Home
Ricerca
Lista
Inserimento
Area Amministrazione
Modulo lista
Seleziona tipo di lista:
Tutti gli Istituti
cnr.iit
Tutti gli autori
Tutti gli anni
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
Tutti i soggetti
free
acm
msc
asfa
lc
ca
mesh
nal
pacs
cnr
Righe per pag.:
"100"
25
50
100
250
500
1000
ALL
IIT - Istituto di Informatica e Telematica (Pisa)
Selezione da: 1 a: 100
Documento accesso libero
Riservato
Protetto
cnr.iit/2016-A0-001
Bilateral Symmetry of Visual Function Loss in Cone-Rod Dystrophies
cnr.iit/2016-A0-002
The car as an ambient sensing platform
cnr.iit/2016-A0-003
Usage Control on Cloud Systems
cnr.iit/2016-A0-004
Impromptu crisis mapping to prioritize emergency response
cnr.iit/2016-A0-005
Stateful Data Usage Control for Android Mobile Devices
cnr.iit/2016-A0-006
In-silico prediction and deep-DNA sequencing validation indicate phase variation in 115 Neisseria meningitidis genes
cnr.iit/2016-A0-007
Protein complex prediction for large protein protein interaction networks with the Core&Peel
cnr.iit/2016-A0-008
Bioinspired Security Analysis of Wireless Protocols
cnr.iit/2016-A0-009
Information diffusion in distributed OSN: The impact of trusted relationships
cnr.iit/2016-A0-010
Multidimensional range queries on hierarchical Voronoi overlays
cnr.iit/2016-A0-011
Design and evaluation of a cognitive approach for disseminating semantic knowledge and content in opportunistic networks
cnr.iit/2016-A0-012
People-centric computing and communications in smart cities
cnr.iit/2016-A0-013
Ego Network Structure in Online Social Networks and its Impact on Information Diffusion
cnr.iit/2016-A0-014
Risk analysis of Android applications: A user-centric solution
cnr.iit/2016-A0-015
A personalized recommender system for pervasive social networks
cnr.iit/2016-A0-016
Predictability or Early Warning: Using Social Media in Modern Emergency Response
cnr.iit/2016-A0-017
Facebook: a New Tool for Collecting Health Data?
cnr.iit/2016-A0-018
Angela R.: a familial Alzheimer's disease case in the days of Auguste D.
cnr.iit/2016-A0-019
Enhanced copy number variants detection from whole-exome sequencing data using EXCAVATOR2
cnr.iit/2016-A0-020
IEEE 802.11p VANets: Experimental Evaluation of Packet Inter-Reception Time
cnr.iit/2016-A0-021
Accurate and Efficient Modeling of 802.15.4 Unslotted CSMA/CA through Event Chains Computation
cnr.iit/2016-A0-022
A framework for detecting unfolding emergencies using humans as sensors
cnr.iit/2016-A0-023
Next generation IEEE 802.11 Wireless Local Area Networks: Current status, future directions and open challenges
cnr.iit/2016-A0-024
Analyzing visually impaired people's touch gestures on smartphones
cnr.iit/2016-A0-025
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks
cnr.iit/2016-A0-026
Madam: Effective and efficient behavior-based android malware detection and prevention
cnr.iit/2016-A0-027
DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection
cnr.iit/2016-A0-028
Online Social Networks
cnr.iit/2016-A0-029
Editorial: repetitive Structures in Biological Sequences: algorithms and applications
cnr.iit/2016-A0-030
Internet of Things: Research challenges and Solutions
cnr.iit/2016-A0-031
Special Section on Challenged Networks
cnr.iit/2016-A0-032
Editorial 2016
cnr.iit/2016-A1-001
Repetitive Structures in Biological Sequences: Algorithms and Applications
cnr.iit/2016-A2-001
Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach
cnr.iit/2016-A2-002
Google web searches and Wikipedia results: a measurement study.
cnr.iit/2016-A2-003
Spotting the diffusion of New Psychoactive Substances over the Internet
cnr.iit/2016-A2-004
On the Abstraction of a Categorical Clustering Algorithm
cnr.iit/2016-A2-005
Security by insurance for services
cnr.iit/2016-A2-006
Privacy-preserving Data Allocation in Decentralized Online Social Networks
cnr.iit/2016-A2-007
Interference-aware Time-Based Fairness for Multihop Wireless Networks
cnr.iit/2016-A2-008
A Machine-Learned Ranking Algorithm for Dynamic and Personalised Car Pooling Services
cnr.iit/2016-A2-009
MIB at SemEval-2016 Task 4a: Exploiting lexicon-based features for sentiment analysis in Twitter
cnr.iit/2016-A2-010
Mobile edge clouds for Information-Centric IoT services
cnr.iit/2016-A2-011
Hypothesis Transfer Learning for Efficient Data Computing in Smart Cities Environments
cnr.iit/2016-A2-012
The Italian origins of FAO and Paul Otlet
cnr.iit/2016-A2-013
Internetopoli: an app to discover the Internet
cnr.iit/2016-A2-014
A Survey over Low-Level Security Issues in Heavy Duty Vehicles
cnr.iit/2016-A2-015
Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers
cnr.iit/2016-A2-016
Text Encoder and Annotator: an all-in-one editor for transcribing and annotating manuscripts with RDF
cnr.iit/2016-A2-017
Characterising demand and usage patterns in a large station-based car sharing system
cnr.iit/2016-A2-018
Accuracy vs. traffic trade-off of Learning IoT Data Patterns at the Edge with Hypothesis Transfer Learning
cnr.iit/2016-A2-019
An holistic approach for high-level programming of next-generation data-intensive applications targeting distributed heterogeneous computing environment
cnr.iit/2016-A2-020
Distributed Coverage of Ego networks in F2F Online Social Networks
cnr.iit/2016-A2-021
LoSeRO: A Locality Sensitive Routing Protocol in Opportunistic Networks
cnr.iit/2016-A2-022
A Generic Software Framework for Car-Sharing Modelling based on a Large-Scale Multi-Agent Traffic Simulation Platform
cnr.iit/2016-A2-023
LVS: A WiFi-based system to tackle Location Spoofing in location-based services
cnr.iit/2016-A2-024
Demo: Here&Now ? Data-centric local social interactions through opportunistic networks
cnr.iit/2016-A2-025
Text Encoder and Annotator: an all-in-one editor for transcribing and annotating manuscripts with RDF (Extended Version)
cnr.iit/2016-A2-026
Optimal Deployment of Stations for a Car Sharing System with Stochastic Demands: a Queueing Theoretical Perspective
cnr.iit/2016-A2-027
A Lifecycle for Data Sharing Agreements: How it works out
cnr.iit/2016-A2-028
Exploiting Vehicles' Reputation to Mitigate DoS Attack.
cnr.iit/2016-A2-029
Experimental measures of news personalization in Google News
cnr.iit/2016-A2-030
Semi-supervised knowledge extraction for detection of drugs and their effects
cnr.iit/2016-A2-031
PLIERS: a popularity-based recommender system for content dissemination in online social networks
cnr.iit/2016-A2-032
Let's Bit!: alla scoperta di Internet con la peer education
cnr.iit/2016-A2-033
Towards a Usage Control based Video Surveillance Framework
cnr.iit/2016-A2-034
Can data mining help car sharing?
cnr.iit/2016-A2-035
Automated adaptation via quantitative partial model checking.
cnr.iit/2016-A2-036
Analysis of Co-Authorship Ego Networks
cnr.iit/2016-A2-037
A matter of words: NLP for quality evaluation of Wikipedia medical articles
cnr.iit/2016-A2-038
Enforcement of U-XACML History-Based Usage Control Policy
cnr.iit/2016-A2-039
Decomposing Global Quantitative Properties into Local Ones.
cnr.iit/2016-A2-040
Experimental set-up of DC PEV charging station supported by open and interoperable communication technologies
cnr.iit/2016-A2-041
Enhancing Android Permission through Usage Control: A BYOD Use-Case
cnr.iit/2016-A2-042
A proposed evolution for the Italian certified electronic mail system
cnr.iit/2016-A2-043
Stereo Visualisation of Historical Aerial Photos - an Useful and Important Aerial Archeology Research Tool
cnr.iit/2016-A2-044
Logical Key Hierarchy for Groups Management in Distributed Online Social Network
cnr.iit/2016-A2-045
Privacy-aware Data Sharing in a Tree-based Categorical Clustering Algorithm
cnr.iit/2016-A2-046
Online User Behavioural Modeling with Applications to Price Steering
cnr.iit/2016-A2-047
Correlating Languages and Sentiment Analysis on the basis of Text-based Reviews
cnr.iit/2016-A2-048
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes
cnr.iit/2016-A2-049
Practical Privacy Preserving Medical Diagnosis using Homomorphic Encryption
cnr.iit/2016-A2-050
Data-Sluice: Fine-grained traffic control for Android application
cnr.iit/2016-A2-051
Learning games for the cognitively impaired people
cnr.iit/2016-A2-052
A Formal and Run-time Framework for the Adaptation of Local Behaviours to Match a Global Property
cnr.iit/2016-A2-053
A multi-criteria ranking of security countermeasures.
cnr.iit/2016-A2-054
On Probabilistic Application Compliance
cnr.iit/2016-A2-055
Self-optimising Decentralised Service Placement in Heterogeneous Cloud Federation
cnr.iit/2016-A6-001
Towards an Automated Analysis of the Online Supply Chain of Novel Psychoactive Substances
cnr.iit/2016-A6-002
When Traditional Ontologies are not Enough: Modelling and Visualizing Dynamic Ontologies in Semantic-Based Access to Texts
cnr.iit/2016-A6-003
Introduction to ReSA4CI 2016.
cnr.iit/2016-A6-004
Optimal charging of electric vehicle fleets for a car sharing system with power sharing
cnr.iit/2016-A6-005
MobCCN: a CCN-compliant protocol for data collection with opportunistic contacts in IoT environments
cnr.iit/2016-A6-006
The Impact of Regulated Electric Fleets on the Power Grid: the Car Sharing Case
cnr.iit/2016-B0-001
A novel security information and event management system for enhancing cyber security in a hydroelectric dam.
cnr.iit/2016-B0-002
Il thesaurus come banca di dati e la sua tutela
cnr.iit/2016-B0-003
Liste di autorità per l?indicizzazione e la conservazione digitale dell?archivio del CNUCE e della CGI
cnr.iit/2016-B0-004
Discovering miRNA regulatory networks in Holt-Oram Syndrome using a Zebrafish model
cnr.iit/2016-B0-005
Social Sensing. Dalla rete agli utenti e ritorno
cnr.iit/2016-B0-006
Social fingerprinting - or the truth About you