Francesco Palmieri

According to our database1, Francesco Palmieri authored at least 261 papers between 1986 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks.
J. Network and Computer Applications, 2019

New energy-optimization challenges in the next-generation Internet ecosystem.
Inf. Sci., 2019

One-pass lossless data hiding and compression of remote sensing data.
Future Generation Comp. Syst., 2019

2018
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Industrial Informatics, 2018

Using Screen Brightness to Improve Security in Mobile Social Network Access.
IEEE Trans. Dependable Sec. Comput., 2018

Multiple Ornstein-Uhlenbeck Processes for Maritime Traffic Graph Representation.
IEEE Trans. Aerospace and Electronic Systems, 2018

Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms.
Security and Communication Networks, 2018

A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distrib. Comput., 2018

Event-based sensor data exchange and fusion in the Internet of Things environments.
J. Parallel Distrib. Comput., 2018

Distributed strategic learning and game theoretic formulation of network embedded coding.
J. Comput. Science, 2018

Stackelberg games for modeling defense scenarios against cloud security threats.
J. Network and Computer Applications, 2018

Long-term path prediction in urban scenarios using circular distributions.
Image Vision Comput., 2018

Building a network embedded FEC protocol by using game theory.
Inf. Sci., 2018

Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence.
IEEE Internet of Things Journal, 2018

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes.
Future Generation Comp. Syst., 2018

A coral-reefs and Game Theory-based approach for optimizing elastic cloud resource allocation.
Future Generation Comp. Syst., 2018

On the optimal tuning and placement of FEC codecs within multicasting trees for resilient publish/subscribe services in edge-IoT architectures.
Future Generation Comp. Syst., 2018

CHIS: A big data infrastructure to manage digital cultural items.
Future Generation Comp. Syst., 2018

Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms.
Concurrency and Computation: Practice and Experience, 2018

On the protection of consumer genomic data in the Internet of Living Things.
Computers & Security, 2018

Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT.
Computers & Security, 2018

Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition.
Computers & Security, 2018

Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM.
IEEE Communications Magazine, 2018

Cloud Message Queueing and Notification: Challenges and Opportunities.
IEEE Cloud Computing, 2018

Data hiding using compressed archives.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Computational Optimization for Normal Form Realization of Bayesian Model graphs.
Proceedings of the 28th IEEE International Workshop on Machine Learning for Signal Processing, 2018

Unsupervised Maritime Traffic Graph Learning with Mean-Reverting Stochastic Processes.
Proceedings of the 21st International Conference on Information Fusion, 2018

Secure Lossy Image Compression via Adaptive Vector Quantization.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2018

2017
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices.
T-SUSC, 2017

On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embedded Comput. Syst., 2017

The Multidimensional Cramér-Rao-Leibniz Lower Bound for Likelihood Functions With Parameter-Dependent Support.
IEEE Trans. Aerospace and Electronic Systems, 2017

Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification.
Soft Comput., 2017

A Multiobjective Wavelength Routing Approach Combining Network and Traffic Engineering With Energy Awareness.
IEEE Systems Journal, 2017

Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks.
IEEE Systems Journal, 2017

Non-deterministic security driven meta scheduler for distributed cloud organizations.
Simulation Modelling Practice and Theory, 2017

A wave propagation-based adaptive probabilistic broadcast containment strategy for reactive MANET routing protocols.
Pervasive and Mobile Computing, 2017

Ambient Intelligence in the Internet of Things.
Mobile Information Systems, 2017

Traffic matrix estimation with software-defined NFV: Challenges and opportunities.
J. Comput. Science, 2017

Bayesian resource discovery in infrastructure-less networks.
Inf. Sci., 2017

Layered multicast for reliable event notification over large-scale networks.
Inf. Sci., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

Securing Information Exchange in VANETs by Using Pairing-Based Cryptography.
Int. J. Found. Comput. Sci., 2017

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design.
Future Generation Comp. Syst., 2017

Improving the gossiping effectiveness with distributed strategic learning (Invited paper).
Future Generation Comp. Syst., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Generation Comp. Syst., 2017

Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems.
IEEE Communications Magazine, 2017

Emerging Trends in Machine Learning for Signal Processing.
Comp. Int. and Neurosc., 2017

Automated extraction of fragments of Bayesian networks from textual sources.
Appl. Soft Comput., 2017

Dynamic Latency Sensitivity Recognition: An Application to Energy Saving.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Multidimensional Cramér-Rao-Leibniz lower bound for vector-measurement-based likelihood functions with parameter-dependent support.
Proceedings of the 20th International Conference on Information Fusion, 2017

2016
Performance Modeling of Big Data-Oriented Architectures.
Proceedings of the Resource Management for Big Data Platforms, 2016

A Comparison of Algorithms for Learning Hidden Variables in Bayesian Factor Graphs in Reduced Normal Form.
IEEE Trans. Neural Netw. Learning Syst., 2016

Bayesian Analysis of Behaviors and Interactions for Situation Awareness in Transportation Systems.
IEEE Trans. Intelligent Transportation Systems, 2016

Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Information Forensics and Security, 2016

Hierarchical and Shared Access Control.
IEEE Trans. Information Forensics and Security, 2016

A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems.
IEEE Trans. Industrial Electronics, 2016

Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory.
IEEE Trans. Computers, 2016

A secure payment system for multimedia on demand on mobile VANET clouds.
Security and Communication Networks, 2016

A Blind Signature-Based Approach for Cross-Domain Authentication in the Cloud Environment.
IJDWM, 2016

GRASP-based resource re-optimization for effective big data access in federated clouds.
Future Generation Comp. Syst., 2016

An HLA-based framework for simulation of large-scale critical systems.
Concurrency and Computation: Practice and Experience, 2016

A hybrid load-balancing and energy-aware RWA algorithm for telecommunication networks.
Computer Communications, 2016

Enhanced Network Support for Federated Cloud Infrastructures.
IEEE Cloud Computing, 2016

A cloud-based architecture for emergency management and first responders localization in smart city environments.
Computers & Electrical Engineering, 2016

Optimal Data Replica Placement in Large-Scale Federated Architectures.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Distributed strategic learning for effective gossiping in wireless networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Point-based path prediction from polar histograms.
Proceedings of the 19th International Conference on Information Fusion, 2016

Knowledge Transfer for Scene-Specific Motion Prediction.
Proceedings of the Computer Vision - ECCV 2016, 2016

Distributed Strategic Learning for Building Network Embedded Coding to Achieve Reliable Event Notification.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Interoperable Access Control by Means of a Semantic Approach.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015

Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.
The Journal of Supercomputing, 2015

Target tracking using factor graphs and multi-camera systems.
IEEE Trans. Aerospace and Electronic Systems, 2015

Modeling performances of concurrent big data applications.
Softw., Pract. Exper., 2015

Secure and reliable data communication in developing regions and rural areas.
Pervasive and Mobile Computing, 2015

Innovative Mobile Internet Services and Applications.
Mobile Information Systems, 2015

A knowledge-based platform for Big Data analytics based on publish/subscribe services and stream processing.
Knowl.-Based Syst., 2015

Energy efficiency of elastic frequency grids in multilayer IP/MPLS-over-flexgrid networks.
J. Network and Computer Applications, 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Generation Comp. Syst., 2015

An energy-aware engineered control plane for wavelength-routed networks.
Trans. Emerging Telecommunications Technologies, 2015

Modeling security requirements for cloud-based system development.
Concurrency and Computation: Practice and Experience, 2015

An uncertainty-managing batch relevance-based approach to network anomaly detection.
Appl. Soft Comput., 2015

Discrete independent component analysis (DICA) with belief propagation.
Proceedings of the 25th IEEE International Workshop on Machine Learning for Signal Processing, 2015

A Game-Theoretic Approach to Network Embedded FEC over Large-Scale Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

The untrusted handover security of the S-PMIPv6 on LTE-A.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Supporting First Responders Localization during Crisis Management.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Two-dimensional multi-layer Factor Graphs in Reduced Normal Form.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015

A honeypot system with honeyword-driven fake interactive sessions.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Semantic Cross-View Matching.
Proceedings of the 2015 IEEE International Conference on Computer Vision Workshop, 2015

Dealing with Reliable Event-Based Communications by Means of Layered Multicast.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Heterogeneous Network Handover Using 3GPP ANDSF.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

On the Protection of fMRI Images in Multi-domain Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Format-Independent Protection of DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

An Artificial Intelligence-Based Trust Model for Pervasive Computing.
Proceedings of the 10th International Conference on P2P, 2015

2014
A secure file sharing service for distributed computing environments.
The Journal of Supercomputing, 2014

A Denial of Service Attack to UMTS Networks Using SIM-Less Devices.
IEEE Trans. Dependable Sec. Comput., 2014

Hybrid indoor and outdoor location services for new generation mobile terminals.
Personal and Ubiquitous Computing, 2014

A botnet-based command and control approach relying on swarm intelligence.
J. Network and Computer Applications, 2014

A perspective of the journal's life in the last three years.
J. High Speed Networks, 2014

Secure and distributed video surveillance via portable devices.
J. Ambient Intelligence and Humanized Computing, 2014

A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
International Journal of Parallel Programming, 2014

Advances in Security and Privacy in Sensor Networks.
IJDSN, 2014

Exploiting mean field analysis to model performances of big data architectures.
Future Generation Comp. Syst., 2014

A distributed approach to network anomaly detection based on independent component analysis.
Concurrency and Computation: Practice and Experience, 2014

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A multi-camera Multi-Target Tracker based on Factor Graphs.
Proceedings of the 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications, 2014

Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Abnormal vessel behavior detection in port areas based on Dynamic Bayesian Networks.
Proceedings of the 17th International Conference on Information Fusion, 2014

Belief propagation and learning in convolution multi-layer factor graphs.
Proceedings of the 4th International Workshop on Cognitive Information Processing, 2014

Application of factor graphs to multi-camera fusion for maritime tracking.
Proceedings of the 4th International Workshop on Cognitive Information Processing, 2014

Multimedia-based battery drain attacks for Android devices.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

Online Bayesian learning and classification of ship-to-ship interactions for port safety.
Proceedings of the 11th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2014

An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

On Reliability and Security in Knowledge Grids.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
On the Performance of Energy-Division Multiple Access Over Fading Channels.
Wireless Personal Communications, 2013

Learning Non-Linear Functions With Factor Graphs.
IEEE Trans. Signal Processing, 2013

Towards an energy-aware Internet: modeling a cross-layer optimization approach.
Telecommunication Systems, 2013

Low-complexity dominance-based sphere decoder for MIMO systems.
Signal Processing, 2013

Eco-sustainable routing in optical networks.
Photonic Network Communications, 2013

Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources.
Mathematical and Computer Modelling, 2013

An intelligent security architecture for distributed firewalling environments.
J. Ambient Intelligence and Humanized Computing, 2013

Objective priors from maximum entropy in data classification.
Information Fusion, 2013

Network anomaly detection with the restricted Boltzmann machine.
Neurocomputing, 2013

A distributed scheduling framework based on selfish autonomous agents for federated cloud environments.
Future Generation Comp. Syst., 2013

Scalable service discovery in ubiquitous and pervasive computing architectures: A percolation-driven approach.
Future Generation Comp. Syst., 2013

Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks.
Comput. Sci. Inf. Syst., 2013

Interconnecting Federated Clouds by Using Publish-Subscribe Service.
Cluster Computing, 2013

On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013

Data Fusion Using a Factor Graph for Ship Tracking in Harbour Scenarios.
Proceedings of the Recent Advances of Neural Network Models and Applications, 2013

An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Text Compression and Encryption through Smart Devices for Mobile Communication.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

On Secure Data Management in Health-Care Environment.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Real-Time Estimation of Planar Surfaces in Arbitrary Environments Using Microsoft Kinect Sensor.
Proceedings of the Image Analysis and Processing - ICIAP 2013, 2013

Towards Service Orchestration Between Smart Grids and Telecom Networks.
Proceedings of the Energy Efficiency in Large Scale Distributed Systems, 2013

FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
On the Performance of Energy-Division Multiple Access with Regular Constellations.
Wireless Personal Communications, 2012

Condensation-based routing in mobile ad-hoc networks.
Mobile Information Systems, 2012

Percolation-based routing in the Internet.
Journal of Systems and Software, 2012

Selfish routing and wavelength assignment strategies with advance reservation in inter-domain optical networks.
Computer Communications, 2012

An energy-aware dynamic RWA framework for next-generation wavelength-routed networks.
Computer Networks, 2012

An asynchronous covert channel using spam.
Computers & Mathematics with Applications, 2012

Probability Learning and Soft Quantization in Bayesian Factor Graphs.
Proceedings of the Neural Nets and Surroundings - 22nd Italian Workshop on Neural Nets, 2012

Mobile sensor networks based on autonomous platforms for homeland security.
Proceedings of the Tyrrhenian Workshop on Advances in Radar and Remote Sensing, 2012

Device Tracking in Private Networks via NAPT Log Analysis.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Secure Distributed Video Surveillance System Based on Portable Devices.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Automatic security assessment for next generation wireless mobile networks.
Mobile Information Systems, 2011

Hiding Information into OOXML Documents: New Steganographic Perspectives.
JoWUA, 2011

From Examples to Bayesian Inference.
Proceedings of the Neural Nets WIRN11, 2011

Analyzing Local Strategies for Energy-Efficient Networking.
Proceedings of the NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, 2011

Gain design and power allocation for overloaded MIMO-OFDM systems with channel state information and iterative multiuser detection.
Proceedings of the 8th International Symposium on Wireless Communication Systems, 2011

Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

E-mail-Based Covert Channels for Asynchronous Message Steganography.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Energy-Aware RWA for WDM Networks with Dual Power Sources.
Proceedings of IEEE International Conference on Communications, 2011

Entropic priors for short-term stochastic process classification.
Proceedings of the 14th International Conference on Information Fusion, 2011

Distributed classification of multiple moving targets with binary wireless sensor networks.
Proceedings of the 14th International Conference on Information Fusion, 2011

Saving Energy in Data Center Infrastructures.
Proceedings of the First International Conference on Data Compression, 2011

Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area.
Proceedings of the 2011 International Conference on Broadband, 2011

New Steganographic Techniques for the OOXML File Format.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Constrained minimum lightpath affinity routing in multi-layer optical transport networks.
J. High Speed Networks, 2010

Towards a federated Metropolitan Area Grid environment: The SCoPE network-aware infrastructure.
Future Generation Comp. Syst., 2010

Network anomaly detection through nonlinear analysis.
Computers & Security, 2010

A GRASP-based network re-optimization strategy for improving RWA in multi-constrained optical transport infrastructures.
Computer Communications, 2010

Data Fusion with Entropic Priors.
Proceedings of the Neural Nets WIRN10, 2010

A Fault Avoidance Strategy Improving the Reliability of the EGI Production Grid Infrastructure.
Proceedings of the Principles of Distributed Systems - 14th International Conference, 2010

Tree-search ML detection for underdetermined MIMO systems with M-PSK constellations.
Proceedings of the 2010 7th International Symposium on Wireless Communication Systems, 2010

Insights into peer to peer traffic through nonlinear analysis.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

A Wide Area Network Optimization Service for Effective Access to Heterogeneous DataGrid Infrastructures.
Proceedings of the Data Management in Grid and Peer-to-Peer Systmes, 2010

Towards a Lawfully Secure and Privacy Preserving Video Surveillance System.
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010

Building a bayesian factor tree from examples.
Proceedings of the 2nd International Workshop on Cognitive Information Processing, 2010

An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Energy-Oriented Models for WDM Networks.
Proceedings of the Broadband Communications, Networks, and Systems, 2010

2009
A Converged Charging Framework for Mobile Voice and Data Applications.
JNW, 2009

Network-aware scheduling for real-time execution support in data-intensive optical Grids.
Future Generation Comp. Syst., 2009

Providing true end-to-end security in converged voice over IP infrastructures.
Computers & Security, 2009

A nonlinear, recurrence-based approach to traffic classification.
Computer Networks, 2009

Notes on Cutset Conditioning on Factor Graphs with Cycles.
Proceedings of the Neural Nets WIRN09, 2009

SimulNet: a wavelength-routed optical network simulation framework.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Managing Network-Aware Grid Services on Metropolitan Scale: The SCoPE Experience.
Proceedings of the IP Operations and Management, 9th IEEE International Workshop, 2009

Percolation-Based Replica Discovery in Peer-to-Peer Grid Infrastructures.
Proceedings of the Networks for Grid Applications, 2009

2008
A Minimum Cut Interference-based Integrated RWA Algorithm for Multi-constrained Optical Transport Networks.
J. Network Syst. Manage., 2008

Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace.
I. J. Network Security, 2008

Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies.
Computers & Security, 2008

On time diversity for packet channels.
Computer Communications, 2008

Internet traffic modeling by means of Hidden Markov Models.
Computer Networks, 2008

Notes on Factor Graphs.
Proceedings of the New Directions in Neural Networks, 2008

Network-Aware Replica Optimization in the SCoPE Grid Infrastructure.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

A jitter model for OFDM systems.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Distributed Linear Block Coding for Cooperative Wireless Communications.
IEEE Signal Process. Lett., 2007

Enhanced Security Strategies for MPLS Signaling.
JNW, 2007

Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures.
JCP, 2007

SPARK: A smart parametric online RWA algorithm.
Journal of Communications and Networks, 2007

Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system.
IJWMC, 2007

A Scheme for Multiuser Communications based on Energy Division.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

On Asymptotic Efficiency for Asynchronous CDMA.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

A New Design Paradigm for MIMO Dispersive Channel DF Equalizer.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Joint end-to-end loss-delay hidden Markov model for periodic UDP traffic over the Internet.
IEEE Trans. Signal Processing, 2006

GMPLS-based service differentiation for scalable QoS support in all-optical Grid applications.
Future Generation Comp. Syst., 2006

A Low Cost and Effective Link Protection Approach for Enhanced Survivability in Optical Transport Networks.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Large Scale Voice over IP Experiences on High Performance Intranets.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Audit-Based Access Control in Nomadic Wireless Environments.
Proceedings of the Computational Science and Its Applications, 2006

An HMM Approach to Internet Traffic Modeling.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Energy-Division Multiple Access Scheme.
Proceedings of the 9th International Conference on Information Fusion, 2006

Bidirectional MIMO equalizer design.
Proceedings of the 14th European Signal Processing Conference, 2006

Dynamic Layer-2 VPN Services for Improving Security in the Grid Environment.
Proceedings of the Emerging Trends in Information and Communication Security, 2006

2005
Optimal correlating transform for erasure channels.
IEEE Signal Process. Lett., 2005

An MPLS-based architecture for scalable QoS and traffic engineering in converged multiservice mobile IP networks.
Computer Networks, 2005

Evaluating Evolutionary IP-Based Transport Services on a Dark Fiber Large-Scale Network Testbed.
Proceedings of the Networking, 2005

Introducing Public E-Mail Gateways: An Effective Hardening Strategy Against Spam.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Soft iterative decoding for overloaded CDMA.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Securing the MPLS Control Plane.
Proceedings of the High Performance Computing and Communications, 2005

End-to-end packet-channel Bayesian model applied to heterogeneous wireless networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Internet loss-delay modeling by use of input/output hidden Markov models.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

An High Performance Traffic Engineering Model for All-Optical Networks - Evolutionary GMPLS Control Plane Services in All-Optical Cross-Connects.
Proceedings of the ICETE 2004, 2004

A Scalable PKI for Secure Routing in the Internet.
Proceedings of the Computational Science and Its Applications, 2004

HMM-Based Monitoring of Packet Channels.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

MPLS DiffServ-Enabled Traffic Engineering: A Scalable QoS Model for Optical-Speed Media Streaming Networks.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Prosody modification and Fujisaki's model: Preserving natural soundness.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

Multiple description image coder using correlating transforms.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

2003
K-Trek: A Peer-to-Peer Infrastructure for Distributing Using Knowledge in Large Environments.
Proceedings of the WOA 2003: Dagli Oggetti agli Agenti. 4th AI*IA/TABOO Joint Workshop "From Objects to Agents": Intelligent Systems and Pervasive Computing, 2003

Bayesian Modelling for Packet Channels.
Proceedings of the Neural Nets, 14th Italian Workshop on Neural Nets, 2003

Multi-class Image Coding via EM-KLT Algorithm.
Proceedings of the Neural Nets, 14th Italian Workshop on Neural Nets, 2003

Introducing MPLS in Mobile Data Networks: An High Performance Framework for QoS-Powered IP Mobility.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Inversion of F0 model for natural-sounding speech synthesis.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

Noncausal filters: possible implementations and their complexity.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

K-Trek: A Peer-to-Peer Approach to Distribute Knowledge in Large Environments.
Proceedings of the Agents and Peer-to-Peer Computing, Second International Workshop, 2003

2002
Generalized Independent Component Analysis as Density Estimation.
Proceedings of the Neural Nets, 13th Italian Workshop on Neural Nets, 2002

A Comparison of Signal Compression Methods by Sparse Solution of Linear Systems.
Proceedings of the Neural Nets, 13th Italian Workshop on Neural Nets, 2002

Efficient sparse FIR filter design.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
An algorithm for transform coding for lossy packet networks.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
Unsupervised Rank-Deficient Density Estimation via Multi-Class Independent Component Analysis.
IJCNN (3), 2000

1999
Inhibitory synapses in neural networks with sigmoidal nonlinearities.
IEEE Trans. Neural Networks, 1999

Simple and robust methods for support vector expansions.
IEEE Trans. Neural Networks, 1999

An explicit algorithm for training support vector machines.
IEEE Signal Process. Lett., 1999

Independent component analysis for mixture densities.
Proceedings of the ESANN 1999, 1999

Generalized support vector machines.
Proceedings of the ESANN 1999, 1999

1998
Authors' Reply.
IEEE Trans. Neural Networks, 1998

Comments on "Theoretical analysis of evolutionary algorithms with an infinite population size in continuous space. I. Basic properties of selection and mutation" [and reply].
IEEE Trans. Neural Networks, 1998

Self-association in multilayer linear networks with limited connectivity.
Neural Networks, 1998

Searching for a binary factorial code using the ICA framework.
Neurocomputing, 1998

Adaptive nonlinear filtering with the support vector method.
Proceedings of the 9th European Signal Processing Conference, 1998

1995
Self-association and Hebbian learning in linear neural networks.
IEEE Trans. Neural Networks, 1995

1994
Theoretical analysis of evolutionary algorithms with an infinite population size in continuous space. Part II: Analysis of the diversification role of crossover.
IEEE Trans. Neural Networks, 1994

Theoretical analysis of evolutionary algorithms with an infinite population size in continuous space. Part I: Basic properties of selection and mutation.
IEEE Trans. Neural Networks, 1994

1993
Analysis of Wide-Band Cross Correlation for Time-Delay Estimation.
IEEE Trans. Signal Processing, 1993

Anti-Hebbian learning in topologically constrained linear networks: a tutorial.
IEEE Trans. Neural Networks, 1993

Classifying mammographic lesions using computerized image analysis.
IEEE Trans. Med. Imaging, 1993

The Diversification Role of Crossover in the Genetic Algorithms.
Proceedings of the 5th International Conference on Genetic Algorithms, 1993

1992
Optimal filtering algorithms for fast learning in feedforward neural networks.
Neural Networks, 1992

1990
Frequency analysis and synthesis of a class of nonlinear filters.
IEEE Trans. Acoustics, Speech, and Signal Processing, 1990

MEKA - a fast, local algorithm for training feedforward neural networks.
Proceedings of the IJCNN 1990, 1990

1989
Ll-filters-a new class of order statistic filters.
IEEE Trans. Acoustics, Speech, and Signal Processing, 1989

A new algorithm for training multilayer perceptrons.
Proceedings of the IEEE International Conference on Systems, 1989

1986
Sampling theorem for polynomial interpolation.
IEEE Trans. Acoustics, Speech, and Signal Processing, 1986


  Loading...