access to Texts
Icona documento cnr.iit/2016-A6-003 Introduction to ReSA4CI 2016.
Icona documento cnr.iit/2016-A6-004 Optimal charging of electric vehicle fleets for a car sharing system with power sharing
Icona documento cnr.iit/2016-A6-005 MobCCN: a CCN-compliant protocol for data collection with opportunistic contacts in IoT environments
Icona documento cnr.iit/2016-A6-006 The Impact of Regulated Electric Fleets on the Power Grid: the Car Sharing Case
Icona documento cnr.iit/2016-B0-001 A novel security information and event management system for enhancing cyber security in a hydroelectric dam.
Icona documento cnr.iit/2016-B0-002 Il thesaurus come banca di dati e la sua tutela
Icona documento cnr.iit/2016-B0-003 Liste di autorità per l?indicizzazione e la conservazione digitale dell?archivio del CNUCE e della CGI
Icona documento cnr.iit/2016-B0-004 Discovering miRNA regulatory networks in Holt-Oram Syndrome using a Zebrafish model
Icona documento cnr.iit/2016-B0-005 Social Sensing. Dalla rete agli utenti e ritorno
Icona documento cnr.iit/2016-B0-006 Social fingerprinting - or the truth About you