149 results on '"Palmieri, Francesco"'
Search Results
2. Energy-aware Optimization of Data Centers and Cybersecurity Issues
3. Split-word Architecture in Recurrent Neural Networks POS-Tagging
4. Multipath Data Fusion With Recursive ML-PDA and Generative ML-PMHT for VLO Targets in Underwater Environment.
5. Incipient Residual-Based Anomaly Detection in Power Electronic Devices.
6. A Scheduling Framework for Latency Optimization on 5G Mobile Edge Computing Infrastructures
7. Lightweight Ciphers in Automotive Networks: A Preliminary Approach
8. Information-Preserving Networks And The Mirrored Transform
9. A Fraud-Resilient Blockchain-Based Solution for Invoice Financing.
10. Measurement Extraction for Two Closely-Spaced Objects Using an Imaging Sensor.
11. COMPUTATIONAL OPTIMIZATION FOR NORMAL FORM REALIZATION OF BAYESIAN MODEL GRAPHS
12. Multidimensional Cramér-Rao-Leibniz lower bound for vector-measurement-based likelihood functions with parameter-dependent support
13. A Conflict Detection Method for Ellipsoidal Safety Regions.
14. Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks
15. Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification
16. A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things
17. Distributed strategic learning for effective gossiping in wireless networks
18. Interoperable Access Control by Means of a Semantic Approach
19. Semantic Cross-View Matching
20. Format-Independent Protection of DNA Microarray Images
21. An Artificial Intelligence-Based Trust Model for Pervasive Computing
22. Multiple Ornstein–Uhlenbeck Processes for Maritime Traffic Graph Representation.
23. Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
24. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM.
25. A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
26. Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems.
27. Discrete independent component analysis (DICA) with belief propagation
28. Two-dimensional multi-layer Factor Graphs in Reduced Normal Form
29. A honeypot system with honeyword-driven fake interactive sessions
30. Supporting First Responders Localization during Crisis Management
31. The untrusted handover security of the S-PMIPv6 on LTE-A
32. On the Protection of fMRI Images in Multi-domain Environments
33. Heterogeneous Network Handover Using 3GPP ANDSF
34. On Reliability and Security in Knowledge Grids
35. Point-based path prediction from polar histograms.
36. The Multidimensional Cram?r?Rao?Leibniz Lower Bound for Likelihood Functions With Parameter-Dependent Support.
37. Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks.
38. Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome
39. Online Bayesian learning and classification of ship-to-ship interactions for port safety
40. Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers
41. A multi-camera Multi-Target Tracker based on Factor Graphs
42. Belief propagation and learning in convolution multi-layer factor graphs
43. Application of factor graphs to multi-camera fusion for maritime tracking
44. An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update
45. Image fusion for object tracking using Factor Graphs
46. Multimedia-based battery drain attacks for Android devices
47. Supporting First Responders Localization during Crisis Management.
48. Two-dimensional multi-layer Factor Graphs in Reduced Normal Form.
49. An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications
50. On Secure Data Management in Health-Care Environment
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.