Nome |
# |
A mobile application for assessment of air pollution exposure, file e3ad8916-ae2f-da0e-e053-3705fe0a2b96
|
394
|
Twitter Analysis for Real-Time Malware Discovery, file e3ad891d-12bb-da0e-e053-3705fe0a2b96
|
289
|
Smart assistance for students and people living in a campus, file e3ad8920-62ff-da0e-e053-3705fe0a2b96
|
288
|
A Logical Architecture for Active Network Management, file e3ad8915-c128-da0e-e053-3705fe0a2b96
|
275
|
Assisted labeling for spam account detection on twitter, file e3ad8920-9953-da0e-e053-3705fe0a2b96
|
225
|
An Ambient Intelligence System for Assisted Living, file e3ad891d-1b9d-da0e-e053-3705fe0a2b96
|
176
|
A Smart Assistant for Visual Recognition of Painted Scenes, file e3ad8927-2117-da0e-e053-3705fe0a2b96
|
161
|
Simulation and Test of UAV Tasks with Resource-Constrained Hardware in the Loop, file e3ad8927-44b5-da0e-e053-3705fe0a2b96
|
116
|
SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications, file e3ad8922-a83e-da0e-e053-3705fe0a2b96
|
109
|
A Behavior-Based Intrusion Detection System Using Ensemble Learning Techniques, file 342ffb51-84fd-47b9-a5eb-ae8bd10b60be
|
96
|
Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices, file e3ad8924-5d7e-da0e-e053-3705fe0a2b96
|
88
|
Testing wearable IoT applications through sensor virtualization, file e3ad8923-b691-da0e-e053-3705fe0a2b96
|
82
|
A multi‐agent system for itinerary suggestion in smart environments, file e3ad8927-783a-da0e-e053-3705fe0a2b96
|
69
|
A wireless sensor network for vineyard management in Sicily (Italy), file e3ad8916-b11a-da0e-e053-3705fe0a2b96
|
64
|
Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: a DES instance, file 6bd6d23d-ac12-40c1-abc1-7d832d79d9f3
|
55
|
Gaining insight by structural knowledge extraction, file e3ad891a-9be8-da0e-e053-3705fe0a2b96
|
55
|
SecureBallot: A secure open source e-Voting system, file bcb13557-1e69-4c61-8161-53f5c3d910f6
|
51
|
Uno Smart Campus per UniPA, file e3ad891d-c22a-da0e-e053-3705fe0a2b96
|
46
|
Secure random number generation in wireless sensor networks, file e3ad8926-98df-da0e-e053-3705fe0a2b96
|
37
|
Gaining insight by structural knowledge extraction, file e3ad891a-5d87-da0e-e053-3705fe0a2b96
|
34
|
A mobile application for assessment of air pollution exposure, file e3ad8916-ae2e-da0e-e053-3705fe0a2b96
|
30
|
SpADe: Multi-Stage Spam Account Detection for Online Social Networks, file f709ab60-b173-4d4b-a808-66c20d96c0dd
|
30
|
Uno Smart Campus per UniPA, file e3ad891e-25e9-da0e-e053-3705fe0a2b96
|
28
|
Distributed Symbolic Network Quality Assessment for Resource-constrained Devices, file e3ad8927-84ba-da0e-e053-3705fe0a2b96
|
28
|
Modeling and Verification of Symbolic Distributed Applications through an Intelligent Monitoring Agent, file 7cb9614f-0c4e-4c53-acee-5ec8ab6be4d9
|
25
|
Secure e-Voting in Smart Communities, file e3ad8921-bdac-da0e-e053-3705fe0a2b96
|
20
|
An Integrated Architecture for Surveillance and Monitoring in an Archaeological Site, file e3ad8915-c5b1-da0e-e053-3705fe0a2b96
|
19
|
Time-Constrained Node Visit Planning for Collaborative UAV–WSN Distributed Applications, file 95418883-9ada-422c-a2ba-93c9fff83d77
|
18
|
A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices, file 62a75627-b60b-470e-862d-8bdf7a79e555
|
17
|
A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems, file e3ad8927-0c67-da0e-e053-3705fe0a2b96
|
17
|
SecureBallot: A secure open source e-Voting system, file e3ad8927-4bd9-da0e-e053-3705fe0a2b96
|
15
|
Vulnerability evaluation of distributed reputation management systems, file e3ad891b-1afb-da0e-e053-3705fe0a2b96
|
14
|
WSN Design and Verification Using On-Board Executable Specifications, file e3ad891e-e3a9-da0e-e053-3705fe0a2b96
|
12
|
DC4CD: A Platform for Distributed Computing on Constrained Devices, file e3ad891b-a3ea-da0e-e053-3705fe0a2b96
|
11
|
IncentMe: Effective Mechanism Design to Stimulate Crowdsensing Participants with Uncertain Mobility, file e3ad891d-b0d8-da0e-e053-3705fe0a2b96
|
10
|
A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices, file e3ad891f-06e7-da0e-e053-3705fe0a2b96
|
10
|
A simulation framework for evaluating distributed reputation management systems, file e3ad8919-e6b4-da0e-e053-3705fe0a2b96
|
9
|
Malware detection through low-level features and stacked denoising autoencoders, file e3ad891c-8e46-da0e-e053-3705fe0a2b96
|
9
|
Secure e-Voting in Smart Communities, file e3ad8921-e96e-da0e-e053-3705fe0a2b96
|
9
|
A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems, file e3ad8926-df0e-da0e-e053-3705fe0a2b96
|
9
|
A fog-based hybrid intelligent system for energy saving in smart buildings, file c6be13d5-f155-4e53-aa89-4851cc541441
|
8
|
Kromos: Ontology based information management for ICT societies, file e3ad8919-9e0b-da0e-e053-3705fe0a2b96
|
8
|
Twitter spam account detection by effective labeling, file e3ad891e-b1e7-da0e-e053-3705fe0a2b96
|
8
|
A Platform for the Evaluation of Distributed Reputation Algorithms, file e3ad891f-032f-da0e-e053-3705fe0a2b96
|
8
|
A fog-assisted system to defend against Sybils in vehicular crowdsourcing, file e3ad8928-e026-da0e-e053-3705fe0a2b96
|
8
|
Real-Time Detection of Twitter Social Events from the User's Perspective, file e3ad8918-3e20-da0e-e053-3705fe0a2b96
|
7
|
FIRST: A Framework for Optimizing Information Quality in Mobile Crowdsensing Systems, file e3ad891e-ac2e-da0e-e053-3705fe0a2b96
|
7
|
Towards a smart campus through participatory sensing, file e3ad8926-c32b-da0e-e053-3705fe0a2b96
|
7
|
Parallel Genetic Algorithms for the Tuning of a Fuzzy AQM Controller, file e3ad8917-7c90-da0e-e053-3705fe0a2b96
|
6
|
A context-aware system for ambient assisted living, file e3ad891b-eec5-da0e-e053-3705fe0a2b96
|
6
|
A hybrid system for malware detection on big data, file e3ad891d-7ac7-da0e-e053-3705fe0a2b96
|
6
|
Distributed Symbolic Network Quality Assessment for Resource-constrained Devices, file e3ad8927-ddea-da0e-e053-3705fe0a2b96
|
6
|
Use of ICT to support epidemiological surveillance on a community of university students during SARS-CoV-2 phase 3 pandemic, file e3ad8927-f822-da0e-e053-3705fe0a2b96
|
6
|
SpADe: Multi-Stage Spam Account Detection for Online Social Networks, file 70daff9f-e8aa-415d-bf33-36fb0bdbe8e1
|
5
|
A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems, file dcb035a4-4db8-444d-8662-002c983654c3
|
5
|
User Activity Recognition for Energy Saving in Smart Homes, file e3ad8918-a435-da0e-e053-3705fe0a2b96
|
5
|
A Decisional Multi-Agent Framework for Automatic Supply Chain Arrangement, file e3ad8919-7ec9-da0e-e053-3705fe0a2b96
|
5
|
Monitoring Wireless Sensor Networks through Logical Deductive Processes, file e3ad891a-09c8-da0e-e053-3705fe0a2b96
|
5
|
A framework for parallel assessment of reputation management systems, file e3ad891a-4043-da0e-e053-3705fe0a2b96
|
5
|
A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices, file e3ad891e-d35d-da0e-e053-3705fe0a2b96
|
5
|
DRESS: A Distributed RMS Evaluation Simulation Software, file e3ad8922-3a9f-da0e-e053-3705fe0a2b96
|
5
|
An Adaptive Bayesian System for Context-Aware Data Fusion in Smart Environments, file e3ad8925-e683-da0e-e053-3705fe0a2b96
|
5
|
A fog-based hybrid intelligent system for energy saving in smart buildings, file e3ad8926-1f44-da0e-e053-3705fe0a2b96
|
5
|
Secure random number generation in wireless sensor networks, file e3ad8926-2e55-da0e-e053-3705fe0a2b96
|
5
|
BLIND: A privacy preserving truth discovery system for mobile crowdsensing, file 459feec5-87a0-4277-bb89-440ad801f87c
|
4
|
A Fuzzy Approach for the Network Congestion Problem, file e3ad8917-48af-da0e-e053-3705fe0a2b96
|
4
|
Distributed algorithms for multicast tree construction, file e3ad8917-4dbc-da0e-e053-3705fe0a2b96
|
4
|
Distributed Intelligent Management of Active Networks, file e3ad8917-5408-da0e-e053-3705fe0a2b96
|
4
|
Real-Time Detection of Twitter Social Events from the User's Perspective, file e3ad8918-45ee-da0e-e053-3705fe0a2b96
|
4
|
Monitoring High-Quality Wine Production using Wireless Sensor Networks, file e3ad8919-ce8e-da0e-e053-3705fe0a2b96
|
4
|
Monitoring Wireless Sensor Networks through Logical Deductive Processes, file e3ad891a-09c7-da0e-e053-3705fe0a2b96
|
4
|
Context-awareness for multi-sensor data fusion in smart environments, file e3ad891a-4e88-da0e-e053-3705fe0a2b96
|
4
|
Your friends mention It. What about visiting it? A mobile social-based sightseeing application, file e3ad891a-5601-da0e-e053-3705fe0a2b96
|
4
|
A symbolic distributed event detection scheme for Wireless Sensor Networks, file e3ad891a-5621-da0e-e053-3705fe0a2b96
|
4
|
A context-aware system for ambient assisted living, file e3ad891b-8b4c-da0e-e053-3705fe0a2b96
|
4
|
Smartphone data analysis for human activity recognition, file e3ad891b-c17c-da0e-e053-3705fe0a2b96
|
4
|
An Ambient Intelligence System for Assisted Living, file e3ad891d-1b9e-da0e-e053-3705fe0a2b96
|
4
|
Twitter spam account detection by effective labeling, file e3ad891e-e3b8-da0e-e053-3705fe0a2b96
|
4
|
DRESS: A Distributed RMS Evaluation Simulation Software, file e3ad8922-3afb-da0e-e053-3705fe0a2b96
|
4
|
A Behavior-Based Intrusion Detection System Using Ensemble Learning Techniques, file 95cd8ae3-e78b-4267-93bc-68f7632a6e89
|
3
|
Adversarial Machine Learning in e-Health: Attacking a Smart Prescription System, file ba11f740-925c-4e77-8531-55e94e955f80
|
3
|
Anomaly Detection for Reoccurring Concept Drift in Smart Environments, file bd9df5d1-9378-4bfc-9e0e-88b1708a7774
|
3
|
AN INNOVATIVE SYSTEM FOR VINEYARD MANAGEMENT IN SICILY, file de64bd92-2bfd-42ed-998b-60396be946ca
|
3
|
Multi-sensor Fusion through Adaptive Bayesian Networks, file e3ad8915-e6d6-da0e-e053-3705fe0a2b96
|
3
|
A Methodology for Graphical Modeling of Business Rules, file e3ad8915-eef3-da0e-e053-3705fe0a2b96
|
3
|
Probabilistic Anomaly Detection for Wireless Sensor Networks, file e3ad8916-2f21-da0e-e053-3705fe0a2b96
|
3
|
QoS-Aware Fault Detection in Wireless Sensor Networks, file e3ad8916-abff-da0e-e053-3705fe0a2b96
|
3
|
Understanding the Environment through Wireless Sensor Networks, file e3ad8917-4e12-da0e-e053-3705fe0a2b96
|
3
|
Understanding the Environment through Wireless Sensor Networks, file e3ad8917-4e13-da0e-e053-3705fe0a2b96
|
3
|
Distributed Intelligent Management of Active Networks, file e3ad8917-5407-da0e-e053-3705fe0a2b96
|
3
|
A TRNG Exploiting Multi-Source Physical Data, file e3ad8917-cf16-da0e-e053-3705fe0a2b96
|
3
|
Programming Distributed Applications with Symbolic Reasoning on WSNs, file e3ad8918-3e18-da0e-e053-3705fe0a2b96
|
3
|
SmartBuildings: An AmI system for energy efficiency, file e3ad8918-45eb-da0e-e053-3705fe0a2b96
|
3
|
A Dynamic Distributed Algorithm for Multicast Path Setup, file e3ad8919-670b-da0e-e053-3705fe0a2b96
|
3
|
A Knowledge Management System using Bayesian Network, file e3ad8919-b3b6-da0e-e053-3705fe0a2b96
|
3
|
A Genetic Algorithm for the Design of a Fuzzy Controller for Active Queue Management, file e3ad8919-c899-da0e-e053-3705fe0a2b96
|
3
|
Human Activity Recognition Process Using 3-D Posture Data, file e3ad891a-05b1-da0e-e053-3705fe0a2b96
|
3
|
Your friends mention It. What about visiting it? A mobile social-based sightseeing application, file e3ad891a-8797-da0e-e053-3705fe0a2b96
|
3
|
Smartphone data analysis for human activity recognition, file e3ad891b-eec6-da0e-e053-3705fe0a2b96
|
3
|
Interoperable real-time symbolic programming for smart environments, file e3ad891f-856e-da0e-e053-3705fe0a2b96
|
3
|
Totale |
3.319 |