Ernesto Damiani
Orcid: 0000-0002-9557-6496Affiliations:
- University of Milan, Italy
According to our database1,
Ernesto Damiani
authored at least 632 papers
between 1992 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Hardening behavioral classifiers against polymorphic malware: An ensemble approach based on minority report.
Inf. Sci., 2025
2024
IEEE Internet Things J., November, 2024
IEEE Trans. Netw. Serv. Manag., August, 2024
Integrated Terrestrial-Wired and LEO Satellite With Offline Bidirectional Cooperation for 6G IoT Networks.
IEEE Internet Things J., May, 2024
IEEE Trans. Ind. Informatics, April, 2024
SN Comput. Sci., April, 2024
Internet Things, April, 2024
Int. J. Inf. Sec., April, 2024
IEEE Consumer Electron. Mag., March, 2024
Veh. Commun., 2024
Reconfigurable Intelligent Surface-Assisted Routing for Power-Constrained IoT Networks.
IEEE Open J. Commun. Soc., 2024
J. Netw. Comput. Appl., 2024
Blockchain and NFT-based traceability and certification for UAV parts in manufacturing.
J. Ind. Inf. Integr., 2024
Enhancing security in X-ray baggage scans: A contour-driven learning approach for abnormality classification and instance segmentation.
Eng. Appl. Artif. Intell., 2024
CoRR, 2024
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols.
Ad Hoc Networks, 2024
IEEE Access, 2024
Secure Relay Selection With Outdated CSI in Cooperative Wireless Vehicular Networks: A DQN Approach.
IEEE Access, 2024
Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024
Proceedings of the Advanced Information Networking and Applications, 2024
Proceedings of the IEEE International Conference on Software Services Engineering, 2024
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024
2023
IEEE Trans. Aerosp. Electron. Syst., December, 2023
Internet Things, December, 2023
Speaker identification from emotional and noisy speech using learned voice segregation and speech VGG.
Expert Syst. Appl., August, 2023
Inf. Sci., July, 2023
Internet Things, July, 2023
Internet Things, July, 2023
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources.
IEEE Trans. Netw. Serv. Manag., June, 2023
Inf. Sci., April, 2023
Blockcheck: A consortium blockchain-based conformance checking framework for business processes.
Internet Things, April, 2023
On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach.
IEEE Trans. Sustain. Comput., 2023
XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning.
Sensors, 2023
Real-time risk and behavioral monitoring in IoT applications using soft computing techniques.
J. Ambient Intell. Humaniz. Comput., 2023
IEEE Internet Comput., 2023
ACM Comput. Surv., 2023
CoRR, 2023
CoRR, 2023
Comput. Sci. Inf. Syst., 2023
Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals.
IEEE Access, 2023
IEEE Access, 2023
Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Privacy-aware Adaptive Collaborative Learning Approach for Distributed Edge Networks.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
2022
IEEE Wirel. Commun., 2022
IEEE Trans. Serv. Comput., 2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Netw. Serv. Manag., 2022
IEEE J. Biomed. Health Informatics, 2022
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
Sensors, 2022
Inf. Sci., 2022
IEEE Internet Things J., 2022
Smart-3DM: Data-driven decision making using smart edge computing in hetero-crowdsensing environment.
Future Gener. Comput. Syst., 2022
Speaker Identification from emotional and noisy speech data using learned voice segregation and Speech VGG.
CoRR, 2022
CoRR, 2022
CoRR, 2022
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.
IEEE Access, 2022
Trust-3DM: Trustworthiness-Based Data-Driven Decision-Making Framework Using Smart Edge Computing for Continuous Sensing.
IEEE Access, 2022
Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication.
IEEE Access, 2022
Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices.
IEEE Access, 2022
Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics.
IEEE Access, 2022
Proceedings of the 18th International Conference on Wireless and Mobile Computing, 2022
Proceedings of the IEEE International Symposium on Robotic and Sensors Environments, 2022
Proceedings of the Knowledge Management in Organisations - 16th International Conference, 2022
Proceedings of the Intelligent Decision Technologies, 2022
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2022
Balanced Affinity Loss for Highly Imbalanced Baggage Threat Contour-Driven Instance Segmentation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022
Knowledge-Based Legal Document Retrieval: A Case Study on Italian Civil Court Decisions.
Proceedings of the Companion Proceedings of the 23rd International Conference on Knowledge Engineering and Knowledge Management, 2022
Proceedings of the Cooperative Information Systems - 28th International Conference, 2022
Proceedings of the Cooperative Information Systems - 28th International Conference, 2022
Proceedings of the OITS International Conference on Information Technology, 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
Proceedings of the Intelligent Systems - 11th Brazilian Conference, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Using Generative Adversarial Networks to Simulate System Calls of Malicious Android Processes.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach.
IEEE Trans. Sustain. Comput., 2021
IEEE Trans. Serv. Comput., 2021
TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT.
IEEE Trans. Ind. Informatics, 2021
Identifying Drone Operator by Deep Learning and Ensemble Learning of IMU and Control Data.
IEEE Trans. Hum. Mach. Syst., 2021
From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain.
ACM Trans. Cyber Phys. Syst., 2021
Robust Computationally-Efficient Wireless Emitter Classification Using Autoencoders and Convolutional Neural Networks.
Sensors, 2021
IEEE Netw., 2021
Future Gener. Comput. Syst., 2021
Future Gener. Comput. Syst., 2021
Conceptual modeling in the era of Big Data and Artificial Intelligence: Research topics and introduction to the special issue.
Data Knowl. Eng., 2021
CoRR, 2021
Concurr. Comput. Pract. Exp., 2021
A trust assurance technique for Internet of things based on human behavior compliance.
Concurr. Comput. Pract. Exp., 2021
Guest Editorial: QoS and security in software for wireless and mobile micro-services.
Computing, 2021
Computing, 2021
Towards the definition of an information quality metric for information fusion models.
Comput. Electr. Eng., 2021
Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists.
Comput. Electr. Eng., 2021
Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework.
Ad Hoc Networks, 2021
Temporal Fusion Based Mutli-scale Semantic Segmentation for Detecting Concealed Baggage Threats.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
From Low-Level-Event-Logs to High-Level-Business-Process-Model-Activities: An Advanced Framework based on Machine Learning and Flexible BPMN Model Translation.
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021
Proceedings of the MEDES '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1, 2021
Proceedings of the 28th IEEE International Conference on Electronics, 2021
Proceedings of the IEEE International Conference on Digital Health, 2021
A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Resilience learning through self adaptation in digital twins of human-cyber-physical systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
Proceedings of the 4th International Conference on Advanced Communication Technologies and Networking, 2021
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the IEEE International Conference on Services Computing, 2021
2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Engineering Management, 2020
A composite machine-learning-based framework for supporting low-level event logs to high-level business process model activities mappings enhanced by flexible BPMN model translation.
Soft Comput., 2020
Meta-Transfer Learning Driven Tensor-Shot Detector for the Autonomous Localization and Recognition of Concealed Baggage Threats.
Sensors, 2020
Multim. Tools Appl., 2020
Multim. Tools Appl., 2020
J. Reliab. Intell. Environ., 2020
J. Parallel Distributed Comput., 2020
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem.
J. Inf. Secur. Appl., 2020
Managing a pool of rules for credit card fraud detection by a Game Theory based approach.
Future Gener. Comput. Syst., 2020
Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
CoRR, 2020
Technology-enhanced learning research in higher education: A transformative education primer.
Comput. Hum. Behav., 2020
IEEE Access Special Section Editorial: Urban Computing and Well-Being in Smart Cities: Services, Applications, Policymaking Considerations.
IEEE Access, 2020
Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the SOFSEM 2020: Theory and Practice of Computer Science, 2020
Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020
Proceedings of the MEDES '20: 12th International Conference on Management of Digital EcoSystems, 2020
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the ICPM Doctoral Consortium and Tool Demonstration Track 2020 co-located with the 2nd International Conference on Process Mining (ICPM 2020), 2020
Proceedings of the 2nd International Conference on Process Mining, 2020
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the E-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 2020 IEEE International Conference on Edge Computing, 2020
Proceedings of the DSAI 2020: 9th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion, 2020
Proceedings of the From Data to Models and Back - 9th International Symposium, 2020
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020
Proceedings of the Italian Workshop on Explainable Artificial Intelligence co-located with 19th International Conference of the Italian Association for Artificial Intelligence, 2020
Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Designing a Recommender System for Touristic Activities in a Big Data as a Service Platform.
Proceedings of the Innovations in Big Data Mining and Embedded Knowledge, 2019
Wirel. Pers. Commun., 2019
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Big Data, 2019
Long-term memory-induced synchronisation can impair collective performance in congested systems.
Swarm Intell., 2019
A new 3D descriptor for human classification: application for human detection in a multi-kinect system.
Multim. Tools Appl., 2019
J. Real Time Image Process., 2019
J. Data Semant., 2019
J. Ambient Intell. Humaniz. Comput., 2019
A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema.
J. Ambient Intell. Humaniz. Comput., 2019
Eng. Appl. Artif. Intell., 2019
Comput. Hum. Behav., 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
Robotized Counselor Evaluation using Linguistic Detection of Feeling Polarity Change.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019
High Performance Personal Adaptation Speech Recognition Framework by Incremental Learning with Plural Language Models.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019
Designing Process-Centric Blockchain-Based Architectures: A Case Study in e-voting as a Service.
Proceedings of the Data-Driven Process Discovery and Analysis, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the 2019 IEEE World Congress on Services, 2019
Proceedings of the Research & Innovation Forum 2019, 2019
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019
Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Machine Learning-Based Framework for Log-Lifting in Business Process Mining Applications.
Proceedings of the Business Process Management - 17th International Conference, 2019
Proceedings of the Business Information Systems Workshops, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Soft Comput., 2018
Modeling time, probability, and configuration constraints for continuous cloud service certification.
Comput. Secur., 2018
IEEE Access, 2018
A Framework for Human-in-the-loop Monitoring of Concept-drift Detection in Event Log Stream.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 World Automation Congress, 2018
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning.
Proceedings of the 14th International Conference on Signal-Image Technology & Internet-Based Systems, 2018
Automated Monitoring of Collaborative Working Environments for Supporting Open Innovation.
Proceedings of the Knowledge Management in Organizations - 13th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018
Proceedings of the Conceptual Modeling - 37th International Conference, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Pedigree-ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the 2018 IEEE International Congress on Big Data, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018
2017
ACM Trans. Internet Techn., 2017
Soft Comput., 2017
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017
Multim. Tools Appl., 2017
J. Inf. Secur. Appl., 2017
Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method.
Inf. Sci., 2017
Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review.
Inf. Syst., 2017
Big Data and Data Analytics Research: From Metaphors to Value Space for Collective Wisdom in Human Decision Making and Smart Machines.
Int. J. Semantic Web Inf. Syst., 2017
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Context respectful counseling agent integrated with robot nodding for dialog promotion.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017
Flick: Japanese Input Method Editor Using N-Gram and Recurrent Neural Network Language Model Based Predictive Text Input.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017
Clause Anaphora Resolution of Japanese Demonstrative Determiner by Ontology Extension Using Distributed Expression of Words.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017
Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017), 2017
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Proceedings of the Workshops of the EDBT/ICDT 2017 Joint Conference (EDBT/ICDT 2017), 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the Euromicro Conference on Digital System Design, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the Business Process Management Forum, 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
Proceedings of the Emerging Technologies for Developing Countries, 2017
Proceedings of the Advances in Databases and Information Systems, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Proceedings of the Computational Intelligence and Quantitative Software Engineering, 2016
IEEE Trans. Serv. Comput., 2016
Network virtualization by differentially switched VPN for stable business communication with offshore computers.
J. Reliab. Intell. Environ., 2016
Special issue on intelligent systems and applications in vision, image and information computing.
J. Reliab. Intell. Environ., 2016
Locally estimated heterogeneity property and its fuzzy filter application for deinterlacing.
Inf. Sci., 2016
Virtual reality in learning, collaboration and behaviour: content, systems, strategies, context designs.
Behav. Inf. Technol., 2016
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016
Proceedings of the 6th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2016), 2016
Proceedings of the Data-Driven Process Discovery and Analysis, 2016
Techniques, Technologies and Models for Big Data as a service.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016
Towards Model-Driven Big-Data-as-a-Service.
Proceedings of the ENASE 2016, 2016
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Proceedings of the IEEE International Conference on Services Computing, 2016
Proceedings of the IEEE International Conference on Services Computing, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
IEEE Trans. Serv. Comput., 2015
Multim. Tools Appl., 2015
Multim. Tools Appl., 2015
Int. J. Inf. Sec., 2015
Comput. Hum. Behav., 2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015
Evaluation of Method for Multiplexing Communication Routes to Avoid Intentional Barriers.
Proceedings of the 2015 IEEE International Conference on Systems, 2015
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015
Proceedings of the 5th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2015), 2015
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015
Proceedings of the Knowledge Management in Organizations - 10th International Conference, 2015
Proceedings of the IEEE Congress on Evolutionary Computation, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015
Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'15), 2015
Proceedings of the International Workshop on Algorithms & Theories for the Analysis of Event Data, 2015
Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014
Proceedings of the Data-Driven Process Discovery and Analysis, 2014
4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs.
Proceedings of the 2014 IEEE World Congress on Services, 2014
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014
On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014
Proceedings of the 14th International Conference on Knowledge Management and Data-driven Business, 2014
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
Proceedings of the Advanced Web Services, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
J. Ambient Intell. Humaniz. Comput., 2013
Dagstuhl Reports, 2013
Clause Anaphora Resolution for Japanese Demonstrative Determiner Based on Semantic Similarity between Different Part-of-Speech.
Proceedings of the IEEE International Conference on Systems, 2013
Proceedings of the IEEE International Conference on Systems, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the Data-Driven Process Discovery and Analysis, 2013
Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013
Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013
Proceedings of the Advanced Information Systems Engineering Workshops, 2013
A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case.
Proceedings of the IEEE International Congress on Big Data, 2013
Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
Proceedings of the Joint Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'13) and the International Workshop on Modeling and Business Environments (ModBE'13), Milano, Italy, June 24, 2013
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2012
Multim. Tools Appl., 2012
Multim. Tools Appl., 2012
Int. J. Web Serv. Res., 2012
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the Sixth International Conference on Complex, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Wirel. Commun., 2011
IEEE Trans. Serv. Comput., 2011
eHR-KM - First International Workshop on Knowledge Management and e-Human Resources Practices for Innovation.
Proceedings of the 6th Conference on Professional Knowledge Management: From Knowledge to Action, 2011
Proceedings of the 6th Conference on Professional Knowledge Management: From Knowledge to Action, 2011
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011
Proceedings of the Seventh International Conference on Signal-Image Technology and Internet-Based Systems, 2011
Proceedings of the Data-Driven Process Discovery and Analysis, 2011
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011 Workshops, 2011
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011
Proceedings of the 1st international ACM workshop on Music information retrieval with user-centered and multimodal strategies, Scottsdale, AZ, USA, November 28, 2011
Proceedings of the 2011 IEEE Symposium on Intelligent Agent, 2011
Proceedings of the IEEE International Conference on Web Services, 2011
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011
Improving Quality and Cost-Effectiveness in Enterprise Software Application Development: An Open, Holistic Approach for Project Monitoring and Control.
Proceedings of the Software Business - Second International Conference, 2011
Proceedings of the Procedings of the Second Conference on Creativity and Innovation in Design, 2011
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the Business Process Management Workshops, 2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
Semantics-aware matching strategy (SAMS) for the Ontology meDiated Data Integration (ODDI).
Int. J. Knowl. Eng. Soft Data Paradigms, 2010
Special issue: Open Source Certification.
Comput. Syst. Sci. Eng., 2010
CoRR, 2010
Proceedings of the Business System Management and Engineering, 2010
Proceedings of the On the Move to Meaningful Internet Systems, 2010
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010
Spago4Q and the QEST <i>n</i>D Model: An Open Source Solution for Software Performance Measurement.
Proceedings of the Open Source Software: New Horizons, 2010
Combining multi-probe histogram and order-statistics based LSH for scalable audio content retrieval.
Proceedings of the 18th International Conference on Multimedia 2010, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
Proceedings of the ISSE 2010, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Proceedings of the Software Business - First International Conference, 2010
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010
Proceedings of the Semantic Challenges in Sensor Networks, 24.01. - 29.01.2010, 2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Proceedings of the Advances in Web Semantics I, 2009
Concept of Linguistic Variable-Based Fuzzy Ensemble Approach: Application to Interlaced HDTV Sequences.
IEEE Trans. Fuzzy Syst., 2009
Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing.
Image Vis. Comput., 2009
Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion.
Inf. Sci., 2009
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009
Proceedings of the Open Source Ecosystems: Diverse Communities Interacting, 2009
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009
Risk-aware Collaborative Processes.
Proceedings of the ICEIS 2009, 2009
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009
Proceedings of the Communications Infrastructure. Systems and Applications in Europe, 2009
Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09).
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009
Proceedings of the Database and Expert Systems Applications, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the Business Information Systems, 12th International Conference, 2009
2008
Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008
Int. J. Commun. Netw. Syst. Sci., 2008
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008
Proceedings of the Emerging Technologies and Information Systems for the Knowledge Society, 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2008
Proceedings of the Fourth International Workshop on Uncertainty Reasoning for the Semantic Web, 2008
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Consensus Emergence from Naming Games in Representative AgentSemantic Overlay Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008
Proceedings of the Open Source Development, 2008
Proceedings of the Open Source Development, 2008
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008
Proceedings of the 5th International Conference on Digital Preservation, 2008
ODDI - A Framework for Semi-automatic Data Integration.
Proceedings of the ICEIS 2008, 2008
Proceedings of the Enterprise Information Systems, 10th International Conference, 2008
Using XML Similarity to Enhance SOAP Messages Security.
Proceedings of the 2008 International Conference on Internet Computing, 2008
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008
Proceedings of the Business Information Systems, 11th International Conference, 2008
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008
2007
IEEE Trans. Knowl. Data Eng., 2007
IEEE Trans. Educ., 2007
IEEE Trans. Consumer Electron., 2007
Rough Sets-Assisted Subfield Optimization for Alternating Current Plasma Display Panel.
IEEE Trans. Consumer Electron., 2007
Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach.
SIGMETRICS Perform. Evaluation Rev., 2007
Online Inf. Rev., 2007
J. Cases Inf. Technol., 2007
A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007
Proceedings of the Web Information Systems and Technologies, 2007
Proceedings of the IEEE International Conference on Virtual Environments, 2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Trustworthiness-related Uncertainty of Semantic Web-style Metadata: A Possibilistic Approach.
Proceedings of the Third ISWC Workshop on Uncertainty Reasoning for the Semantic Web Busan, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
Proceedings of the Open Source Development, 2007
Proceedings of the Open Source Development, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Foundations of Fuzzy Logic and Soft Computing, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Advances in Databases: Concepts, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the Soft Computing in Web Information Retrieval - Models and Applications, 2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
J. Syst. Archit., 2006
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
J. Assoc. Inf. Sci. Technol., 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Special issue: Web service security.
Comput. Syst. Sci. Eng., 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
3D Expressive Face Model-based Tracking Algorithm.
Proceedings of the IASTED International Conference on Signal Processing, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
OntoExtractor: A Fuzzy-Based Approach to Content and Structure-Based Metadata Extraction.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper).
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On.
Proceedings of the Open Source Systems, 2006
Proceedings of the 6th International Conference on Web Engineering, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Fuzzy Logic and the Semantic Web, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the SWAP 2005, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005
Proceedings of the Secure Data Management, 2005
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
An Architecture of a Wavelet Based Approach for the Approximate Querying of Huge Sets of Data in the Telecommunication Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
OntoExtractor: A Fuzzy-Based Approach in Clustering Semi-structured Data Sources and Metadata Generation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Web Engineering, 5th International Conference, 2005
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the Construction and Analysis of Safe, 2005
2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Semantics-aware techniques for security.
Comput. Syst. Sci. Eng., 2004
Special issue: Semantics-Aware Techniques for Security.
Comput. Syst. Sci. Eng., 2004
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004
An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004
Proceedings of the Web Engineering - 4th International Conference, 2004
Proceedings of the Computational Intelligence, Theory and Applications, International Conference 8th Fuzzy Days, Dortmund, Germany, Sept. 29, 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
IEEE Trans. Knowl. Data Eng., 2003
Editorial.
Comput. Syst. Sci. Eng., 2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Securing XML-based Multimedia Content.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003
Human-centered e-business.
Kluwer, ISBN: 978-1-4020-7442-4, 2003
2002
ACM Trans. Inf. Syst. Secur., 2002
XML access control systems: a component-based approach.
Informatica (Slovenia), 2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
Proceedings of the Eleventh International World Wide Web Conference, 2002
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002
Proceedings of the Advances in Database Technology, 2002
Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002
A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
IEEE Trans. Fuzzy Syst., 2001
Proceedings of the Tenth International World Wide Web Conference, 2001
An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Temporal Aspects of Semistructured Data.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001
Proceedings of the Computational Intelligence, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Comput. Networks, 2000
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000
Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Blind queries to XML data.
Proceedings of the Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2000
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000
Proceedings of the Evolvable Systems: From Biology to Hardware, 2000
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000
Proceedings of the Flexible Query Answering Systems, 2000
1999
Corrigenda: a hierarchy-aware approach to faceted classification of object-oriented components.
ACM Trans. Softw. Eng. Methodol., 1999
A Hierarchy-aware Approach to Faceted Classification of Objected-Oriented Components.
ACM Trans. Softw. Eng. Methodol., 1999
J. Adv. Comput. Intell. Intell. Informatics, 1999
Comput. Networks, 1999
Proceedings of the Fifth ACM SIGSOFT Symposium on Software Reusability, 1999
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999
Flexible Queries to Semistructured Datasources: The WG-log Approach.
Proceedings of the Third ICSC Symposia on Intelligent Industrial Automation (IIA'99) and Soft Computing (SOCO'99), 1999
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Proceedings of the Computational Intelligence, 1999
Proceedings of the Computational Intelligence, 1999
Proceedings of the 1st NASA / DoD Workshop on Evolvable Hardware (EH '99), 1999
Using WG-log Schemata to Represent Semistructured Data.
Proceedings of the Database Semantics, 1999
1998
Proceedings of the Query Languages Workshop, Boston, 1998
Proceedings of the 11th Annual Symposium on Integrated Circuits Design, 1998
Proceedings of the 1998 ACM symposium on Applied Computing, 1998
Proceedings of the Evolvable Systems: From Biology to Hardware, 1998
Proceedings of the Flexible Query Answering Systems, Third International Conference, 1998
1997
Structuring and Querying the Web through Graph-Oriented Languages.
Proceedings of the Convegno Nazionale Sistemi Evolluti per Basi di Dati, 1997
Proceedings of the 1997 ACM symposium on Applied Computing, 1997
Proceedings of the Computational Intelligence, 1997
Semantic Approaches to Structuring and Querying Web Sites.
Proceedings of the Data Mining and Reverse Engineering: Searching for Semantics, 1997
Reusing Analysis Schemas in ODB Applications: a Chart Based Approach.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997
1996
Softw. Pract. Exp., 1996
Una estensione fuzzy del modello relazionale per il riutilizzo di componenti software.
Proceedings of the Atti del Quarto Convegno Nazionale su Sistemi Evoluti per Basi di Dati (4th National Conference on Advanced Database Systems), 1996
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996
1995
Proceedings of the 1995 ACM symposium on applied computing, 1995
1994
Decompositions of B<sub>n</sub> and PI<sub>n</sub> Using Symmetric Chains.
J. Comb. Theory A, 1994
Whitney Numbers of Some Geometric Lattices.
J. Comb. Theory A, 1994
1992
The design of a microkernel application platform for shop-floor automation extended abstract.
Future Gener. Comput. Syst., 1992