Ernesto Damiani

According to our database1, Ernesto Damiani authored at least 417 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Test-Based Security Certification of Composite Services.
TWEB, 2019

Special issue on real-time image and video processing in mobile embedded systems.
J. Real-Time Image Processing, 2019

Towards AI-Powered Multiple Cloud Management.
IEEE Internet Computing, 2019

The cognitive computing turn in education: Prospects and application.
Computers in Human Behavior, 2019

Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Drone Pilot Identification by Classifying Radio-Control Signals.
IEEE Trans. Information Forensics and Security, 2018

Real-time image processing systems using fuzzy and rough sets techniques.
Soft Comput., 2018

Big Data Semantics.
J. Data Semantics, 2018

Modeling time, probability, and configuration constraints for continuous cloud service certification.
Computers & Security, 2018

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach.
IEEE Access, 2018

A Framework for Human-in-the-loop Monitoring of Concept-drift Detection in Event Log Stream.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A Visual Counseling Agent Avatar with Voice Conversation and Fuzzy Response.
Proceedings of the 2018 World Automation Congress, 2018

Visual Counseling Agent and its Evaluation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Counseling Robot Implementation and Evaluation.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Automated Monitoring of Collaborative Working Environments for Supporting Open Innovation.
Proceedings of the Knowledge Management in Organizations - 13th International Conference, 2018

Analysis of Shapelet Transform Usage in Traffic Event Detection.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

All-Implicants Neural Networks for Efficient Boolean Function Representation.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

A Comparative Analysis of Current Cryptocurrencies.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Toward IoT-Friendly Learning Models.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Moon Cloud: A Cloud Platform for ICT Security Governance.
Proceedings of the IEEE Global Communications Conference, 2018

A Knowledge-Based IoT Security Checker.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

Towards Conceptual Models for Machine Learning Computations.
Proceedings of the Conceptual Modeling - 37th International Conference, 2018

Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS).
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Pedigree-ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything.
Proceedings of the From Database to Cyber Security, 2018

A Fast and Incremental Development Life Cycle for Data Analytics as a Service.
Proceedings of the 2018 IEEE International Congress on Big Data, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based.
Proceedings of the Emerging Technologies for Developing Countries, 2018

Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype.
Proceedings of the Emerging Technologies for Developing Countries, 2018

Big Data Assurance Evaluation: An SLA-Based Approach.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Extending the Outreach: From Smart Cities to Connected Communities.
ACM Trans. Internet Techn., 2017

An interval type-2 fuzzy active contour model for auroral oval segmentation.
Soft Comput., 2017

BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Security and Communication Networks, 2017

Computational intelligence for multimedia and industrial applications.
Multimedia Tools Appl., 2017

On inter-Rater reliability of information security experts.
J. Inf. Sec. Appl., 2017

Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method.
Inf. Sci., 2017

Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review.
Inf. Syst., 2017

Big Data and Data Analytics Research: From Metaphors to Value Space for Collective Wisdom in Human Decision Making and Smart Machines.
Int. J. Semantic Web Inf. Syst., 2017

Towards Transparent and Trustworthy Cloud.
IEEE Cloud Computing, 2017

A multiple valued logic approach for the synthesis of garbled circuits.
Proceedings of the 2017 IFIP/IEEE International Conference on Very Large Scale Integration, 2017

Big data platform for public health policies.
Proceedings of the 2017 IEEE SmartWorld, 2017

Context respectful counseling agent integrated with robot nodding for dialog promotion.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Extending the SVM integration with case based restarting GA to predict solar flare.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Design of Counseling Robot for Production by 3D Printer.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017

Flick: Japanese Input Method Editor Using N-Gram and Recurrent Neural Network Language Model Based Predictive Text Input.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017

Clause Anaphora Resolution of Japanese Demonstrative Determiner by Ontology Extension Using Distributed Expression of Words.
Proceedings of the 13th International Conference on Signal-Image Technology & Internet-Based Systems, 2017

A Framework for Trace Clustering and Concept-drift Detection in Event Streams.
Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017), 2017

A Scattering Technique for Protecting Cryptographic Keys in the Cloud.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Summarization-Guided Greedy Optimization of Machine Learning Model.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2017

Security enhancements to TLS for improved national control.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Monitoring darknet activities by using network telescope.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

How Reliable are Experts’ Assessments? A Case Study on UAV Security.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Scouting Big Data Campaigns using TOREADOR Labs.
Proceedings of the Workshops of the EDBT/ICDT 2017 Joint Conference (EDBT/ICDT 2017), 2017

Analysing Selfishness Flooding with SEINE.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Exploiting Quantum Gates in Secure Computation.
Proceedings of the Euromicro Conference on Digital System Design, 2017

Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

Toward a New Generation of Log Pre-processing Methods for Process Mining.
Proceedings of the Business Process Management Forum, 2017

What Are My Users Looking for When Preparing a Big Data Campaign.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

A Model-Driven Methodology for Big Data Analytics-as-a-Service.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency.
Proceedings of the Emerging Technologies for Developing Countries, 2017

Toward Model-Based Big Data-as-a-Service: The TOREADOR Approach.
Proceedings of the Advances in Databases and Information Systems, 2017

A Security Benchmark for OpenStack.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Guest editorial: large-scale Web virtualized environment.
World Wide Web, 2016

A Configuration-Independent Score-Based Benchmark for Distributed Databases.
IEEE Trans. Services Computing, 2016

Bayer Demosaicking With Polynomial Interpolation.
IEEE Trans. Image Processing, 2016

Real-time signal processing in embedded systems.
Journal of Systems Architecture - Embedded Systems Design, 2016

Network virtualization by differentially switched VPN for stable business communication with offshore computers.
J. Reliable Intelligent Environments, 2016

Special issue on intelligent systems and applications in vision, image and information computing.
J. Reliable Intelligent Environments, 2016

Locally estimated heterogeneity property and its fuzzy filter application for deinterlacing.
Inf. Sci., 2016

A Retinex model based on Absorbing Markov Chains.
Inf. Sci., 2016

Securing Cryptographic Keys in the Cloud: A Survey.
IEEE Cloud Computing, 2016

Virtual reality in learning, collaboration and behaviour: content, systems, strategies, context designs.
Behaviour & IT, 2016

Enhanced IoT-Aware Online Shopping System.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Goal Aware Context Respectful Counseling Agent.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

SLA Negotiation and Monitoring from Simulation Data.
Proceedings of the 12th International Conference on Signal-Image Technology & Internet-Based Systems, 2016

Analysis of Energy-Efficient Buildings through Simulation and Formal Methods.
Proceedings of the 6th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2016), 2016

Translating BPMN to Business Rules.
Proceedings of the Data-Driven Process Discovery and Analysis, 2016

Techniques, Technologies and Models for Big Data as a service.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016

A certification framework for cloud-based services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Translating Process Mining Results into Intelligible Business Information.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Highly enhanced context respectful counseling agent.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

Towards Model-Driven Big-Data-as-a-Service.
Proceedings of the ENASE 2016, 2016

On the predictive power of university curricula.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Big data analytics as-a-service: Issues and challenges.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

A Certification Technique for Cloud Security Adaptation.
Proceedings of the IEEE International Conference on Services Computing, 2016

A Cost-Effective Certification-Based Service Composition for the Cloud.
Proceedings of the IEEE International Conference on Services Computing, 2016

Lightweight Encryption for Smart Home.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Processes Meet Big Data: Connecting Data Science with Process Science.
IEEE Trans. Services Computing, 2015

Comparative evaluation of methods for filtering Kinect depth data.
Multimedia Tools Appl., 2015

Guest editorial: online multimedia signal and image processing.
Multimedia Tools Appl., 2015

Security and searchability in secret sharing-based data outsourcing.
Int. J. Inf. Sec., 2015

Toward Economic-Aware Risk Assessment on the Cloud.
IEEE Security & Privacy, 2015

From Security to Assurance in the Cloud: A Survey.
ACM Comput. Surv., 2015

Editorial.
Computing, 2015

Privacy-Preserving Query Processing by Multi-Party Computation.
Comput. J., 2015

Applying recommender systems in collaboration environments.
Computers in Human Behavior, 2015

Securing Cryptographic Keys in the IaaS Cloud Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Evaluation of Method for Multiplexing Communication Routes to Avoid Intentional Barriers.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Enhanced Context Respectful Counseling Agent.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Towards Self-Organizing Internet of Things - Aware Systems for Online Sales.
Proceedings of the 11th International Conference on Signal-Image Technology & Internet-Based Systems, 2015

Process Mining in Big Data Scenario.
Proceedings of the 5th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2015), 2015

ENKI: Access Control for Encrypted Query Processing.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Security Aspects of De-materialized Local Public Administration Processes.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

Heterogeneous Business Process Management: A Metamodel-Based Approach.
Proceedings of the Knowledge Management in Organizations - 10th International Conference, 2015

Toward behavioral business process analysis.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Fast summarization and anonymization of multivariate big time series.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

Toward big data risk analysis.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

De-Materializing Local Public Administration Processes.
Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'15), 2015

Knowledge Driven Behavioural Analysis in Process Intelligence.
Proceedings of the International Workshop on Algorithms & Theories for the Analysis of Event Data, 2015

Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

Innovation Factory: An Innovative Collaboration and Management Scenario.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

A Test-Based Incremental Security Certification Scheme for Cloud-Based Systems.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Toward Security and Performance Certification of Open Stack.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

Experimental Proof: Data Remanence in Cloud VMs.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Multimedia on the web - editorial.
Multimedia Tools Appl., 2014

An emotional word focused counseling agent and its evaluation.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Trustworthy Cloud Certification: A Model-Based Approach.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014

4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Network and Storage Latency Attacks to Online Trading Protocols in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Balanced Measurement Sets: Criteria for Improving Project Management Practices.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Driving knowledge acquisition via metric life-cycle in process intelligence.
Proceedings of the 14th International Conference on Knowledge Management and Data-driven Business, 2014

A Certification-Based Trust Model for Autonomic Cloud Computing Systems.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

Zero-Knowledge Evaluation of Service Performance Based on Simulation.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

The Problem of Handling Multiple Headers in WS-Security Implementations.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

E-Auctions for Multi-Cloud Service Provisioning.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

A Competitive Scalability Approach for Cloud Architectures.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

A Certification-Aware Service-Oriented Architecture.
Proceedings of the Advanced Web Services, 2014

2013
A test-based security certification scheme for web services.
TWEB, 2013

Clustering Models in Secure Clustered Multiparty Computation.
JoWUA, 2013

An efficient language pipeline for flexible rule-based context representation.
J. Ambient Intelligence and Humanized Computing, 2013

Editorial.
J. Inf. Sec. Appl., 2013

Unleashing Operational Process Mining (Dagstuhl Seminar 13481).
Dagstuhl Reports, 2013

Clause Anaphora Resolution for Japanese Demonstrative Determiner Based on Semantic Similarity between Different Part-of-Speech.
Proceedings of the IEEE International Conference on Systems, 2013

Boosting the Innovation Process in Collaborative Environments.
Proceedings of the IEEE International Conference on Systems, 2013

SPADE: A Framework for After-Disaster Adaptive Recovery Processes.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Combining Semantic Lifting and Ad-hoc Contextual Analysis in a Data Loss Scenario.
Proceedings of the Data-Driven Process Discovery and Analysis, 2013

Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013

Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013

Towards the Certification of Cloud Services.
Proceedings of the IEEE Ninth World Congress on Services, 2013

A Multi-Party Protocol for Privacy-Preserving Range Queries.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Machine-Readable Privacy Certificates for Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Digital eco-system for online shopping.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

An agent based model of environmental awareness and limited resource consumption.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

Security Certification of Composite Services: A Test-Based Approach.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Many-player inspection games in networked environments.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

The cover time of neighbor-avoiding gossiping on geometric random networks.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case.
Proceedings of the IEEE International Congress on Big Data, 2013

Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
Proceedings of the Joint Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'13) and the International Workshop on Modeling and Business Environments (ModBE'13), Milano, Italy, June 24, 2013

Early Assessment of Service Performance Based on Simulation.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
SOAP Processing Performance and Enhancement.
IEEE Trans. Services Computing, 2012

Toward Sensor-Based Context Aware Systems.
Sensors, 2012

Editorial for intelligent interactive multimedia systems and services.
Multimedia Tools Appl., 2012

Landmark-assisted location and tracking in outdoor mobile network.
Multimedia Tools Appl., 2012

Using XML-Based Multicasting to Improve Web Service Scalability.
Int. J. Web Service Res., 2012

Web Service Assurance: The Notion and the Issues.
Future Internet, 2012

Security certification-aware service discovery and selection.
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012

Temporal Denoising of Kinect Depth Data.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Exploiting Participatory Design in Open Innovation Factories.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Towards a Collaborative Innovation Catalyst.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Multiple Structured Light-Based Depth Sensors for Human Motion Analysis: A Review.
Proceedings of the Ambient Assisted Living and Home Care - 4th International Workshop, 2012

A Low-Cost Security Certification Scheme for Evolving Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Welcome from the Conference General Chairs.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Risk assessment of credit securities: The notion and the issues.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

A model-based approach to reliability certification of services.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Robust XML Watermarking Using Fuzzy Queries.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Database as a Service: Towards a Unified Solution for Security Requirements.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Rich Context Representation for Situation Aware System.
Proceedings of the Sixth International Conference on Complex, 2012

Scalability Patterns for Platform-as-a-Service.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Web Service Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Script Language Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Map-Based Location and Tracking in Multipath Outdoor Mobile Networks.
IEEE Trans. Wireless Communications, 2011

Guest Editorial: Security and Dependability in SOA and Business Processes.
IEEE Trans. Services Computing, 2011

Augmented reality technologies, systems and applications.
Multimedia Tools Appl., 2011

Editorial.
Journal of Systems Architecture - Embedded Systems Design, 2011

A Pattern for Web-based WSN Monitoring (Invited Paper).
JCM, 2011

Secure Collaborative Supply-Chain Management.
IEEE Computer, 2011

eHR-KM - First International Workshop on Knowledge Management and e-Human Resources Practices for Innovation.
Proceedings of the 6th Conference on Professional Knowledge Management: From Knowledge to Action, 2011

CR2S: Competency Roadmap to Strategy.
Proceedings of the 6th Conference on Professional Knowledge Management: From Knowledge to Action, 2011

Toward Open World and Multimodal Situation Models for Sensor-Aware Web Platforms.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2011

Efficient and Rich Context Representation for Web Applications.
Proceedings of the Seventh International Conference on Signal-Image Technology and Internet-Based Systems, 2011

Monitoring Business Processes in the Networked Enterprise.
Proceedings of the Data-Driven Process Discovery and Analysis, 2011

DOA-SVI 2011 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

SWWS 2011, MONET 2011 and SeDeS 2011 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011 Workshops, 2011

Towards Pattern-Based Reliability Certification of Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

Overcoming NAT traversal issue for SIP-based communication in P2P networks.
Proceedings of the 4th Joint IFIP Wireless and Mobile Networking Conference, 2011

What is a "musical world"?: an affinity propagation approach.
Proceedings of the 1st international ACM workshop on Music information retrieval with user-centered and multimodal strategies, Scottsdale, AZ, USA, November 28, 2011

Towards an agent-based architecture for managing uncertainty in situation awareness.
Proceedings of the 2011 IEEE Symposium on Intelligent Agent, 2011

Differential SOAP Multicasting.
Proceedings of the IEEE International Conference on Web Services, 2011

Defining and Matching Test-Based Certificates in Open SOA.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Improving Quality and Cost-Effectiveness in Enterprise Software Application Development: An Open, Holistic Approach for Project Monitoring and Control.
Proceedings of the Software Business - Second International Conference, 2011

A Privacy Preserving Reputation Protocol for Web Service Provider Selection.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011


Fine-Grained Modeling of Web Services for Test-Based Security Certification.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
Guest Editorial: Special Issue on Human-Centered Web Science.
World Wide Web, 2010

Semantics-aware matching strategy (SAMS) for the Ontology meDiated Data Integration (ODDI).
IJKESDP, 2010

Special issue: Open Source Certification.
Comput. Syst. Sci. Eng., 2010

Container-Level Security Certification of Services.
Proceedings of the Business System Management and Engineering, 2010

DOA'10 - PC Co-chairs Message.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

SWWS'10 - PC Co-chairs Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

KPI Modeling in MDA Perspective.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

Spago4Q and the QEST nD Model: An Open Source Solution for Software Performance Measurement.
Proceedings of the Open Source Software: New Horizons, 2010

Combining multi-probe histogram and order-statistics based LSH for scalable audio content retrieval.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Using incentive schemes to alleviate supply chain risks.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

A novel architecture for a Peer-to-Peer Session Initiation Protocol.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Implementing Open Source Software Governance in Real Software Assurance Processes.
Proceedings of the Software Business - First International Conference, 2010

Representing Immaterial Value in Business Model.
Proceedings of the Workshops Proceedings of the 14th IEEE International Enterprise Distributed Object Computing Conference, 2010

Multimodality in Pervasive Environment.
Proceedings of the Semantic Challenges in Sensor Networks, 24.01. - 29.01.2010, 2010

Toward Cloud-Based Key Management for Outsourced Databases.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Representing and Validating Digital Business Processes.
Proceedings of the Advances in Web Semantics I, 2009

Concept of Linguistic Variable-Based Fuzzy Ensemble Approach: Application to Interlaced HDTV Sequences.
IEEE Trans. Fuzzy Systems, 2009

Editorial.
Journal of Systems Architecture - Embedded Systems Design, 2009

A fuzzy extension of the XPath query language.
J. Intell. Inf. Syst., 2009

Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing.
Image Vision Comput., 2009

Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion.
Inf. Sci., 2009

Toward WS-certificate.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

Privacy Preserving Risk Assessment of Credit Securities.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Supply Chain Risk Analysis: Open Source Simulator.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

WS-Certificate.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

SWWS 2009 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009

Assurance Evaluation for OSS Adoption in a Telco Context.
Proceedings of the Open Source Ecosystems: Diverse Communities Interacting, 2009

Fast and low cost 3d object recognition.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Risk-aware Collaborative Processes.
Proceedings of the ICEIS 2009, 2009

A toward Framework for Generic Uncertainty Management.
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009

RSVP-TE Based Impairments Collection Mechanism in DWDM Network.
Proceedings of the Communications Infrastructure. Systems and Applications in Europe, 2009

Risk-aware Collaborative Processes.
Proceedings of the ENASE 2009, 2009

Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09).
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009

Active Rules for Business Value Models.
Proceedings of the Database and Expert Systems Applications, 2009

Assurance Process for Large Open Source Code Bases.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Designing and Developing Monitoring Agents for ERP Systems.
Proceedings of the Business Information Systems, 12th International Conference, 2009

Open Source Systems Security Certification.
Springer, ISBN: 978-0-387-77323-0, 2009

2008
Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study.
Proceedings of the New Directions in Intelligent Interactive Multimedia, 2008

Guest Editorial.
Journal of Computer Security, 2008

Advanced Localization of Mobile Terminal in Cellular Network.
IJCNS, 2008

Global consensus emergence in an unstructured semantic network.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

Semantics-Aware Resolution of Multi-part Persistent Indentifiers.
Proceedings of the Emerging Technologies and Information Systems for the Knowledge Society, 2008

Cloaking games in location based services.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Efficient SOAP message exchange and evaluation through XML similarity.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Robust Fuzzy Filter for Noise Reduction in Video Deinterlacing.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

A flexible extension of XPath to improve XML querying.
Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2008

Which Role for an Ontology of Uncertainty?
Proceedings of the Fourth International Workshop on Uncertainty Reasoning for the Semantic Web, 2008

A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Consensus Emergence from Naming Games in Representative AgentSemantic Overlay Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Ontology Robustness in Evolution.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

PMLite: An Open Source Solution for Process Monitoring.
Proceedings of the Open Source Development, 2008

Mapping Linux Security Targets to Existing Test Suites.
Proceedings of the Open Source Development, 2008

ODDI: Ontology-Driven Data Integration.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Persistent Identifiers distributed system for Cultural Heritage digital objects.
Proceedings of the 5th International Conference on Digital Preservation, 2008

ODDI - A Framework for Semi-automatic Data Integration.
Proceedings of the ICEIS 2008, 2008

A Framework for Semi-automatic Data Integration.
Proceedings of the Enterprise Information Systems, 10th International Conference, 2008

Using XML Similarity to Enhance SOAP Messages Security.
Proceedings of the 2008 International Conference on Internet Computing, 2008

A Web 2.0 Platform Supporting Collaborative Development of Personal Skills.
Proceedings of the 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 2008

SAF: Strategic Alignment Framework for Monitoring Organizations.
Proceedings of the Business Information Systems, 11th International Conference, 2008

The Use of a Meta-Model to Support Multi-Project Process Measurement.
Proceedings of the 15th Asia-Pacific Software Engineering Conference (APSEC 2008), 2008

2007
Bottom-Up Extraction and Trust-Based Refinement of Ontology Metadata.
IEEE Trans. Knowl. Data Eng., 2007

Learning Computer Networking on Open Paravirtual Laboratories.
IEEE Trans. Education, 2007

Fuzzy Weighted Approach to Improve Visual Quality of Edge-Based Filtering.
IEEE Trans. Consumer Electronics, 2007

Rough Sets-Assisted Subfield Optimization for Alternating Current Plasma Display Panel.
IEEE Trans. Consumer Electronics, 2007

Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach.
SIGMETRICS Performance Evaluation Review, 2007

Toward semantics-aware management of intellectual property rights.
Online Information Review, 2007

Secure Authentication Process for High Sensitive Data E-Services: A Roadmap.
J. Cases on Inf. Techn., 2007

Selective Data Encryption in Outsourced Dynamic Environments.
Electr. Notes Theor. Comput. Sci., 2007

A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

A Metamodel for Modeling and Measuring Scrum Development Process.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

Representing and Validating Digital Business Processes.
Proceedings of the Web Information Systems and Technologies, 2007

Representing and Validating Digital Business Processes.
Proceedings of the WEBIST 2007, 2007

L-VCONF: A Location-Aware Infrastructure for Battlefield Videoconferences.
Proceedings of the IEEE International Conference on Virtual Environments, 2007

Full Controllable Face Detection System Architecture for Robotic Vision.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A General Approach to Securely Querying XML.
Proceedings of the Security in Information Systems, 2007

Trustworthiness-related Uncertainty of Semantic Web-style Metadata: A Possibilistic Approach.
Proceedings of the Third ISWC Workshop on Uncertainty Reasoning for the Semantic Web Busan, 2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Proceedings of the New Approaches for Security, 2007

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Proceedings of the New Approaches for Security, 2007

Using Ontologies to Map Concept Relations in a Data Integration System.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Introduction to OSS 2007 Tutorial Program.
Proceedings of the Open Source Development, 2007

FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical Environments.
Proceedings of the Open Source Development, 2007

Navigation Dynamics as a Biometrics for Authentication.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Securely Updating XML.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

FuzzyXPath: Using Fuzzy Logic an IR Features to Approximately Query XML Documents.
Proceedings of the Foundations of Fuzzy Logic and Soft Computing, 2007

Location Privacy Protection Through Obfuscation-Based Techniques.
Proceedings of the Data and Applications Security XXI, 2007

Anomalies Detection in Mobile Network Management Data.
Proceedings of the Advances in Databases: Concepts, 2007

Assessing Business Process Security Awareness: A Service-Oriented Approach.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Managing Privacy in LBAC Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

XML Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Trust Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Adding a Trust Layer to Semantic Web Metadata.
Proceedings of the Soft Computing in Web Information Retrieval - Models and Applications, 2006

Measuring Inference Exposure in Outsourced Encrypted Databases.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Preface.
Journal of Systems Architecture, 2006

Discovering the software process by means of stochastic workflow analysis.
Journal of Systems Architecture, 2006

Viewpoints on Emergent Semantics.
, 2006

Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
JASIST, 2006

A WOWA-based Aggregation Technique on Trust Values Connected to Metadata.
Electr. Notes Theor. Comput. Sci., 2006

A Web Service Architecture for Enforcing Access Control Policies.
Electr. Notes Theor. Comput. Sci., 2006

Special issue: Web service security.
Comput. Syst. Sci. Eng., 2006

Psychology-Aware Video-Enabled Workplace.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Directions and trends of XML and web service security.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

3D Expressive Face Model-based Tracking Algorithm.
Proceedings of the IASTED International Conference on Signal Processing, 2006

CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

SWWS 2006 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

OntoExtractor: A Fuzzy-Based Approach to Content and Structure-Based Metadata Extraction.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper).
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On.
Proceedings of the Open Source Systems, 2006

Modality conflicts in semantics aware access control.
Proceedings of the 6th International Conference on Web Engineering, 2006

Extending Context Descriptions in Semantics-Aware Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

Supporting location-based conditions in access control policies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Modeling and assessing inference exposure in encrypted databases.
ACM Trans. Inf. Syst. Secur., 2005

Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy.
Proceedings of the SWAP 2005, 2005

Key management for multi-user encrypted databases.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Facial identification problem: A tracking based approach.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

Metadata Management in Outsourced Encrypted Databases.
Proceedings of the Secure Data Management, 2005

Adding a Peer-to-Peer Trust Layer to Metadata Generators.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

Detecting Ontology Change from Application Data Flows.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

An Architecture of a Wavelet Based Approach for the Approximate Querying of Huge Sets of Data in the Telecommunication Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

OntoExtractor: A Fuzzy-Based Approach in Clustering Semi-structured Data Sources and Metadata Generation.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Generate Context Metadata Based on Biometric System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Offline Expansion of XACML Policies Based on P3P Metadata.
Proceedings of the Web Engineering, 5th International Conference, 2005

Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005

Advanced Metadata for Privacy-Aware Representation of Credentials.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Towards Privacy-Enhanced Authorization Policies and Languages.
Proceedings of the Data and Applications Security XIX, 2005

The Architecture of a Privacy-Aware Access Control Decision Component.
Proceedings of the Construction and Analysis of Safe, 2005

2004
XML-based access control languages.
Inf. Sec. Techn. Report, 2004

Editorial.
IJPRAI, 2004

Semantics-aware techniques for security.
Comput. Syst. Sci. Eng., 2004

Special issue: Semantics-Aware Techniques for Security.
Comput. Syst. Sci. Eng., 2004

Spam attacks: p2p to the rescue.
Proceedings of the 13th international conference on World Wide Web, 2004

P2P-Based Collaborative Spam Detection and Filtering.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2004

Extending Policy Languages to the Semantic Web.
Proceedings of the Web Engineering - 4th International Conference, 2004

Mining Class Hierarchies from XML Data: Representation Techniques.
Proceedings of the Computational Intelligence, Theory and Applications, International Conference 8th Fuzzy Days, Dortmund, Germany, Sept. 29, 2004

A Protocol for Reputation Management in Super-Peer Networks.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

Invited Talk - Towards Semantics-Aware Access Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Managing and Sharing Servents' Reputations in P2P Systems.
IEEE Trans. Knowl. Data Eng., 2003

Managing Multiple and Dependable Identities.
IEEE Internet Computing, 2003

Editorial.
Comput. Syst. Sci. Eng., 2003

An XML-based approach to combine firewalls and web services security specifications.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Implementation of a Storage Mechanism for Untrusted DBMSs.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

Securing XML-based Multimedia Content.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Security Framework for Mobile Agent Platforms (SFMAP).
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Modeling Semistructured Data by Using Graph-Based Constraints.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

WMS 2003 PC Co-chairs' Message.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Semantics-Aware Perimeter Protection.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Balancing confidentiality and efficiency in untrusted relational DBMSs.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

A Ontology-based Process Modelling for XP.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

Human-centered e-business.
Kluwer, ISBN: 978-1-4020-7442-4, 2003

2002
A fine-grained access control system for XML documents.
ACM Trans. Inf. Syst. Secur., 2002

XML access control systems: a component-based approach.
Informatica (Slovenia), 2002

Securing SOAP e-services.
Int. J. Inf. Sec., 2002

Towards securing XML Web services.
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002

Choosing reputable servents in a P2P network.
Proceedings of the Eleventh International World Wide Web Conference, 2002

Implementing a Reputation-Aware Gnutella Servent.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

The APPROXML Tool Demonstration.
Proceedings of the Advances in Database Technology, 2002

Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Computing graphical queries over XML data.
ACM Trans. Inf. Syst., 2001

Fuzzy service selection in a distributed object-oriented environment.
IEEE Trans. Fuzzy Systems, 2001

Controlling Access to XML Documents.
IEEE Internet Computing, 2001

Software reuse in-the-small: automating group rewarding.
Information & Software Technology, 2001

Fine grained access control for SOAP E-services.
Proceedings of the Tenth International World Wide Web Conference, 2001

An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Temporal Aspects of Semistructured Data.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001

Fuzzy Techniques for XML Data Smushing.
Proceedings of the Computational Intelligence, 2001

A Component-Based Architecture for Secure Data Publication.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Fuzzy XML queries via context-based choice of aggregations.
Kybernetika, 2000

Design and implementation of an access control processor for XML documents.
Computer Networks, 2000

Software Reuse Technology Practices and Assessment Tool-Kit.
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000

Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Blind queries to XML data.
Proceedings of the Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2000

Complex Queries in XML-GL.
Proceedings of the Applied Computing 2000, 2000

Flexible query techniques for well-formed XML documents.
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000

Dynamic Optimisation of Non-linear Feed Forward Circuits.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2000

Querying UML/XML Design Information.
Proceedings of the Flexible Query Answering Systems, 2000

Securing XML Documents.
Proceedings of the Advances in Database Technology, 2000

Blind Queries to XML Data.
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000

XML Access Control Systems: A Component-Based Approach.
Proceedings of the Data and Application Security, 2000

1999
Corrigenda: a hierarchy-aware approach to faceted classification of object-oriented components.
ACM Trans. Softw. Eng. Methodol., 1999

A Hierarchy-aware Approach to Faceted Classification of Objected-Oriented Components.
ACM Trans. Softw. Eng. Methodol., 1999

Dynamic Service Identification in A Distributed Environment.
JACIII, 1999

XML-GL: A Graphical Language for Querying and Restructuring XML Documents.
Computer Networks, 1999

User Opinions and Rewards in a Reuse-Based Development System.
SSR, 1999

XML-GL: A Graphical Language for Querying and Restructuring XML Documents.
Proceedings of the Atti del Settimo Convegno Nazionale Sistemi Evoluti per Basi di Dati, 1999

A Human Centered Agent-Based Architecture for Electronic brokerage.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Flexible Queries to Semistructured Datasources: The WG-log Approach.
Proceedings of the Third ICSC Symposia on Intelligent Industrial Automation (IIA'99) and Soft Computing (SOCO'99), 1999

Semantics-Aware Querying in the WWW: The WG-Log Web Query System.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

A Human Centered Architecture for Distributed Retrieval of Medical Images.
Proceedings of the Computational Intelligence, 1999

A General-Purpose Fuzzy Engine for Crop Control.
Proceedings of the Computational Intelligence, 1999

On-Line Evolution of FPGA-Based Circuits: A Case Study on Hash Functions.
Proceedings of the 1st NASA / DoD Workshop on Evolvable Hardware (EH '99), 1999

Using WG-log Schemata to Represent Semistructured Data.
Proceedings of the Database Semantics, 1999

1998
A foreword from the guest editors.
Soft Comput., 1998

XML-GL: A Graphical Language for Querying and Reshaping XML Documents.
QL, 1998

Fast recall of reusable fuzzy plans using acyclic directed graph memory.
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

Evolutionary Design of Hashing Function Circuits Using an FPGA.
Proceedings of the Evolvable Systems: From Biology to Hardware, 1998

A Schema-Based Approach to Modeling and Querying WWW Data.
Proceedings of the Flexible Query Answering Systems, Third International Conference, 1998

1997
A Descriptor-Based Approach to OO Code Reuse.
IEEE Computer, 1997

Structuring and Querying the Web through Graph-Oriented Languages.
Proceedings of the Convegno Nazionale Sistemi Evolluti per Basi di Dati, 1997

Dynamic clustering for technology-based domain analysis (TDA).
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

Fuzzy Identification of Distributed Components.
Proceedings of the Computational Intelligence, 1997

Semantic Approaches to Structuring and Querying Web Sites.
DS-7, 1997

Reusing Analysis Schemas in ODB Applications: a Chart Based Approach.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997

1996
Retrieval of Reusable Components Using Functional Similarity.
Softw., Pract. Exper., 1996

Una estensione fuzzy del modello relazionale per il riutilizzo di componenti software.
Proceedings of the Atti del Quarto Convegno Nazionale su Sistemi Evoluti per Basi di Dati (4th National Conference on Advanced Database Systems), 1996

Fuzzy applications (panel session - title only).
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

Fuzzy techniques for software reuse.
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

1995
Automatic thesaurus construction supporting fuzzy retrieval of reusable components.
Proceedings of the 1995 ACM symposium on applied computing, 1995

1994
Decompositions of Bn and PIn Using Symmetric Chains.
J. Comb. Theory, Ser. A, 1994

Whitney Numbers of Some Geometric Lattices.
J. Comb. Theory, Ser. A, 1994

1992
The design of a microkernel application platform for shop-floor automation extended abstract.
Future Generation Comp. Syst., 1992


  Loading...