Ernesto Damiani

Orcid: 0000-0002-9557-6496

Affiliations:
  • University of Milan, Italy


According to our database1, Ernesto Damiani authored at least 633 papers between 1992 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Hardening behavioral classifiers against polymorphic malware: An ensemble approach based on minority report.
Inf. Sci., 2025

2024
Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol.
IEEE Internet Things J., December, 2024

Autoencoder-Based Spatial Modulation for the Next Generation of Wireless Networks.
IEEE Internet Things J., November, 2024

Containerized Microservices: A Survey of Resource Management Frameworks.
IEEE Trans. Netw. Serv. Manag., August, 2024

Integrated Terrestrial-Wired and LEO Satellite With Offline Bidirectional Cooperation for 6G IoT Networks.
IEEE Internet Things J., May, 2024

Autonomous Localization of X-Ray Baggage Threats via Weakly Supervised Learning.
IEEE Trans. Ind. Informatics, April, 2024

A Decade of Churn Prediction Techniques in the TelCo Domain: A Survey.
SN Comput. Sci., April, 2024

Fast ML-based next-word prediction for hybrid languages.
Internet Things, April, 2024

Cybersecurity training and healthcare: the AERAS approach.
Int. J. Inf. Sec., April, 2024

Blockchain Data Structures and Integrated Adaptive Learning: Features and Futures.
IEEE Consumer Electron. Mag., March, 2024

Moving target defense approach for secure relay selection in vehicular networks.
Veh. Commun., 2024

Reconfigurable Intelligent Surface-Assisted Routing for Power-Constrained IoT Networks.
IEEE Open J. Commun. Soc., 2024

Blockchain applications in UAV industry: Review, opportunities, and challenges.
J. Netw. Comput. Appl., 2024

Blockchain and NFT-based traceability and certification for UAV parts in manufacturing.
J. Ind. Inf. Integr., 2024

Enhancing security in X-ray baggage scans: A contour-driven learning approach for abnormality classification and instance segmentation.
Eng. Appl. Artif. Intell., 2024

A Quantization-based Technique for Privacy Preserving Distributed Learning.
CoRR, 2024

The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions.
IEEE Commun. Surv. Tutorials, 2024

Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV).
Comput. Commun., 2024

Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols.
Ad Hoc Networks, 2024

Advanced Machine Learning Based Malware Detection Systems.
IEEE Access, 2024

The Essentials: A Comprehensive Survey to Get Started in Augmented Reality.
IEEE Access, 2024

Secure Relay Selection With Outdated CSI in Cooperative Wireless Vehicular Networks: A DQN Approach.
IEEE Access, 2024

Tuning Machine Learning to Address Process Mining Requirements.
IEEE Access, 2024

Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification.
Proceedings of the 16th International Conference on Computer and Automation Engineering, 2024

MUSA: A Platform for Data-Intensive Services in Edge-Cloud Continuum.
Proceedings of the Advanced Information Networking and Applications, 2024

Message from Rong N. Chang, Steering Committee Chair.
Proceedings of the IEEE International Conference on Software Services Engineering, 2024

2024 IEEE World Congress on Services.
Proceedings of the 17th IEEE International Conference on Cloud Computing, 2024

2023
Contingency Clarification Protocols for Reliable Counter-Drone Operation.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

A two-stage cyber attack detection and classification system for smart grids.
Internet Things, December, 2023

Reward shaping using convolutional neural network.
Inf. Sci., November, 2023

Speaker identification from emotional and noisy speech using learned voice segregation and speech VGG.
Expert Syst. Appl., August, 2023

Robust ML model ensembles via risk-driven anti-clustering of training data.
Inf. Sci., July, 2023

A predictive target tracking framework for IoT using CNN-LSTM.
Internet Things, July, 2023

ModularFed: Leveraging modularity in federated learning frameworks.
Internet Things, July, 2023

Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources.
IEEE Trans. Netw. Serv. Manag., June, 2023

Data independent warmup scheme for non-IID federated learning.
Inf. Sci., April, 2023

Blockcheck: A consortium blockchain-based conformance checking framework for business processes.
Internet Things, April, 2023

On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach.
IEEE Trans. Sustain. Comput., 2023

XRecon: An Explainbale IoT Reconnaissance Attack Detection System Based on Ensemble Learning.
Sensors, 2023

Multi-modal traffic event detection using shapelets.
Neural Comput. Appl., 2023

Real-time risk and behavioral monitoring in IoT applications using soft computing techniques.
J. Ambient Intell. Humaniz. Comput., 2023

Rethinking Certification for Trustworthy Machine-Learning-Based Applications.
IEEE Internet Comput., 2023

Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey.
ACM Comput. Surv., 2023

Managing ML-Based Application Non-Functional Behavior: A Multi-Model Approach.
CoRR, 2023

Tailoring Machine Learning for Process Mining.
CoRR, 2023

Towards Certification of Machine Learning-Based Distributed Systems.
CoRR, 2023

Explainable Label-flipping Attacks on Human Emotion Assessment System.
CoRR, 2023

Guest editorial: Management of digital ecosystems - recent trends, and open issues.
Comput. Sci. Inf. Syst., 2023

Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals.
IEEE Access, 2023

Proactive Random-Forest Autoscaler for Microservice Resource Allocation.
IEEE Access, 2023

Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

Role-Based Access Control in Private Blockchain for IoT Integrated Smart Contract.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

Highly Imbalanced Baggage Threat Classification.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

Context-Aware Transformers for Weakly Supervised Baggage Threat Localization.
Proceedings of the IEEE International Conference on Image Processing, 2023

Pervasive AI for Secure and Scalable IoT- Edge-Cloud Continuum: A Big Picture.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Privacy-aware Adaptive Collaborative Learning Approach for Distributed Edge Networks.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Blockchain-Based Trustworthy O2O Interaction in the Next 6G Ecosystem.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

OSμS: An Open-Source Microservice Prototyping Platform.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
Toward Federated-Learning-Enabled Visible Light Communication in 6G Systems.
IEEE Wirel. Commun., 2022

FPGAaaS: A Survey of Infrastructures and Systems.
IEEE Trans. Serv. Comput., 2022

Evaluation Goals for Online Process Mining: A Concept Drift Perspective.
IEEE Trans. Serv. Comput., 2022

Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model.
ACM Trans. Internet Techn., 2022

A Trust and Reputation System for IoT Service Interactions.
IEEE Trans. Netw. Serv. Manag., 2022

A Security Certification Scheme for Information-Centric Networks.
IEEE Trans. Netw. Serv. Manag., 2022

A Modelling Framework for Evidence-Based Public Health Policy Making.
IEEE J. Biomed. Health Informatics, 2022

Modeling Threats to AI-ML Systems Using STRIDE.
Sensors, 2022

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions.
Sensors, 2022

Estimating Degradation of Machine Learning Data Assets.
ACM J. Data Inf. Qual., 2022

Graph convolutional recurrent networks for reward shaping in reinforcement learning.
Inf. Sci., 2022

Self-Supervised Online and Lightweight Anomaly and Event Detection for IoT Devices.
IEEE Internet Things J., 2022

Smart-3DM: Data-driven decision making using smart edge computing in hetero-crowdsensing environment.
Future Gener. Comput. Syst., 2022

Speaker Identification from emotional and noisy speech data using learned voice segregation and Speech VGG.
CoRR, 2022

New data poison attacks on machine learning classifiers for mobile exfiltration.
CoRR, 2022

On the Robustness of Ensemble-Based Machine Learning Against Data Poisoning.
CoRR, 2022

Poisoning Attacks and Defenses on Artificial Intelligence: A Survey.
CoRR, 2022

Big Multimodal Data Analysis: Applications.
Big Data, 2022

Big Multimodal Data Analysis: Models and Performance Analysis.
Big Data, 2022

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.
IEEE Access, 2022

Trust-3DM: Trustworthiness-Based Data-Driven Decision-Making Framework Using Smart Edge Computing for Continuous Sensing.
IEEE Access, 2022

Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication.
IEEE Access, 2022

Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices.
IEEE Access, 2022

Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics.
IEEE Access, 2022

A Surrogate-Based Technique for Android Malware Detectors' Explainability.
Proceedings of the 18th International Conference on Wireless and Mobile Computing, 2022

Transformers for Imbalanced Baggage Threat Recognition.
Proceedings of the IEEE International Symposium on Robotic and Sensors Environments, 2022

Agent-Based Vector-Label Propagation for Explaining Social Network Structures.
Proceedings of the Knowledge Management in Organisations - 16th International Conference, 2022

Inter-rater Agreement Based Risk Assessment Scheme for ICT Corporates.
Proceedings of the Intelligent Decision Technologies, 2022

Secure and Scalable Collaborative Edge Computing using Decision Tree.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022

Set-Based Counterfactuals in Partial Classification.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2022

Balanced Affinity Loss for Highly Imbalanced Baggage Threat Contour-Driven Instance Segmentation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022

Knowledge-Based Legal Document Retrieval: A Case Study on Italian Civil Court Decisions.
Proceedings of the Companion Proceedings of the 23rd International Conference on Knowledge Engineering and Knowledge Management, 2022

Automating Process Discovery Through Meta-learning.
Proceedings of the Cooperative Information Systems - 28th International Conference, 2022

Validating Vector-Label Propagation for Graph Embedding.
Proceedings of the Cooperative Information Systems - 28th International Conference, 2022

AI-based Block Identification and Classification in the Blockchain Integrated IoT.
Proceedings of the OITS International Conference on Information Technology, 2022

Toward Distributed Ledger Support for 5G Network Services.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

Selecting Optimal Trace Clustering Pipelines with Meta-learning.
Proceedings of the Intelligent Systems - 11th Brazilian Conference, 2022

A Visualized Malware Detection Framework with CNN and Conditional GAN.
Proceedings of the IEEE International Conference on Big Data, 2022

Using Generative Adversarial Networks to Simulate System Calls of Malicious Android Processes.
Proceedings of the IEEE International Conference on Big Data, 2022

2021

Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach.
IEEE Trans. Sustain. Comput., 2021

Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level.
IEEE Trans. Serv. Comput., 2021

Certification-Based Cloud Adaptation.
IEEE Trans. Serv. Comput., 2021

TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT.
IEEE Trans. Ind. Informatics, 2021

Identifying Drone Operator by Deep Learning and Ensemble Learning of IMU and Control Data.
IEEE Trans. Hum. Mach. Syst., 2021

From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain.
ACM Trans. Cyber Phys. Syst., 2021

Trusting Testcases Using Blockchain-Based Repository Approach.
Symmetry, 2021

Robust Computationally-Efficient Wireless Emitter Classification Using Autoencoders and Convolutional Neural Networks.
Sensors, 2021

How Artificial Intelligence and Mobile Crowd Sourcing are Inextricably Intertwined.
IEEE Netw., 2021

Toward Domain Adaptation for small data sets.
Internet Things, 2021

Editorial: Special issue on trusted Cloud-Edges computations.
Future Gener. Comput. Syst., 2021

Ontology based recommender system using social network data.
Future Gener. Comput. Syst., 2021

Conceptual modeling in the era of Big Data and Artificial Intelligence: Research topics and introduction to the special issue.
Data Knowl. Eng., 2021

Towards Federated Learning-Enabled Visible Light Communication in 6G Systems.
CoRR, 2021

Selecting Optimal Trace Clustering Pipelines with AutoML.
CoRR, 2021

Using Meta-learning to Recommend Process Discovery Methods.
CoRR, 2021

A design methodology for matching smart health requirements.
Concurr. Comput. Pract. Exp., 2021

A trust assurance technique for Internet of things based on human behavior compliance.
Concurr. Comput. Pract. Exp., 2021

Guest Editorial: QoS and security in software for wireless and mobile micro-services.
Computing, 2021

Smart connected parking lots based on secured multimedia IoT devices.
Computing, 2021

Towards the definition of an information quality metric for information fusion models.
Comput. Electr. Eng., 2021

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists.
Comput. Electr. Eng., 2021

Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework.
Ad Hoc Networks, 2021

Temporal Fusion Based Mutli-scale Semantic Segmentation for Detecting Concealed Baggage Threats.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

From Low-Level-Event-Logs to High-Level-Business-Process-Model-Activities: An Advanced Framework based on Machine Learning and Flexible BPMN Model Translation.
Proceedings of the 29th Italian Symposium on Advanced Database Systems, 2021

Dynamic and Scalable Enforcement of Access Control Policies for Big Data.
Proceedings of the MEDES '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1, 2021

Identifying Applications' State via System Calls Activity: A Pipeline Approach.
Proceedings of the 28th IEEE International Conference on Electronics, 2021

Engineering Continuous Monitoring of Intrinsic Capacity for Elderly People.
Proceedings of the IEEE International Conference on Digital Health, 2021

A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021


Resilience learning through self adaptation in digital twins of human-cyber-physical systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Battery Recharging Time-Based Routing for Power Constrained IoT Networks.
Proceedings of the 4th International Conference on Advanced Communication Technologies and Networking, 2021

Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services.
Proceedings of the Complex, Intelligent and Software Intensive Systems, 2021

Privacy-Preserving Big Data Exchange: Models, Issues, Future Research Directions.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Security Certification Scheme for Content-centric Networks.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification.
IEEE Trans. Serv. Comput., 2020

Trust in Blockchain Cryptocurrency Ecosystem.
IEEE Trans. Engineering Management, 2020

A composite machine-learning-based framework for supporting low-level event logs to high-level business process model activities mappings enhanced by flexible BPMN model translation.
Soft Comput., 2020

Meta-Transfer Learning Driven Tensor-Shot Detector for the Autonomous Localization and Recognition of Concealed Baggage Threats.
Sensors, 2020

Artificial intelligence in deep learning algorithms for multimedia analysis.
Multim. Tools Appl., 2020

I3D: a new dataset for testing denoising and demosaicing algorithms.
Multim. Tools Appl., 2020

Embodiment matters: toward culture-specific robotized counselling.
J. Reliab. Intell. Environ., 2020

Cost-effective deployment of certified cloud composite services.
J. Parallel Distributed Comput., 2020

A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem.
J. Inf. Secur. Appl., 2020

Managing a pool of rules for credit card fraud detection by a Game Theory based approach.
Future Gener. Comput. Syst., 2020

Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms.
CoRR, 2020

Preface: Springer computing journal.
Computing, 2020

Technology-enhanced learning research in higher education: A transformative education primer.
Comput. Hum. Behav., 2020

IEEE Access Special Section Editorial: Urban Computing and Well-Being in Smart Cities: Services, Applications, Policymaking Considerations.
IEEE Access, 2020

Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure.
IEEE Access, 2020

Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey.
IEEE Access, 2020

Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model.
IEEE Access, 2020

Certified Machine-Learning Models.
Proceedings of the SOFSEM 2020: Theory and Practice of Computer Science, 2020

Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

What can Machine Learning do for Radio Spectrum Management?
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

A Methodology for Non-Functional Property Evaluation of Machine Learning Models.
Proceedings of the MEDES '20: 12th International Conference on Management of Digital EcoSystems, 2020

A Remote FPGA Laboratory as a Cloud Microservice.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Towards Blockchain-Based Reputation-Aware Federated Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

The CDESF Toolkit: An Introduction.
Proceedings of the ICPM Doctoral Consortium and Tool Demonstration Track 2020 co-located with the 2nd International Conference on Process Mining (ICPM 2020), 2020

Anomaly Detection on Event Logs with a Scarcity of Labels.
Proceedings of the 2nd International Conference on Process Mining, 2020

Untangling the XRP Ledger: Insights and Analysis.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

An Assurance Framework and Process for Hybrid Systems.
Proceedings of the E-Business and Telecommunications, 2020

Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

IEEE 2020 World Congress on Services Message from the Program Chairs in Chief.
Proceedings of the 2020 IEEE International Conference on Edge Computing, 2020

CovidSense: A Smartphone-based Initiative for Fighting COVID-19 Spreading.
Proceedings of the DSAI 2020: 9th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion, 2020

Evaluating Trace Encoding Methods in Process Mining.
Proceedings of the From Data to Models and Back - 9th International Symposium, 2020

An Emerging Security Framework for Connected Autonomous Vehicles.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

Learning Simplified Functions to Understand.
Proceedings of the Italian Workshop on Explainable Artificial Intelligence co-located with 19th International Conference of the Italian Association for Artificial Intelligence, 2020

Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

A Blockchain-based Trustworthy Certification Process for Composite Services.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Designing a Recommender System for Touristic Activities in a Big Data as a Service Platform.
Proceedings of the Innovations in Big Data Mining and Embedded Knowledge, 2019

A Novel Protocol for Security of Location Based Services in Multi-agent Systems.
Wirel. Pers. Commun., 2019

Test-Based Security Certification of Composite Services.
ACM Trans. Web, 2019

RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems.
IEEE Trans. Dependable Secur. Comput., 2019

Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection.
IEEE Trans. Big Data, 2019

Long-term memory-induced synchronisation can impair collective performance in congested systems.
Swarm Intell., 2019

A new 3D descriptor for human classification: application for human detection in a multi-kinect system.
Multim. Tools Appl., 2019

A graph-based meta-model for heterogeneous data management.
Knowl. Inf. Syst., 2019

Special issue on real-time image and video processing in mobile embedded systems.
J. Real Time Image Process., 2019

Dynamic Access Control to Semantics-Aware Streamed Process Logs.
J. Data Semant., 2019

VICA, a visual counseling agent for emotional distress.
J. Ambient Intell. Humaniz. Comput., 2019

A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema.
J. Ambient Intell. Humaniz. Comput., 2019

Towards AI-Powered Multiple Cloud Management.
IEEE Internet Comput., 2019

Framework for traffic event detection using Shapelet Transform.
Eng. Appl. Artif. Intell., 2019

The cognitive computing turn in education: Prospects and application.
Comput. Hum. Behav., 2019

A Machine Learning Framework for Biometric Authentication Using Electrocardiogram.
IEEE Access, 2019

A Deep Learning Approach to Radio Signal Denoising.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019

An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

Robotized Counselor Evaluation using Linguistic Detection of Feeling Polarity Change.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Sampling Online Social Networks with Tailored Mining Strategies.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

High Performance Personal Adaptation Speech Recognition Framework by Incremental Learning with Plural Language Models.
Proceedings of the 15th International Conference on Signal-Image Technology & Internet-Based Systems, 2019

Designing Process-Centric Blockchain-Based Architectures: A Case Study in e-voting as a Service.
Proceedings of the Data-Driven Process Discovery and Analysis, 2019

More General Evaluation of a Client-Centered Counseling Agent.
Proceedings of the 2019 IEEE World Congress on Services, 2019

New Two-Level µTESLA Protocol for IoT Environments.
Proceedings of the 2019 IEEE World Congress on Services, 2019

Assessing Strategies for Sampling Dynamic Social Networks.
Proceedings of the Research & Innovation Forum 2019, 2019

Using AutoEncoders for Radio Signal Denoising.
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019

A Continuous Certification Methodology for DevOps.
Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019

Bargaining Compatible Explanations.
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019

The THREAT-ARREST Cyber-Security Training Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Model Driven Approach for Cyber Security Scenarios Deployment.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Machine Learning-Based Framework for Log-Lifting in Business Process Mining Applications.
Proceedings of the Business Process Management - 17th International Conference, 2019

Towards Blockchain-Based E-Voting Systems.
Proceedings of the Business Information Systems Workshops, 2019

A Methodology for Cross-Platform, Event-Driven Big Data Analytics-as-a-Service.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Overlapping Analytic Stages in Online Process Mining.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

Blockchain-Based E-Vote-as-a-Service.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Drone Pilot Identification by Classifying Radio-Control Signals.
IEEE Trans. Inf. Forensics Secur., 2018

Real-time image processing systems using fuzzy and rough sets techniques.
Soft Comput., 2018

Big Data Semantics.
J. Data Semant., 2018

Modeling time, probability, and configuration constraints for continuous cloud service certification.
Comput. Secur., 2018

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach.
IEEE Access, 2018

A Framework for Human-in-the-loop Monitoring of Concept-drift Detection in Event Log Stream.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A Visual Counseling Agent Avatar with Voice Conversation and Fuzzy Response.
Proceedings of the 2018 World Automation Congress, 2018

Visual Counseling Agent and its Evaluation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Counseling Robot Implementation and Evaluation.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning.
Proceedings of the 14th International Conference on Signal-Image Technology & Internet-Based Systems, 2018

Automated Monitoring of Collaborative Working Environments for Supporting Open Innovation.
Proceedings of the Knowledge Management in Organizations - 13th International Conference, 2018

Analysis of Shapelet Transform Usage in Traffic Event Detection.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

All-Implicants Neural Networks for Efficient Boolean Function Representation.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

A Comparative Analysis of Current Cryptocurrencies.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Toward IoT-Friendly Learning Models.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Moon Cloud: A Cloud Platform for ICT Security Governance.
Proceedings of the IEEE Global Communications Conference, 2018

A Knowledge-Based IoT Security Checker.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

Towards Conceptual Models for Machine Learning Computations.
Proceedings of the Conceptual Modeling - 37th International Conference, 2018

Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS).
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Pedigree-ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything.
Proceedings of the From Database to Cyber Security, 2018

A Fast and Incremental Development Life Cycle for Data Analytics as a Service.
Proceedings of the 2018 IEEE International Congress on Big Data, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018

Big Data Assurance Evaluation: An SLA-Based Approach.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

A Case for IoT Security Assurance.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
Extending the Outreach: From Smart Cities to Connected Communities.
ACM Trans. Internet Techn., 2017

An interval type-2 fuzzy active contour model for auroral oval segmentation.
Soft Comput., 2017

BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017

Computational intelligence for multimedia and industrial applications.
Multim. Tools Appl., 2017

On inter-Rater reliability of information security experts.
J. Inf. Secur. Appl., 2017

Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method.
Inf. Sci., 2017

Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review.
Inf. Syst., 2017

Big Data and Data Analytics Research: From Metaphors to Value Space for Collective Wisdom in Human Decision Making and Smart Machines.
Int. J. Semantic Web Inf. Syst., 2017

Pay-with-a-Selfie, a human-centred digital payment system.
CoRR, 2017

Towards Transparent and Trustworthy Cloud.
IEEE Cloud Comput., 2017

A multiple valued logic approach for the synthesis of garbled circuits.
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017

Big data platform for public health policies.
Proceedings of the 2017 IEEE SmartWorld, 2017

Context respectful counseling agent integrated with robot nodding for dialog promotion.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Extending the SVM integration with case based restarting GA to predict solar flare.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Design of Counseling Robot for Production by 3D Printer.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017

Flick: Japanese Input Method Editor Using N-Gram and Recurrent Neural Network Language Model Based Predictive Text Input.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017

Clause Anaphora Resolution of Japanese Demonstrative Determiner by Ontology Extension Using Distributed Expression of Words.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017

A Framework for Trace Clustering and Concept-drift Detection in Event Streams.
Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017), 2017

A Scattering Technique for Protecting Cryptographic Keys in the Cloud.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Summarization-Guided Greedy Optimization of Machine Learning Model.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2017

The Simplification Conspiracy.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Security enhancements to TLS for improved national control.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Monitoring darknet activities by using network telescope.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

How Reliable are Experts’ Assessments? A Case Study on UAV Security.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Scouting Big Data Campaigns using TOREADOR Labs.
Proceedings of the Workshops of the EDBT/ICDT 2017 Joint Conference (EDBT/ICDT 2017), 2017

Analysing Selfishness Flooding with SEINE.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Exploiting Quantum Gates in Secure Computation.
Proceedings of the Euromicro Conference on Digital System Design, 2017

Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

Toward a New Generation of Log Pre-processing Methods for Process Mining.
Proceedings of the Business Process Management Forum, 2017

What Are My Users Looking for When Preparing a Big Data Campaign.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

A Model-Driven Methodology for Big Data Analytics-as-a-Service.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency.
Proceedings of the Emerging Technologies for Developing Countries, 2017

Toward Model-Based Big Data-as-a-Service: The TOREADOR Approach.
Proceedings of the Advances in Databases and Information Systems, 2017

A Security Benchmark for OpenStack.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud.
Proceedings of the Computational Intelligence and Quantitative Software Engineering, 2016

Guest editorial: large-scale Web virtualized environment.
World Wide Web, 2016

A Configuration-Independent Score-Based Benchmark for Distributed Databases.
IEEE Trans. Serv. Comput., 2016

Bayer Demosaicking With Polynomial Interpolation.
IEEE Trans. Image Process., 2016

Real-time signal processing in embedded systems.
J. Syst. Archit., 2016

Network virtualization by differentially switched VPN for stable business communication with offshore computers.
J. Reliab. Intell. Environ., 2016

Special issue on intelligent systems and applications in vision, image and information computing.
J. Reliab. Intell. Environ., 2016

Locally estimated heterogeneity property and its fuzzy filter application for deinterlacing.
Inf. Sci., 2016

A Retinex model based on Absorbing Markov Chains.
Inf. Sci., 2016

Securing Cryptographic Keys in the Cloud: A Survey.
IEEE Cloud Comput., 2016

Virtual reality in learning, collaboration and behaviour: content, systems, strategies, context designs.
Behav. Inf. Technol., 2016

Enhanced IoT-Aware Online Shopping System.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Goal Aware Context Respectful Counseling Agent.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

SLA Negotiation and Monitoring from Simulation Data.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Analysis of Energy-Efficient Buildings through Simulation and Formal Methods.
Proceedings of the 6th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2016), 2016

Translating BPMN to Business Rules.
Proceedings of the Data-Driven Process Discovery and Analysis, 2016

Techniques, Technologies and Models for Big Data as a service.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016

A certification framework for cloud-based services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Translating Process Mining Results into Intelligible Business Information.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Highly enhanced context respectful counseling agent.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

Towards Model-Driven Big-Data-as-a-Service.
Proceedings of the ENASE 2016, 2016

On the predictive power of university curricula.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Big data analytics as-a-service: Issues and challenges.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

A Certification Technique for Cloud Security Adaptation.
Proceedings of the IEEE International Conference on Services Computing, 2016

A Cost-Effective Certification-Based Service Composition for the Cloud.
Proceedings of the IEEE International Conference on Services Computing, 2016

Lightweight Encryption for Smart Home.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Processes Meet Big Data: Connecting Data Science with Process Science.
IEEE Trans. Serv. Comput., 2015

Comparative evaluation of methods for filtering Kinect depth data.
Multim. Tools Appl., 2015

Guest editorial: online multimedia signal and image processing.
Multim. Tools Appl., 2015

Security and searchability in secret sharing-based data outsourcing.
Int. J. Inf. Sec., 2015

Toward Economic-Aware Risk Assessment on the Cloud.
IEEE Secur. Priv., 2015

From Security to Assurance in the Cloud: A Survey.
ACM Comput. Surv., 2015

iPrivacy: a Distributed Approach to Privacy on the Cloud.
CoRR, 2015

Editorial.
Computing, 2015

Privacy-Preserving Query Processing by Multi-Party Computation.
Comput. J., 2015

Applying recommender systems in collaboration environments.
Comput. Hum. Behav., 2015

Securing Cryptographic Keys in the IaaS Cloud Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Evaluation of Method for Multiplexing Communication Routes to Avoid Intentional Barriers.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Enhanced Context Respectful Counseling Agent.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Towards Self-Organizing Internet of Things - Aware Systems for Online Sales.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Process Mining in Big Data Scenario.
Proceedings of the 5th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2015), 2015

ENKI: Access Control for Encrypted Query Processing.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Security Aspects of De-materialized Local Public Administration Processes.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

Heterogeneous Business Process Management: A Metamodel-Based Approach.
Proceedings of the Knowledge Management in Organizations - 10th International Conference, 2015

Toward behavioral business process analysis.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Fast summarization and anonymization of multivariate big time series.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

Toward big data risk analysis.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

De-Materializing Local Public Administration Processes.
Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'15), 2015

Knowledge Driven Behavioural Analysis in Process Intelligence.
Proceedings of the International Workshop on Algorithms & Theories for the Analysis of Event Data, 2015

Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

Innovation Factory: An Innovative Collaboration and Management Scenario.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

A Test-Based Incremental Security Certification Scheme for Cloud-Based Systems.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Toward Security and Performance Certification of Open Stack.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

Experimental Proof: Data Remanence in Cloud VMs.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Multimedia on the web - editorial.
Multim. Tools Appl., 2014

A risk model for cloud processes.
ISC Int. J. Inf. Secur., 2014

An emotional word focused counseling agent and its evaluation.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Trustworthy Cloud Certification: A Model-Based Approach.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014

4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Network and Storage Latency Attacks to Online Trading Protocols in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Balanced Measurement Sets: Criteria for Improving Project Management Practices.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Driving knowledge acquisition via metric life-cycle in process intelligence.
Proceedings of the 14th International Conference on Knowledge Management and Data-driven Business, 2014

A Certification-Based Trust Model for Autonomic Cloud Computing Systems.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

Zero-Knowledge Evaluation of Service Performance Based on Simulation.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

The Problem of Handling Multiple Headers in WS-Security Implementations.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

E-Auctions for Multi-Cloud Service Provisioning.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

A Competitive Scalability Approach for Cloud Architectures.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

A Certification-Aware Service-Oriented Architecture.
Proceedings of the Advanced Web Services, 2014

2013
A test-based security certification scheme for web services.
ACM Trans. Web, 2013

Clustering Models in Secure Clustered Multiparty Computation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

An efficient language pipeline for flexible rule-based context representation.
J. Ambient Intell. Humaniz. Comput., 2013

Editorial.
J. Inf. Secur. Appl., 2013

Unleashing Operational Process Mining (Dagstuhl Seminar 13481).
Dagstuhl Reports, 2013

Clause Anaphora Resolution for Japanese Demonstrative Determiner Based on Semantic Similarity between Different Part-of-Speech.
Proceedings of the IEEE International Conference on Systems, 2013

Boosting the Innovation Process in Collaborative Environments.
Proceedings of the IEEE International Conference on Systems, 2013

SPADE: A Framework for After-Disaster Adaptive Recovery Processes.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Combining Semantic Lifting and Ad-hoc Contextual Analysis in a Data Loss Scenario.
Proceedings of the Data-Driven Process Discovery and Analysis, 2013

Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013

Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013

Towards the Certification of Cloud Services.
Proceedings of the IEEE Ninth World Congress on Services, 2013

A Multi-Party Protocol for Privacy-Preserving Range Queries.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Machine-Readable Privacy Certificates for Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Digital eco-system for online shopping.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

An agent based model of environmental awareness and limited resource consumption.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

Security Certification of Composite Services: A Test-Based Approach.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Many-player inspection games in networked environments.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

The cover time of neighbor-avoiding gossiping on geometric random networks.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case.
Proceedings of the IEEE International Congress on Big Data, 2013

Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
Proceedings of the Joint Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'13) and the International Workshop on Modeling and Business Environments (ModBE'13), Milano, Italy, June 24, 2013

Early Assessment of Service Performance Based on Simulation.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
SOAP Processing Performance and Enhancement.
IEEE Trans. Serv. Comput., 2012

Toward Sensor-Based Context Aware Systems.
Sensors, 2012

Editorial for intelligent interactive multimedia systems and services.
Multim. Tools Appl., 2012

Landmark-assisted location and tracking in outdoor mobile network.
Multim. Tools Appl., 2012

Using XML-Based Multicasting to Improve Web Service Scalability.
Int. J. Web Serv. Res., 2012

Web Service Assurance: The Notion and the Issues.
Future Internet, 2012

Security certification-aware service discovery and selection.
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012

Temporal Denoising of Kinect Depth Data.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Exploiting Participatory Design in Open Innovation Factories.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Towards a Collaborative Innovation Catalyst.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Multiple Structured Light-Based Depth Sensors for Human Motion Analysis: A Review.
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012

A Low-Cost Security Certification Scheme for Evolving Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Welcome from the Conference General Chairs.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Risk assessment of credit securities: The notion and the issues.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

A model-based approach to reliability certification of services.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Robust XML Watermarking Using Fuzzy Queries.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Database as a Service: Towards a Unified Solution for Security Requirements.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Rich Context Representation for Situation Aware System.
Proceedings of the Sixth International Conference on Complex, 2012

Scalability Patterns for Platform-as-a-Service.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Web Service Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Script Language Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Map-Based Location and Tracking in Multipath Outdoor Mobile Networks.
IEEE Trans. Wirel. Commun., 2011

Guest Editorial: Security and Dependability in SOA and Business Processes.
IEEE Trans. Serv. Comput., 2011

Augmented reality technologies, systems and applications.
Multim. Tools Appl., 2011

Editorial.
J. Syst. Archit., 2011

A Pattern for Web-based WSN Monitoring (Invited Paper).
J. Commun., 2011

Secure Collaborative Supply-Chain Management.
Computer, 2011

eHR-KM - First International Workshop on Knowledge Management and e-Human Resources Practices for Innovation.
Proceedings of the 6th Conference on Professional Knowledge Management: From Knowledge to Action, 2011

CR2S: Competency Roadmap to Strategy.
Proceedings of the 6th Conference on Professional Knowledge Management: From Knowledge to Action, 2011

Toward Open World and Multimodal Situation Models for Sensor-Aware Web Platforms.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Efficient and Rich Context Representation for Web Applications.
Proceedings of the Seventh International Conference on Signal-Image Technology and Internet-Based Systems, 2011

Monitoring Business Processes in the Networked Enterprise.
Proceedings of the Data-Driven Process Discovery and Analysis, 2011

DOA-SVI 2011 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

SWWS 2011, MONET 2011 and SeDeS 2011 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011 Workshops, 2011

Towards Pattern-Based Reliability Certification of Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

Overcoming NAT traversal issue for SIP-based communication in P2P networks.
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011

What is a "musical world"?: an affinity propagation approach.
Proceedings of the 1st international ACM workshop on Music information retrieval with user-centered and multimodal strategies, Scottsdale, AZ, USA, November 28, 2011

Towards an agent-based architecture for managing uncertainty in situation awareness.
Proceedings of the 2011 IEEE Symposium on Intelligent Agent, 2011

Differential SOAP Multicasting.
Proceedings of the IEEE International Conference on Web Services, 2011

Defining and Matching Test-Based Certificates in Open SOA.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Improving Quality and Cost-Effectiveness in Enterprise Software Application Development: An Open, Holistic Approach for Project Monitoring and Control.
Proceedings of the Software Business - Second International Conference, 2011

On the use of design patterns in collaborative design processes.
Proceedings of the Procedings of the Second Conference on Creativity and Innovation in Design, 2011

A Privacy Preserving Reputation Protocol for Web Service Provider Selection.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011


Fine-Grained Modeling of Web Services for Test-Based Security Certification.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Guest Editorial: Special Issue on Human-Centered Web Science.
World Wide Web, 2010

Semantics-aware matching strategy (SAMS) for the Ontology meDiated Data Integration (ODDI).
Int. J. Knowl. Eng. Soft Data Paradigms, 2010

Special issue: Open Source Certification.
Comput. Syst. Sci. Eng., 2010

Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach
CoRR, 2010

Container-Level Security Certification of Services.
Proceedings of the Business System Management and Engineering, 2010

DOA'10 - PC Co-chairs Message.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

SWWS'10 - PC Co-chairs Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

KPI Modeling in MDA Perspective.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

Spago4Q and the QEST <i>n</i>D Model: An Open Source Solution for Software Performance Measurement.
Proceedings of the Open Source Software: New Horizons, 2010

Combining multi-probe histogram and order-statistics based LSH for scalable audio content retrieval.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Using incentive schemes to alleviate supply chain risks.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

A novel architecture for a Peer-to-Peer Session Initiation Protocol.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Implementing Open Source Software Governance in Real Software Assurance Processes.
Proceedings of the Software Business - First International Conference, 2010

Representing Immaterial Value in Business Model.
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

Multimodality in Pervasive Environment.
Proceedings of the Semantic Challenges in Sensor Networks, 24.01. - 29.01.2010, 2010

Toward Cloud-Based Key Management for Outsourced Databases.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Representing and Validating Digital Business Processes.
Proceedings of the Advances in Web Semantics I, 2009

Concept of Linguistic Variable-Based Fuzzy Ensemble Approach: Application to Interlaced HDTV Sequences.
IEEE Trans. Fuzzy Syst., 2009

Editorial.
J. Syst. Archit., 2009

A fuzzy extension of the XPath query language.
J. Intell. Inf. Syst., 2009

Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing.
Image Vis. Comput., 2009

Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion.
Inf. Sci., 2009

Toward WS-certificate.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

Privacy Preserving Risk Assessment of Credit Securities.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Supply Chain Risk Analysis: Open Source Simulator.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

WS-Certificate.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

SWWS 2009 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009

Assurance Evaluation for OSS Adoption in a Telco Context.
Proceedings of the Open Source Ecosystems: Diverse Communities Interacting, 2009

Fast and low cost 3d object recognition.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Risk-aware Collaborative Processes.
Proceedings of the ICEIS 2009, 2009

A toward Framework for Generic Uncertainty Management.
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009

RSVP-TE Based Impairments Collection Mechanism in DWDM Network.
Proceedings of the Communications Infrastructure. Systems and Applications in Europe, 2009

Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09).
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

Active Rules for Business Value Models.
Proceedings of the Database and Expert Systems Applications, 2009

Assurance Process for Large Open Source Code Bases.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Designing and Developing Monitoring Agents for ERP Systems.
Proceedings of the Business Information Systems, 12th International Conference, 2009

Open Source Systems Security Certification.
Springer, ISBN: 978-0-387-77323-0, 2009

2008
Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Guest Editorial.
J. Comput. Secur., 2008

Advanced Localization of Mobile Terminal in Cellular Network.
Int. J. Commun. Netw. Syst. Sci., 2008

A general approach to securely querying XML.
Comput. Stand. Interfaces, 2008

Global consensus emergence in an unstructured semantic network.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

Semantics-Aware Resolution of Multi-part Persistent Indentifiers.
Proceedings of the Emerging Technologies and Information Systems for the Knowledge Society, 2008

Cloaking games in location based services.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Efficient SOAP message exchange and evaluation through XML similarity.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Robust Fuzzy Filter for Noise Reduction in Video Deinterlacing.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

A flexible extension of XPath to improve XML querying.
Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2008

Which Role for an Ontology of Uncertainty?
Proceedings of the Fourth International Workshop on Uncertainty Reasoning for the Semantic Web, 2008

A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Consensus Emergence from Naming Games in Representative AgentSemantic Overlay Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Ontology Robustness in Evolution.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

PMLite: An Open Source Solution for Process Monitoring.
Proceedings of the Open Source Development, 2008

Mapping Linux Security Targets to Existing Test Suites.
Proceedings of the Open Source Development, 2008

ODDI: Ontology-Driven Data Integration.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Persistent Identifiers distributed system for Cultural Heritage digital objects.
Proceedings of the 5th International Conference on Digital Preservation, 2008

ODDI - A Framework for Semi-automatic Data Integration.
Proceedings of the ICEIS 2008, 2008

A Framework for Semi-automatic Data Integration.
Proceedings of the Enterprise Information Systems, 10th International Conference, 2008

Using XML Similarity to Enhance SOAP Messages Security.
Proceedings of the 2008 International Conference on Internet Computing, 2008

A Web 2.0 Platform Supporting Collaborative Development of Personal Skills.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

SAF: Strategic Alignment Framework for Monitoring Organizations.
Proceedings of the Business Information Systems, 11th International Conference, 2008

The Use of a Meta-Model to Support Multi-Project Process Measurement.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

2007
Bottom-Up Extraction and Trust-Based Refinement of Ontology Metadata.
IEEE Trans. Knowl. Data Eng., 2007

Learning Computer Networking on Open Paravirtual Laboratories.
IEEE Trans. Educ., 2007

Fuzzy Weighted Approach to Improve Visual Quality of Edge-Based Filtering.
IEEE Trans. Consumer Electron., 2007

Rough Sets-Assisted Subfield Optimization for Alternating Current Plasma Display Panel.
IEEE Trans. Consumer Electron., 2007

Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach.
SIGMETRICS Perform. Evaluation Rev., 2007

Toward semantics-aware management of intellectual property rights.
Online Inf. Rev., 2007

Secure Authentication Process for High Sensitive Data E-Services: A Roadmap.
J. Cases Inf. Technol., 2007

A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

A Metamodel for Modeling and Measuring Scrum Development Process.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

Representing and Validating Digital Business Processes.
Proceedings of the Web Information Systems and Technologies, 2007

L-VCONF: A Location-Aware Infrastructure for Battlefield Videoconferences.
Proceedings of the IEEE International Conference on Virtual Environments, 2007

Full Controllable Face Detection System Architecture for Robotic Vision.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Trustworthiness-related Uncertainty of Semantic Web-style Metadata: A Possibilistic Approach.
Proceedings of the Third ISWC Workshop on Uncertainty Reasoning for the Semantic Web Busan, 2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Proceedings of the New Approaches for Security, 2007

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Proceedings of the New Approaches for Security, 2007

Using Ontologies to Map Concept Relations in a Data Integration System.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Introduction to OSS 2007 Tutorial Program.
Proceedings of the Open Source Development, 2007

FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical Environments.
Proceedings of the Open Source Development, 2007

Navigation Dynamics as a Biometrics for Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Securely Updating XML.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

FuzzyXPath: Using Fuzzy Logic an IR Features to Approximately Query XML Documents.
Proceedings of the Foundations of Fuzzy Logic and Soft Computing, 2007

Location Privacy Protection Through Obfuscation-Based Techniques.
Proceedings of the Data and Applications Security XXI, 2007

Anomalies Detection in Mobile Network Management Data.
Proceedings of the Advances in Databases: Concepts, 2007

Assessing Business Process Security Awareness: A Service-Oriented Approach.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Managing Privacy in LBAC Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

XML Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Trust Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Adding a Trust Layer to Semantic Web Metadata.
Proceedings of the Soft Computing in Web Information Retrieval - Models and Applications, 2006

Measuring Inference Exposure in Outsourced Encrypted Databases.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Preface.
J. Syst. Archit., 2006

Discovering the software process by means of stochastic workflow analysis.
J. Syst. Archit., 2006

Viewpoints on Emergent Semantics.
J. Data Semant., 2006

Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
J. Assoc. Inf. Sci. Technol., 2006

Selective Data Encryption in Outsourced Dynamic Environments.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Special issue: Web service security.
Comput. Syst. Sci. Eng., 2006

Psychology-Aware Video-Enabled Workplace.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Directions and trends of XML and web service security.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

3D Expressive Face Model-based Tracking Algorithm.
Proceedings of the IASTED International Conference on Signal Processing, 2006

CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

SWWS 2006 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

OntoExtractor: A Fuzzy-Based Approach to Content and Structure-Based Metadata Extraction.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper).
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On.
Proceedings of the Open Source Systems, 2006

Modality conflicts in semantics aware access control.
Proceedings of the 6th International Conference on Web Engineering, 2006

Extending Context Descriptions in Semantics-Aware Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

Supporting location-based conditions in access control policies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Bottom-up extraction and maintenance of ontology-based metadata.
Proceedings of the Fuzzy Logic and the Semantic Web, 2006

2005
Modeling and assessing inference exposure in encrypted databases.
ACM Trans. Inf. Syst. Secur., 2005

A WOWA-based Aggregation Technique on Trust Values Connected to Metadata.
Proceedings of the First International Workshop on Security and Trust Management, 2005

Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy.
Proceedings of the SWAP 2005, 2005

Key management for multi-user encrypted databases.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Facial identification problem: A tracking based approach.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

Metadata Management in Outsourced Encrypted Databases.
Proceedings of the Secure Data Management, 2005

Adding a Peer-to-Peer Trust Layer to Metadata Generators.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Detecting Ontology Change from Application Data Flows.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

An Architecture of a Wavelet Based Approach for the Approximate Querying of Huge Sets of Data in the Telecommunication Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

OntoExtractor: A Fuzzy-Based Approach in Clustering Semi-structured Data Sources and Metadata Generation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Generate Context Metadata Based on Biometric System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Offline Expansion of XACML Policies Based on P3P Metadata.
Proceedings of the Web Engineering, 5th International Conference, 2005

Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005

Advanced Metadata for Privacy-Aware Representation of Credentials.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Towards Privacy-Enhanced Authorization Policies and Languages.
Proceedings of the Data and Applications Security XIX, 2005

The Architecture of a Privacy-Aware Access Control Decision Component.
Proceedings of the Construction and Analysis of Safe, 2005

2004
XML-based access control languages.
Inf. Secur. Tech. Rep., 2004

Editorial.
Int. J. Pattern Recognit. Artif. Intell., 2004

A Web Service Architecture for Enforcing Access Control Policies.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Semantics-aware techniques for security.
Comput. Syst. Sci. Eng., 2004

Special issue: Semantics-Aware Techniques for Security.
Comput. Syst. Sci. Eng., 2004

Spam attacks: p2p to the rescue.
Proceedings of the 13th international conference on World Wide Web, 2004

P2P-Based Collaborative Spam Detection and Filtering.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Extending Policy Languages to the Semantic Web.
Proceedings of the Web Engineering - 4th International Conference, 2004

Mining Class Hierarchies from XML Data: Representation Techniques.
Proceedings of the Computational Intelligence, Theory and Applications, International Conference 8th Fuzzy Days, Dortmund, Germany, Sept. 29, 2004

A Protocol for Reputation Management in Super-Peer Networks.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

Invited Talk - Towards Semantics-Aware Access Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Managing and Sharing Servents' Reputations in P2P Systems.
IEEE Trans. Knowl. Data Eng., 2003

Managing Multiple and Dependable Identities.
IEEE Internet Comput., 2003

Editorial.
Comput. Syst. Sci. Eng., 2003

An XML-based approach to combine firewalls and web services security specifications.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Implementation of a Storage Mechanism for Untrusted DBMSs.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

Securing XML-based Multimedia Content.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Security Framework for Mobile Agent Platforms (SFMAP).
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Modeling Semistructured Data by Using Graph-Based Constraints.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

WMS 2003 PC Co-chairs' Message.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Semantics-Aware Perimeter Protection.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Balancing confidentiality and efficiency in untrusted relational DBMSs.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

A Ontology-based Process Modelling for XP.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

Human-centered e-business.
Kluwer, ISBN: 978-1-4020-7442-4, 2003

2002
A fine-grained access control system for XML documents.
ACM Trans. Inf. Syst. Secur., 2002

XML access control systems: a component-based approach.
Informatica (Slovenia), 2002

Securing SOAP e-services.
Int. J. Inf. Sec., 2002

Towards securing XML Web services.
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002

Choosing reputable servents in a P2P network.
Proceedings of the Eleventh International World Wide Web Conference, 2002

Implementing a Reputation-Aware Gnutella Servent.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

The APPROXML Tool Demonstration.
Proceedings of the Advances in Database Technology, 2002

Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Computing graphical queries over XML data.
ACM Trans. Inf. Syst., 2001

Fuzzy service selection in a distributed object-oriented environment.
IEEE Trans. Fuzzy Syst., 2001

Controlling Access to XML Documents.
IEEE Internet Comput., 2001

Software reuse in-the-small: automating group rewarding.
Inf. Softw. Technol., 2001

Fine grained access control for SOAP E-services.
Proceedings of the Tenth International World Wide Web Conference, 2001

An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Temporal Aspects of Semistructured Data.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001

Fuzzy Techniques for XML Data Smushing.
Proceedings of the Computational Intelligence, 2001

A Component-Based Architecture for Secure Data Publication.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Fuzzy XML queries via context-based choice of aggregations.
Kybernetika, 2000

Design and implementation of an access control processor for XML documents.
Comput. Networks, 2000

Software Reuse Technology Practices and Assessment Tool-Kit.
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000

Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Blind queries to XML data.
Proceedings of the Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2000

Complex Queries in XML-GL.
Proceedings of the Applied Computing 2000, 2000

Flexible query techniques for well-formed XML documents.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

Dynamic Optimisation of Non-linear Feed Forward Circuits.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2000

Soft Computing Techniques for an Intelligent use of Internet Resources.
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000

Fuzzy service selection in active networks.
Proceedings of the Ninth IEEE International Conference on Fuzzy Systems, 2000

Querying UML/XML Design Information.
Proceedings of the Flexible Query Answering Systems, 2000

Securing XML Documents.
Proceedings of the Advances in Database Technology, 2000

1999
Corrigenda: a hierarchy-aware approach to faceted classification of object-oriented components.
ACM Trans. Softw. Eng. Methodol., 1999

A Hierarchy-aware Approach to Faceted Classification of Objected-Oriented Components.
ACM Trans. Softw. Eng. Methodol., 1999

Dynamic Service Identification in A Distributed Environment.
J. Adv. Comput. Intell. Intell. Informatics, 1999

XML-GL: A Graphical Language for Querying and Restructuring XML Documents.
Comput. Networks, 1999

User Opinions and Rewards in a Reuse-Based Development System.
Proceedings of the Fifth ACM SIGSOFT Symposium on Software Reusability, 1999

A Human Centered Agent-Based Architecture for Electronic brokerage.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Flexible Queries to Semistructured Datasources: The WG-log Approach.
Proceedings of the Third ICSC Symposia on Intelligent Industrial Automation (IIA'99) and Soft Computing (SOCO'99), 1999

Semantics-Aware Querying in the WWW: The WG-Log Web Query System.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

A Human Centered Architecture for Distributed Retrieval of Medical Images.
Proceedings of the Computational Intelligence, 1999

A General-Purpose Fuzzy Engine for Crop Control.
Proceedings of the Computational Intelligence, 1999

On-Line Evolution of FPGA-Based Circuits: A Case Study on Hash Functions.
Proceedings of the 1st NASA / DoD Workshop on Evolvable Hardware (EH '99), 1999

Using WG-log Schemata to Represent Semistructured Data.
Proceedings of the Database Semantics, 1999

1998
A foreword from the guest editors.
Soft Comput., 1998

XML-GL: A Graphical Language for Querying and Reshaping XML Documents.
Proceedings of the Query Languages Workshop, Boston, 1998

Automatic Synthesis of Hashing Function Circuits using Evolutionary Techniques.
Proceedings of the 11th Annual Symposium on Integrated Circuits Design, 1998

Fast recall of reusable fuzzy plans using acyclic directed graph memory.
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

Evolutionary Design of Hashing Function Circuits Using an FPGA.
Proceedings of the Evolvable Systems: From Biology to Hardware, 1998

A Schema-Based Approach to Modeling and Querying WWW Data.
Proceedings of the Flexible Query Answering Systems, Third International Conference, 1998

1997
A Descriptor-Based Approach to OO Code Reuse.
Computer, 1997

Structuring and Querying the Web through Graph-Oriented Languages.
Proceedings of the Convegno Nazionale Sistemi Evolluti per Basi di Dati, 1997

Dynamic clustering for technology-based domain analysis (TDA).
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

Fuzzy Identification of Distributed Components.
Proceedings of the Computational Intelligence, 1997

Semantic Approaches to Structuring and Querying Web Sites.
Proceedings of the Data Mining and Reverse Engineering: Searching for Semantics, 1997

Reusing Analysis Schemas in ODB Applications: a Chart Based Approach.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997

1996
Retrieval of Reusable Components Using Functional Similarity.
Softw. Pract. Exp., 1996

Una estensione fuzzy del modello relazionale per il riutilizzo di componenti software.
Proceedings of the Atti del Quarto Convegno Nazionale su Sistemi Evoluti per Basi di Dati (4th National Conference on Advanced Database Systems), 1996

Fuzzy applications (panel session - title only).
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

Fuzzy techniques for software reuse.
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

1995
Automatic thesaurus construction supporting fuzzy retrieval of reusable components.
Proceedings of the 1995 ACM symposium on applied computing, 1995

1994
Decompositions of B<sub>n</sub> and PI<sub>n</sub> Using Symmetric Chains.
J. Comb. Theory A, 1994

Whitney Numbers of Some Geometric Lattices.
J. Comb. Theory A, 1994

1992
The design of a microkernel application platform for shop-floor automation extended abstract.
Future Gener. Comput. Syst., 1992


  Loading...