Wilson Vicente Ruggiero

Orcid: 0000-0003-3612-3937

According to our database1, Wilson Vicente Ruggiero authored at least 41 papers between 1979 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Implementation of PjBL With Remote Lab Enhances the Professional Skills of Engineering Students.
IEEE Trans. Educ., August, 2023

Hypergraphic Partitioning of Quantum Circuits for Distributed Quantum Computing.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

2022
A TDD Framework for Automated Monitoring in Internet of Things with Machine Learning.
Sensors, 2022

Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning.
Sensors, 2022

2021
Improving IoT Module Testability with Test-Driven Development and Machine Learning.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

2020
Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior.
Sensors, 2020

OKIoT: Trade off analysis of smart speaker architecture on open knowledge IoT project.
Internet Things, 2020

2019
A Knowledge-Based Recommendation System That Includes Sentiment Analysis and Deep Learning.
IEEE Trans. Ind. Informatics, 2019

A Brazilian Portuguese Real-Time Voice Recognition to deal with sensitive data.
Proceedings of the 53rd Asilomar Conference on Signals, Systems, and Computers, 2019

2017
Mechanism for Structuring the Data from a Generic Identity Document Image using Semantic Analysis.
Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web, 2017

Hardware implementation for permutation function of multiplication-hardened sponge BlaMka.
Proceedings of the 8th IEEE Latin American Symposium on Circuits & Systems, 2017

2015
Optimized and Scalable Co-Processor for McEliece with Binary Goppa Codes.
ACM Trans. Embed. Comput. Syst., 2015

A survey on Information Flow Control mechanisms in web applications.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

CRT RSA decryption: Modular exponentiation based solely on Montgomery Multiplication.
Proceedings of the 49th Asilomar Conference on Signals, Systems and Computers, 2015

2014
A Parallel and Uniform k -Partition Method for Montgomery Multiplication.
IEEE Trans. Computers, 2014

Scaling efficient code-based cryptosystems for embedded platforms.
J. Cryptogr. Eng., 2014

Challenges and requirements of a control plane for elastic optical networks.
Comput. Networks, 2014

Novel Differentiated Service Methodology Based on Constrained Allocation of Resources for Transparent WDM Backbone Networks.
Proceedings of the 2014 Brazilian Symposium on Computer Networks and Distributed Systems, 2014

Scalable hardware implementation for Quasi-Dyadic Goppa encoder.
Proceedings of the IEEE 5th Latin American Symposium on Circuits and Systems, 2014

A Study in current dynamic fragmentation-aware RSA algorithms.
Proceedings of the 16th International Conference on Transparent Optical Networks, 2014

Designing Financial Literacy and Saving Tools for the Unbanked and under-banked in Brazil.
Proceedings of the Design, User Experience, and Usability. User Experience Design Practice, 2014

2013
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission.
J. Syst. Softw., 2013

Security Policies for WFMS with Rich Business Logic - A Model Suitable for Analysis
CoRR, 2013

Monitoring the video use for learning support.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
Evaluating the effectiveness of the use of teaching materials in video format in distance learning environments.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
A parallel k-partition method to perform Montgomery Multiplication.
Proceedings of the 22nd IEEE International Conference on Application-specific Systems, 2011

2010
Known User Continuous Authentication System.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Known User Continuous Authentication System for Consumer Application Software.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

A Continuous Authentication System Based on User Behavior Analysis.
Proceedings of the ARES 2010, 2010

2009
Scalable data center provisioning and control.
IBM J. Res. Dev., 2009

2008
Um Modelo conceitual para Aprendizagem Colaborativa Baseada na execução de Projetos pela Web.
Rev. Iberoam. de Tecnol. del Aprendiz., 2008

2007
Evaluating Overlays for Gigabit Channels Data Communication.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

An Approach to Personalisation in E-learning.
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007

2006
Fiber-based testbed architecture enabling advanced experimental research.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

Multiple personal security domains.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

A Distributed Mechanism for Trust Propagation and Consolidation in Ad Hoc Networks.
Proceedings of the Information Networking, 2006

2004
Integrating MPEG-7 Descriptors and Pattern Recognition: An Environment for Multimedia Indexing and Searching.
Proceedings of the Joint Conference 10th Brazilian Symposium on Multimedia and the Web & 2nd Latin American Web Congress, 2004

2003
muP: A Micropayment System.
Proceedings of the Digital Communities in a Networked Society: eCommerce, 2003

2002
Distribution of Medical Information in a Metropolian High Performances Network.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

Advanced Educational Applications for Internet.
Proceedings of the International Conference on Internet Computing, 2002

1979
Analysis of data flow models using the SARA graph model of behavior.
Proceedings of the 1979 International Workshop on Managing Requirements Knowledge, 1979


  Loading...