Sfoglia per Serie LECTURE NOTES IN COMPUTER SCIENCE
2010 CoreGRID/ERCIM Workshop on Grids, Clouds and P2P Computing
2010-01-01 Danelutto, Marco; Desprez, F; Fragopoulou, P; Stewart, A.
8th MEDEA Workshop: Guest Editor Introduction
2011-01-01 S., Bartolini; Foglia, Pierfrancesco; Prete, COSIMO ANTONIO
A Cross-Layer Approach for Publish/Subscribe in Mobile Ad Hoc Networks
2005-01-01 Avvenuti, Marco; Vecchio, Alessio; Turi, G.
A Formal Basis for Reasoning on Programmable QoS
2003-01-01 DE NICOLA, R; Ferrari, GIAN-LUIGI; Montanari, U; Pugliese, R; Tuosto, E.
A formal support to business and architectural design for service-oriented systems
2011-01-01 Bruni, Roberto; Foster, H; LLUCH LAFUENTE, A; Montanari, UGO GIOVANNI ERASMO; Tuosto, E.
A Methodological Overview on Anomaly Detection
2013-01-01 Callegari, Christian; Angelo, Coluccia; Alessandro, D’Alconzo; Wendy, Ellens; Giordano, Stefano; Michel, Mandjes; Pagano, Michele; Teresa, Pepe; Fabio, Ricciato; Piotr, Z̊uraniewski
A New Band Selection Strategy for Target Detection in Hyperspectral Images
2008-01-01 Diani, Marco; Acito, N; Greco, M; Corsini, Giovanni
A self-interpreter of lambda calculus having a normal form
1993-01-01 Berarducci, Alessandro; Bohm, C.
Accurate Blind Predictions of OpenFOAM Energy Consumption Using the LBM Prediction Model
2014-01-01 Morelli, Davide; Cisternino, Antonio
Achieving flow isolation in 802.11 networks with the DTT scheduler
2006-01-01 Garroppo, ROSARIO GIUSEPPE; Giordano, Stefano; Lucetti, Stefano; Tavanti, Luca
Active-U-Datalog: Integrating active rules in a logical update language.
1998-01-01 E., Bertino; B., Catania; Gervasi, Vincenzo; A., Raffaetà
Adaptable Transition Systems
2013-01-01 Bruni, Roberto; Corradini, Andrea; Gadducci, Fabio; Alberto, Lafuente; Andrea, Vandin
Admission region of multimedia services for EDCA in IEEE 802.11e access networks
2005-01-01 Garroppo, ROSARIO GIUSEPPE; Giordano, Stefano; Lucetti, Stefano; Tavanti, Luca
Admission Region of Multimedia Services for EDCA in IEEE 802.11e Access Networks
2005-01-01 Garroppo, ROSARIO GIUSEPPE; Giordano, Stefano; Stefano, Lucetti; Luca, Tavanti
Agnostic Label-Only Membership Inference Attack
2023-01-01 Monreale, A.; Naretto, F.; Rizzo, S.
AGREE – algebraic graph rewriting with controlled embedding
2015-01-01 Corradini, Andrea; Duval, Dominique; Echahed, Rachid; Prost, Frederic; Ribeiro, Leila
Algorithmic Systems Ecology: Experiments on Multiple Interaction Types and Patches
2014-01-01 Kahramanogullari, Ozan; Lynch, James; Priami, Corrado
An Entropy Based Method for Local Time-Adaptation of the Spectrogram
2011-01-01 Liuni, M; Roebel, A; Romito, Marco; Rodet, X.
An Introduction to Modelling and Performance Evaluation for TCP Networks
2011-01-01 Pagano, Michele; Secchi, R.
Analysis and performance evaluation of a Connection Admission Control scheme based on the many sources asymptotic
2001-01-01 Bernardini, G; Giordano, Stefano; Procissi, Gregorio; Tartarelli, S.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
2010 CoreGRID/ERCIM Workshop on Grids, Clouds and P2P Computing | 1-gen-2010 | Danelutto, Marco; Desprez, F; Fragopoulou, P; Stewart, A. | |
8th MEDEA Workshop: Guest Editor Introduction | 1-gen-2011 | S., Bartolini; Foglia, Pierfrancesco; Prete, COSIMO ANTONIO | |
A Cross-Layer Approach for Publish/Subscribe in Mobile Ad Hoc Networks | 1-gen-2005 | Avvenuti, Marco; Vecchio, Alessio; Turi, G. | |
A Formal Basis for Reasoning on Programmable QoS | 1-gen-2003 | DE NICOLA, R; Ferrari, GIAN-LUIGI; Montanari, U; Pugliese, R; Tuosto, E. | |
A formal support to business and architectural design for service-oriented systems | 1-gen-2011 | Bruni, Roberto; Foster, H; LLUCH LAFUENTE, A; Montanari, UGO GIOVANNI ERASMO; Tuosto, E. | |
A Methodological Overview on Anomaly Detection | 1-gen-2013 | Callegari, Christian; Angelo, Coluccia; Alessandro, D’Alconzo; Wendy, Ellens; Giordano, Stefano; Michel, Mandjes; Pagano, Michele; Teresa, Pepe; Fabio, Ricciato; Piotr, Z̊uraniewski | |
A New Band Selection Strategy for Target Detection in Hyperspectral Images | 1-gen-2008 | Diani, Marco; Acito, N; Greco, M; Corsini, Giovanni | |
A self-interpreter of lambda calculus having a normal form | 1-gen-1993 | Berarducci, Alessandro; Bohm, C. | |
Accurate Blind Predictions of OpenFOAM Energy Consumption Using the LBM Prediction Model | 1-gen-2014 | Morelli, Davide; Cisternino, Antonio | |
Achieving flow isolation in 802.11 networks with the DTT scheduler | 1-gen-2006 | Garroppo, ROSARIO GIUSEPPE; Giordano, Stefano; Lucetti, Stefano; Tavanti, Luca | |
Active-U-Datalog: Integrating active rules in a logical update language. | 1-gen-1998 | E., Bertino; B., Catania; Gervasi, Vincenzo; A., Raffaetà | |
Adaptable Transition Systems | 1-gen-2013 | Bruni, Roberto; Corradini, Andrea; Gadducci, Fabio; Alberto, Lafuente; Andrea, Vandin | |
Admission region of multimedia services for EDCA in IEEE 802.11e access networks | 1-gen-2005 | Garroppo, ROSARIO GIUSEPPE; Giordano, Stefano; Lucetti, Stefano; Tavanti, Luca | |
Admission Region of Multimedia Services for EDCA in IEEE 802.11e Access Networks | 1-gen-2005 | Garroppo, ROSARIO GIUSEPPE; Giordano, Stefano; Stefano, Lucetti; Luca, Tavanti | |
Agnostic Label-Only Membership Inference Attack | 1-gen-2023 | Monreale, A.; Naretto, F.; Rizzo, S. | |
AGREE – algebraic graph rewriting with controlled embedding | 1-gen-2015 | Corradini, Andrea; Duval, Dominique; Echahed, Rachid; Prost, Frederic; Ribeiro, Leila | |
Algorithmic Systems Ecology: Experiments on Multiple Interaction Types and Patches | 1-gen-2014 | Kahramanogullari, Ozan; Lynch, James; Priami, Corrado | |
An Entropy Based Method for Local Time-Adaptation of the Spectrogram | 1-gen-2011 | Liuni, M; Roebel, A; Romito, Marco; Rodet, X. | |
An Introduction to Modelling and Performance Evaluation for TCP Networks | 1-gen-2011 | Pagano, Michele; Secchi, R. | |
Analysis and performance evaluation of a Connection Admission Control scheme based on the many sources asymptotic | 1-gen-2001 | Bernardini, G; Giordano, Stefano; Procissi, Gregorio; Tartarelli, S. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile