Ernesto Damiani
Researcher ORCID ID = 0000-0002-9557-6496
Ernesto Damiani's AcademicInfluence.com Rankings
Download Badge
Computer Science
Why Is Ernesto Damiani Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ernesto Damiani is a professor of computer science at the University of Milan, where he leads the Architectures Research Lab. He is the Senior Director of the Artificial Intelligence and Intelligent Systems Institute at Khalifa University, in the UAE. He holds visiting positions at Tokyo Denki University, Université de Bourgogne. Damiani received an honorary doctorate from Institut National des Sciences Appliquées de Lyon, France . His research spans security, Big Data and knowledge processing, where he has published over 400 peer-reviewed articles and books. He is a Senior Member of the IEEE and a Distinguished Scientist of ACM. Since 2018, he is the President of the Italian Inter-University Consortium for Informatics.
Ernesto Damiani's Published Works
Published Works
- Process Mining Manifesto (2011) (1130)
- Augmented reality technologies, systems and applications (2010) (1005)
- A reputation-based approach for choosing reliable resources in peer-to-peer networks (2002) (730)
- A fine-grained access control system for XML documents (2002) (544)
- Choosing reputable servents in a P2P network (2002) (457)
- Balancing confidentiality and efficiency in untrusted relational DBMSs (2003) (410)
- Location Privacy Protection Through Obfuscation-Based Techniques (2007) (347)
- XML-GL: A Graphical Language for Querying and Restructuring XML Documents (1999) (274)
- Managing and Sharing Servents' Reputations in P2P Systems (2003) (226)
- Supporting location-based conditions in access control policies (2006) (178)
- Design and implementation of an access control processor for XML documents (2000) (171)
- From Security to Assurance in the Cloud (2015) (155)
- Securing XML Documents (2000) (154)
- The future of E-learning: E-learning ecosystem (2007) (153)
- Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems (2006) (153)
- Modeling and assessing inference exposure in encrypted databases (2005) (150)
- Policy making for smart cities: innovation and social inclusive economic growth for sustainability (2018) (144)
- Big Data and Data Analytics Research: From Metaphors to Value Space for Collective Wisdom in Human Decision Making and Smart Machines (2017) (143)
- P2P-based collaborative spam detection and filtering (2004) (142)
- An Open Digest-based Technique for Spam Detection (2004) (124)
- Key management for multi-user encrypted databases (2005) (97)
- Fine grained access control for SOAP E-services (2001) (88)
- Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey (2020) (82)
- Emerging Technologies and Information Systems for the Knowledge Society, First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings (2008) (81)
- Concept of Linguistic Variable-Based Fuzzy Ensemble Approach: Application to Interlaced HDTV Sequences (2009) (78)
- Processes Meet Big Data: Connecting Data Science with Process Science (2015) (78)
- Lightweight Encryption for Smart Home (2016) (76)
- New paradigms for access control in open environments (2005) (76)
- Learning Computer Networking on Open Paravirtual Laboratories (2007) (76)
- Managing Multiple and Dependable Identities (2003) (75)
- Designing of a type-2 fuzzy logic filter for improving edge-preserving restoration of interlaced-to-progressive conversion (2009) (72)
- Extending Policy Languages to the Semantic Web (2004) (72)
- A Discussion of Privacy Challenges in User Profiling with Big Data Techniques: The EEXCESS Use Case (2013) (68)
- Map-Based Location and Tracking in Multipath Outdoor Mobile Networks (2011) (68)
- Controlling Access to XML Documents (2001) (65)
- Computing graphical queries over XML data (2001) (65)
- A fuzzy extension of the XPath query language (2009) (64)
- Towards Blockchain-Based Reputation-Aware Federated Learning (2020) (60)
- SOAP Processing Performance and Enhancement (2012) (60)
- Bayer Demosaicking With Polynomial Interpolation (2016) (59)
- A hierarchy-aware approach to faceted classification of objected-oriented components (1999) (58)
- Intelligent Interactive Multimedia Systems and Services (2014) (55)
- Towards securing XML Web services (2002) (55)
- Benefits of Ontologies in Real Time Data Access (2007) (54)
- Trust in Blockchain Cryptocurrency Ecosystem (2020) (53)
- Semantic Knowledge Management: An Ontology-based Framework (2008) (53)
- Web 2.0: The Business Model (2008) (52)
- A test-based security certification scheme for web services (2013) (51)
- Implementing a Reputation-Aware Gnutella Servent (2002) (50)
- Fuzzy rough sets hybrid scheme for motion and scene complexity adaptive deinterlacing (2009) (50)
- Selective Data Encryption in Outsourced Dynamic Environments (2007) (49)
- Open Source Systems Security Certification (2008) (49)
- Privacy-aware Big Data Analytics as a service for public health policies in smart cities (2018) (49)
- A Web Service Architecture for Enforcing Access Control Policies (2004) (48)
- Open Source Development, Communities and Quality, IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, OSS 2008, September 7-10, 2008, Milano, Italy (2008) (48)
- Secure Collaborative Supply-Chain Management (2011) (48)
- Securing SOAP e-services (2002) (48)
- Implementation of a Storage Mechanism for Untrusted DBMSs (2003) (47)
- A general approach to securely querying XML (2008) (47)
- Metadata Management in Outsourced Encrypted Databases (2005) (46)
- Big data analytics as-a-service: Issues and challenges (2016) (46)
- Big Data Semantics (2018) (44)
- Temporal Denoising of Kinect Depth Data (2012) (44)
- A WOWA-based Aggregation Technique on Trust Values Connected to Metadata (2005) (43)
- AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing (2012) (42)
- A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification (2020) (40)
- XML access control systems: a component-based approach (2000) (40)
- Specification of the Geometric Regularity Model for Fuzzy If-Then Rule-Based Deinterlacing (2010) (39)
- A Retinex model based on Absorbing Markov Chains (2016) (39)
- Data Privacy Management and Autonomous Spontaneous Security (2013) (39)
- Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review (2017) (38)
- Drone Pilot Identification by Classifying Radio-Control Signals (2018) (37)
- A Schema-Based Approach to Modeling and Querying WWW Data (1998) (37)
- Blind Queries to XML Data (2000) (37)
- Introduction to Ontology Engineering (2008) (36)
- Scalability Patterns for Platform-as-a-Service (2012) (35)
- A component-based architecture for secure data publication (2001) (35)
- Viewpoints on Emergent Semantics (2006) (34)
- A Model-Driven Methodology for Big Data Analytics-as-a-Service (2017) (34)
- Fuzzy service selection in a distributed object-oriented environment (2001) (34)
- An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing (2007) (34)
- XML-GL: a graphical language for querying and restructuring WWW Data (1999) (33)
- Towards the Certification of Cloud Services (2013) (33)
- New Directions in Intelligent Interactive Multimedia Systems and Services - 2 (2009) (33)
- Fuzzy XML queries via context-based choice of aggregations (2000) (32)
- A Low-Cost Security Certification Scheme for Evolving Services (2012) (32)
- Automatic thesaurus construction supporting fuzzy retrieval of reusable components (1995) (31)
- Bottom-Up Extraction and Trust-Based Refinement of Ontology Metadata (2007) (31)
- Locally estimated heterogeneity property and its fuzzy filter application for deinterlacing (2016) (31)
- Managing a pool of rules for credit card fraud detection by a Game Theory based approach (2020) (30)
- An interval type-2 fuzzy active contour model for auroral oval segmentation (2017) (29)
- TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT (2021) (29)
- Toward Security and Performance Certification of Open Stack (2015) (29)
- Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level (2018) (29)
- Fuzzy Weighted Approach to Improve Visual Quality of Edge-Based Filtering (2007) (29)
- Complex queries in XML-GL (2000) (29)
- The Use of a Meta-Model to Support Multi-Project Process Measurement (2008) (29)
- Meta-Transfer Learning Driven Tensor-Shot Detector for the Autonomous Localization and Recognition of Concealed Baggage Threats (2020) (29)
- Human-Centered e-Business (2003) (29)
- A Certification-Based Trust Model for Autonomic Cloud Computing Systems (2014) (28)
- A Machine Learning Framework for Biometric Authentication Using Electrocardiogram (2019) (28)
- Towards Privacy-Enhanced Authorization Policies and Languages (2005) (28)
- ENKI: Access Control for Encrypted Query Processing (2015) (28)
- Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model (2020) (27)
- Security and searchability in secret sharing-based data outsourcing (2015) (27)
- Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings (2006) (26)
- Privacy-Preserving Query Processing by Multi-Party Computation (2015) (26)
- Security Certification of Composite Services: A Test-Based Approach (2013) (26)
- Toward Cloud-Based Key Management for Outsourced Databases (2010) (26)
- Rough Sets-Assisted Subfield Optimization for Alternating Current Plasma Display Panel (2007) (26)
- A certification framework for cloud-based services (2016) (25)
- Corrigenda: a hierarchy-aware approach to faceted classification of object-oriented components (1999) (25)
- FuzzyXPath: Using Fuzzy Logic an IR Features to Approximately Query XML Documents (2007) (25)
- Specification of efficient block-matching scheme for motion estimation in video compression (2009) (25)
- XML-GL: A Graphical Language for Querying and Reshaping XML Documents (1998) (25)
- Intelligent Multimedia Multi-Agent Systems : a Human-Centered Approach (2000) (24)
- XML-based access control languages (2004) (24)
- Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach (2012) (24)
- Applying recommender systems in collaboration environments (2015) (24)
- Fine-Grained Modeling of Web Services for Test-Based Security Certification (2011) (24)
- Database as a Service: Towards a Unified Solution for Security Requirements (2012) (23)
- Composite Intrusion Detection in Process Control Networks (2008) (23)
- Comparative evaluation of methods for filtering Kinect depth data (2015) (23)
- E-Auctions for Multi-Cloud Service Provisioning (2014) (23)
- Combining multi-probe histogram and order-statistics based LSH for scalable audio content retrieval (2010) (23)
- Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries (2015) (23)
- Security certification-aware service discovery and selection (2012) (22)
- Retrieval of Reusable Components using Functional Similarity (1996) (22)
- Fuzzy Techniques for XML Data Smushing (2001) (22)
- Advanced Localization of Mobile Terminal in Cellular Network (2008) (21)
- Designing Smart-Contract Based Auctions (2018) (21)
- Blockchain-Based E-Vote-as-a-Service (2019) (21)
- A descriptor-based approach to OO code reuse (1997) (21)
- A Framework for Human-in-the-loop Monitoring of Concept-drift Detection in Event Log Stream (2018) (20)
- The Open Source Virtual Lab : a Case Study (2006) (20)
- A Metamodel for Modeling and Measuring Scrum Development Process (2007) (20)
- The cognitive computing turn in education: Prospects and application (2019) (20)
- Test-Based Security Certification of Composite Services (2018) (20)
- A protocol for reputation management in super-peer networks (2004) (20)
- Personalization vs. privacy in big data analysis (2014) (20)
- A ontology-based process modelling for XP (2003) (20)
- WS-Certificate (2009) (20)
- FXPath: Flexible Querying of XML Documents (2002) (20)
- Toward Sensor-Based Context Aware Systems (2012) (20)
- Activity Theory for OSS Ecosystems (2007) (19)
- An XML-based approach to combine firewalls and web services security specifications (2003) (19)
- Modeling Semistructured Data by Using Graph-Based Constraints (2003) (18)
- Digital Culture and E-Tourism: Technologies, Applications and Management Approaches (2010) (18)
- An Access Control Model for Data Archives (2001) (18)
- A Comparative Analysis of Current Cryptocurrencies (2018) (18)
- Ensuring the identity of a user in time: a multi-modal fuzzy approach (2007) (17)
- Intelligent Multimedia Multi-Agent Systems (2000) (17)
- XML Security (2007) (17)
- Technology-enhanced learning research in higher education: A transformative education primer (2020) (17)
- Modality conflicts in semantics aware access control (2006) (17)
- Ontology based recommender system using social network data (2020) (17)
- A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy (2007) (17)
- Fuzzy Identification of Distributed Components (1997) (17)
- On-line evolution of FPGA-based circuits: a case study on hash functions (1999) (17)
- Securely Updating XML (2007) (16)
- Virtual reality in learning, collaboration and behaviour: content, systems, strategies, context designs (2016) (16)
- Evolutionary Design of Hashing Function Circuits Using an FPGA (1998) (16)
- Signal Processing for Image Enhancement and Multimedia Processing (Multimedia Systems and Applications) (2007) (16)
- An Access Control System for SVG Documents (2002) (16)
- Discovering the software process by means of stochastic workflow analysis (2006) (16)
- Toward Economic-Aware Risk Assessment on the Cloud (2015) (16)
- Extensions to pattern formats for cyber physical systems (2014) (16)
- Soft Computing in Software Engineering (2004) (16)
- A flexible extension of XPath to improve XML querying (2008) (16)
- Landmark-assisted location and tracking in outdoor mobile network (2012) (16)
- Toward a New Generation of Log Pre-processing Methods for Process Mining (2017) (16)
- SAF: Strategic Alignment Framework for Monitoring Organizations (2008) (16)
- Offline Expansion of XACML Policies Based on P3P Metadata (2005) (15)
- Privacy Preserving Reputation Systems for Decentralized Environments (2010) (15)
- Web Service Security (2011) (15)
- KPI Modeling in MDA Perspective (2010) (15)
- BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications (2017) (15)
- Evaluation Goals for Online Process Mining: A Concept Drift Perspective (2020) (15)
- Privacy-Enhanced Location Services Information (2007) (15)
- RFID Reader Localization Using Hard Decisions With Error Concealment (2019) (15)
- Web Service Assurance: The Notion and the Issues (2012) (15)
- Toward WS-certificate (2009) (15)
- A Test-Based Incremental Security Certification Scheme for Cloud-Based Systems (2015) (14)
- Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All: Second World Summit on the Knowledge Society, WSKS 2009, ... in Computer and Information Science) (2009) (14)
- Adding a Trust Layer to Semantic Web Metadata (2006) (14)
- iPrivacy: a Distributed Approach to Privacy on the Cloud (2013) (14)
- New Blockchain Adoptation For Automotive Security by Using Systematic Innovation (2019) (14)
- Proceedings of the 1st world summit on The Knowledge Society: Emerging Technologies and Information Systems for the Knowledge Society (2008) (14)
- Spam attacks: p2p to the rescue (2004) (14)
- FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical Environments (2007) (14)
- Dynamic Optimisation of Non-linear Feed Forward Circuits (2000) (13)
- Whitney Numbers of Some Geometric Lattices (1994) (13)
- A Security Benchmark for OpenStack (2017) (13)
- Towards Pattern-Based Reliability Certification of Services (2011) (13)
- Securing XML-based Multimedia Content (2003) (13)
- Experimental Proof: Data Remanence in Cloud VMs (2015) (13)
- Modeling time, probability, and configuration constraints for continuous cloud service certification (2018) (13)
- Emerging Paths towards E2.0: the Case of Social Enterprise. Results from a 1-year Research (2008) (13)
- Exploiting Participatory Design in Open Innovation Factories (2012) (13)
- Business intelligence meets big data : an overview on security and privacy (2014) (13)
- Efficient SOAP message exchange and evaluation through XML similarity (2008) (13)
- Towards an agent-based architecture for managing uncertainty in situation awareness (2011) (13)
- IEEE Access Special Section Editorial: Urban Computing and Well-Being in Smart Cities: Services, Applications, Policymaking Considerations (2020) (13)
- Semantics-aware Privacy and Access Control: Motivation and Preliminary Results (2004) (12)
- Explainable artificial intelligence to evaluate industrial internal security using EEG signals in IoT framework (2021) (12)
- Agile management of uncertain requirements via generalizations: a case study (2004) (12)
- Guest Editorial: Special Issue on Human-Centered Web Science (2010) (12)
- Bottom-up extraction and maintenance of ontology-based metadata (2006) (12)
- Overlapping Analytic Stages in Online Process Mining (2019) (12)
- Measuring Inference Exposure in Outsourced Encrypted Databases (2006) (12)
- Framework for traffic event detection using Shapelet Transform (2019) (12)
- Representing and Validating Digital Business Processes (2007) (12)
- Proceedings of the 2nd World Summit on the Knowledge Society: Visioning and Engineering the Knowledge Society. A Web Science Perspective (2009) (12)
- Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach (2018) (12)
- User opinions and rewards in a reuse-based development system (1999) (12)
- Machine Learning-Based Framework for Log-Lifting in Business Process Mining Applications (2019) (12)
- Toward big data risk analysis (2015) (12)
- Multimedia Techniques for Device and Ambient Intelligence (2009) (12)
- Using XML-Based Multicasting to Improve Web Service Scalability (2012) (12)
- Semantic Approaches to Structuring and Querying Web Sites (1997) (11)
- OpenAmbient : a pervasive access control architecture (2006) (11)
- Advanced Internet Based Systems and Applications, Second International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2006, Hammamet, Tunisia, December 17-21, 2006, Revised Selected Papers (2009) (11)
- Differential SOAP Multicasting (2011) (11)
- Facial identification problem: A tracking based approach (2005) (11)
- Visioning and Engineering the Knowledge Society. A Web Science Perspective, Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings (2009) (11)
- Editorial (2011) (11)
- Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study (2013) (11)
- Adding a Peer-to-Peer Trust Layer to Metadata Generators (2005) (11)
- On inter-Rater reliability of information security experts (2017) (11)
- Managing Privacy in LBAC Systems (2007) (11)
- Deep Fusion Driven Semantic Segmentation for the Automatic Recognition of Concealed Contraband Items (2020) (11)
- Special issue on real-time image and video processing in mobile embedded systems (2018) (11)
- SpagoBI: A distinctive approach in open source business intelligence (2008) (11)
- Best Practices for the Knowledge Society. Knowledge, Learning, Development and Technology for All, Second World Summit on the Knowledge Society, WSKS 2009, Chania, Crete, Greece, September 16-18, 2009. Proceedings (2009) (11)
- A Case for IoT Security Assurance (2018) (11)
- Real-time image processing systems using fuzzy and rough sets techniques (2018) (11)
- Towards Blockchain-Based E-Voting Systems (2019) (11)
- A model-based approach to reliability certification of services (2012) (10)
- 3D Expressive Face Model-based Tracking Algorithm (2006) (10)
- A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study (2008) (10)
- Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts (2019) (10)
- Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, ... in Information and Communication Technology) (2011) (10)
- Toward Model-Based Big Data-as-a-Service: The TOREADOR Approach (2017) (10)
- Fuzzy techniques for software reuse (1996) (10)
- A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems (2015) (10)
- Certification-Based Cloud Adaptation (2021) (10)
- Translating Process Mining Results into Intelligible Business Information (2016) (10)
- Pedigree-ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments (2018) (10)
- The Open Knowledge Society: A Computer Science and Information Systems Manifesto First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, ... in Computer and Information Science) (2008) (10)
- RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems (2019) (10)
- Localization and tracking of mobile antenna in urban environment (2005) (10)
- Security, Privacy, and Trust in Mobile Systems (2008) (9)
- A human centered agent-based architecture for electronic brokerage (1999) (9)
- Securing Cryptographic Keys in the IaaS Cloud Model (2015) (9)
- Many-player inspection games in networked environments (2013) (9)
- Securing Cryptographic Keys in the Cloud: A Survey (2016) (9)
- Decompositions of Bn and PIn Using Symmetric Chains (1994) (9)
- Security, Privacy, and Trust in Mobile Systems and Applications (2005) (9)
- Evaluating Trace Encoding Methods in Process Mining (2020) (9)
- Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud (2017) (9)
- Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection (2019) (9)
- Blockchain-Based Reputation Systems: Implementation Challenges and Mitigation (2021) (9)
- Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems (2003) (9)
- Trading Anonymity for Influence in Open Communities Voting Schemata (2009) (9)
- Towards the definition of an information quality metric for information fusion models (2021) (9)
- Persistent Identifiers distributed system for Cultural Heritage digital objects (2008) (9)
- A Model Driven Approach for Cyber Security Scenarios Deployment (2019) (9)
- An access control system for data archives (2001) (9)
- The APPROXML Tool Demonstration (2002) (9)
- International Workshop on Semantic and Social Media Adaptation and Personalization (2014) (9)
- Big data platform for public health policies (2017) (9)
- Early Assessment of Service Performance Based on Simulation (2013) (9)
- Design and implementation of an access processor for xml documents (2000) (9)
- Advanced Metadata for Privacy-Aware Representation of Credentials (2005) (9)
- On the Move to Meaningful Internet Systems: OTM 2011 (2011) (9)
- Secure Authentication Process for High Sensitive Data E-Services: A Roadmap (2007) (9)
- THE ROLE OF INFORMATION SHARING IN SUPPLY CHAIN MANAGEMENT: THE SECURESCM APPROACH (2011) (8)
- Toward Federated-Learning-Enabled Visible Light Communication in 6G Systems (2021) (8)
- Advanced Security Service cERTificate for SOA: Certified Services go Digital (2010) (8)
- Artificial Intelligence Cybersecurity Challenges ; Threat Landscape for Artificial Intelligence (2020) (8)
- An intelligent load distribution system for CORBA-compliant distributed environments (1999) (8)
- Performance Analysis of a Polling-Based Access Control Combining with the Sleeping Schema in V2I VANETs for Smart Cities (2019) (8)
- Software reuse in-the-small: automating group rewarding (2001) (8)
- Design and code reuse based on fuzzy classification of components (1996) (8)
- A Competitive Scalability Approach for Cloud Architectures (2014) (8)
- From Combinatorics to Philosophy: The Legacy of G.-C. Rota (2014) (8)
- A Knowledge Management System Enabling Regional Innovation (2002) (8)
- Network and Storage Latency Attacks to Online Trading Protocols in the Cloud (2014) (8)
- Structuring and Querying the Web through Graph-Oriented Languages (1997) (8)
- A Deep Learning Approach to Radio Signal Denoising (2019) (8)
- Robust XML Watermarking Using Fuzzy Queries (2012) (8)
- The Complementary Symmetric Functions: Connection Constants Using Negative Sets (1998) (8)
- Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research (2022) (8)
- Emergent Semantics in Distributed Knowledge Management (2008) (8)
- Machine Learning in Mobile Crowd Sourcing: A Behavior-Based Recruitment Model (2021) (8)
- Lossless compression for aurora spectral images using fast online bi-dimensional decorrelation method (2017) (8)
- Dynamic Service Identification in A Distributed Environment (1999) (8)
- Extending the Outreach (2017) (8)
- A3FD: Accurate 3D Face Detection (2008) (8)
- Toward semantics-aware management of intellectual property rights (2007) (8)
- Analysis of Shapelet Transform Usage in Traffic Event Detection (2018) (8)
- A design methodology for matching smart health requirements (2020) (8)
- Autonomous Vehicle Security: Conceptual Model (2019) (8)
- Extending Context Descriptions in Semantics-Aware Access Control (2006) (8)
- Trustworthiness-related Uncertainty of Semantic Web-style Metadata: A Possibilistic Approach (2007) (8)
- Temporal Fusion Based Mutli-scale Semantic Segmentation for Detecting Concealed Baggage Threats (2021) (7)
- An assurance model for OSS adoption in next-generation telco environments (2009) (7)
- A Continuous Certification Methodology for DevOps (2019) (7)
- Getting results with negative thinking (1995) (7)
- On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit (2014) (7)
- Privacy- Enhanced Identity Management for E-Services (2007) (7)
- A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol (2020) (7)
- Towards Conceptual Models for Machine Learning Computations (2018) (7)
- KIWI: A Framework for Enabling Semantic Knowledge Management (2009) (7)
- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies (2005) (7)
- OntoExtractor: A Fuzzy-Based Approach in Clustering Semi-structured Data Sources and Metadata Generation (2005) (7)
- Highly enhanced context respectful counseling agent (2016) (7)
- A graph-based meta-model for heterogeneous data management (2018) (7)
- Semantics-aware matching strategy (SAMS) for the Ontology meDiated Data Integration (ODDI) (2010) (7)
- Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry (2013) (7)
- An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events (2004) (6)
- A Pattern for Web-based WSN Monitoring (Invited Paper) (2011) (6)
- Multiple Structured Light-Based Depth Sensors for Human Motion Analysis: A Review (2012) (6)
- Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On (2006) (6)
- An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits (2019) (6)
- Defining and Matching Test-Based Certificates in Open SOA (2011) (6)
- Translating BPMN to Business Rules (2016) (6)
- Regulating Access To Semistructured Information on the Web (2000) (6)
- Smart-3DM: Data-driven decision making using smart edge computing in hetero-crowdsensing environment (2022) (6)
- Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment (2018) (6)
- Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach (2010) (6)
- A Certification Technique for Cloud Security Adaptation (2016) (6)
- Access Control of SVG Documents (2002) (6)
- Cost-effective deployment of certified cloud composite services (2020) (6)
- How Artificial Intelligence and Mobile Crowd Sourcing are Inextricably Intertwined (2021) (6)
- What Are My Users Looking for When Preparing a Big Data Campaign (2017) (6)
- Overcoming NAT traversal issue for SIP-based communication in P2P networks (2011) (6)
- Certifying Security and Privacy Properties in the Internet of Services (2011) (6)
- SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan (2005) (6)
- A Cost-Effective Certification-Based Service Composition for the Cloud (2016) (6)
- A new 3D descriptor for human classification: application for human detection in a multi-kinect system (2019) (6)
- VICA, a visual counseling agent for emotional distress (2019) (6)
- The Architecture of a Privacy-Aware Access Control Decision Component (2005) (6)
- From Trustworthy Data to Trustworthy IoT (2020) (6)
- CAS++: An Open Source Single Sign-On Solution for Secure e-Services (2006) (6)
- Full Controllable Face Detection System Architecture for Robotic Vision (2007) (6)
- An agent based model of environmental awareness and limited resource consumption (2013) (5)
- Dealing with next-generation malware (2010) (5)
- Modeling users' navigation history (2001) (5)
- Zero-Knowledge Evaluation of Service Performance Based on Simulation (2014) (5)
- Designing Process-Centric Blockchain-Based Architectures: A Case Study in e-voting as a Service (2018) (5)
- Using AutoEncoders for Radio Signal Denoising (2019) (5)
- Which Role for an Ontology of Uncertainty? (2008) (5)
- An Approximate Querying Environment for XML Data (2004) (5)
- Graph convolutional recurrent networks for reward shaping in reinforcement learning (2022) (5)
- Analysing Selfishness Flooding with SEINE (2017) (5)
- Open source solution to secure e-government services (2006) (5)
- An artificial immune system approach to anomaly detection in multimedia ambient intelligence (2009) (5)
- Estimating Degradation of Machine Learning Data Assets (2021) (5)
- Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure (2020) (5)
- Fast recall of reusable fuzzy plans using acyclic directed graph memory (1998) (5)
- The Semantic challenges and opportunities in the Human Resources domain (2007) (5)
- From Combinatorics to Philosophy (2009) (5)
- Artificial intelligence in deep learning algorithms for multimedia analysis (2020) (5)
- Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems (2020) (5)
- Security Framework for Mobile Agent Platforms (SFMAP) (2003) (5)
- SLA Negotiation and Monitoring from Simulation Data (2016) (5)
- Location-based metadata and negotiation protocols for LBAC in a one-to-many scenario (2006) (5)
- New Two-Level µTESLA Protocol for IoT Environments (2019) (5)
- Cloaking games in location based services (2008) (5)
- Mining Cardinalities from Knowledge Bases (2017) (5)
- Embodiment matters: toward culture-specific robotized counselling (2020) (5)
- A toward Framework for Generic Uncertainty Management (2009) (5)
- Enhanced IoT-Aware Online Shopping System (2016) (5)
- A risk model for cloud processes (2015) (5)
- What is a "Musical World"? An affinity propagation approach (2011) (5)
- Do Neighbor-Avoiding Walkers Walk as if in a Small-World Network? (2009) (5)
- CR2S: Competency Roadmap to Strategy (2011) (4)
- Using incentive schemes to alleviate supply chain risks (2010) (4)
- IoT-aware online shopping system enhanced with gaze analysis (2016) (4)
- Risk-aware Collaborative Processes (2009) (4)
- Engineering Continuous Monitoring of Intrinsic Capacity for Elderly People (2021) (4)
- Recent Advances in Baggage Threat Detection: A Comprehensive and Systematic Survey (2022) (4)
- Machine-Readable Privacy Certificates for Services (2013) (4)
- The Wg-log System: Data Model and Semantics (1998) (4)
- An Agent-Based Model for Awareness-Based Sustainability (2015) (4)
- Similarity-based SOAP Processing Performance and Enhancement* (2011) (4)
- The THREAT-ARREST Cyber-Security Training Platform (2019) (4)
- A Remote FPGA Laboratory as a Cloud Microservice (2020) (4)
- Open world reasoning in semantics-aware access control: A preliminary study (2005) (4)
- A trust assurance technique for Internet of things based on human behavior compliance (2021) (4)
- Representing Immaterial Value in Business Model (2010) (4)
- Driving knowledge acquisition via metric life-cycle in process intelligence (2014) (4)
- Boosting the Innovation Process in Collaborative Environments (2013) (4)
- Semantics-Aware Resolution of Multi-part Persistent Indentifiers (2008) (4)
- Business System Management and Engineering (2012) (4)
- Innovations, Developments, and Applications of Semantic Web and Information Systems (2018) (4)
- Dynamic Service Identification in a CORBA-like Environment (1998) (4)
- Toward behavioral business process analysis (2015) (4)
- A novel architecture for a Peer-to-Peer Session Initiation Protocol (2010) (4)
- Psychology-Aware Video-Enabled Workplace (2006) (4)
- Fuzzy service selection in active networks (2000) (4)
- A Configuration-Independent Score-Based Benchmark for Distributed Databases (2016) (4)
- Open Source Development, Communities and Quality: IFIP 20th World Computer Congress, Working Group 2.3 on Open Source Software, September 7-10, 2008, Milano, ... Federation for Information Processing) (2008) (4)
- Fast summarization and anonymization of multivariate big time series (2015) (4)
- De-Materializing Local Public Administration Processes (2015) (4)
- A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema (2019) (4)
- Extending Formal Concept Analysis by Fuzzy Bags (2006) (4)
- Trust Management (2007) (4)
- A Visual Counseling Agent Avatar with Voice Conversation and Fuzzy Response (2018) (4)
- Monitoring Business Processes in the Networked Enterprise (2011) (4)
- Knowledge Driven Behavioural Analysis in Process Intelligence (2015) (4)
- Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work (2020) (4)
- Identifying Applications' State via System Calls Activity: A Pipeline Approach (2021) (4)
- Fuzzy Approaches to Trust Management (2006) (4)
- Towards Transparent and Trustworthy Cloud (2017) (4)
- Smart connected parking lots based on secured multimedia IoT devices (2021) (4)
- Robust Computationally-Efficient Wireless Emitter Classification Using Autoencoders and Convolutional Neural Networks (2021) (4)
- Making the Pedigree to Your Big Data Repository: Innovative Methods, Solutions, and Algorithms for Supporting Big Data Privacy in Distributed Settings via Data-Driven Paradigms (2019) (4)
- Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything (2018) (3)
- Modeling Threats to AI-ML Systems Using STRIDE (2022) (3)
- Toward IoT-Friendly Learning Models (2018) (3)
- Counseling Robot Implementation and Evaluation (2018) (3)
- The cover time of neighbor-avoiding gossiping on geometric random networks (2013) (3)
- Techniques for Measuring the Probability of Adjacency between Carved Video Fragments: The VidCarve Approach (2019) (3)
- Trustworthy Cloud Certification: A Model-Based Approach (2014) (3)
- Data-Driven Process Discovery and Analysis (2011) (3)
- A Web 2.0 Platform Supporting Collaborative Development of Personal Skills (2008) (3)
- Mining Class Hierarchies from XML Data: Representation Techniques (2004) (3)
- Proceedings of the 2005 workshop on Secure web services (2005) (3)
- Using Ontologies to Map Concept Relations in a Data Integration System (2007) (3)
- Dynamic and Scalable Enforcement of Access Control Policies for Big Data (2021) (3)
- A 3 FD : Accurate 3 D Face Detection (2006) (3)
- A Transfusion Ontology for Remote Assistance in Emergency Health Care (Position Paper) (2006) (3)
- Using Meta-learning to Recommend Process Discovery Methods (2021) (3)
- A Blockchain-based Trustworthy Certification Process for Composite Services (2020) (3)
- Anomaly Detection on Event Logs with a Scarcity of Labels (2020) (3)
- The THREAT-ARREST Cyber Range Platform (2021) (3)
- Certified Machine-Learning Models (2020) (3)
- The Open Knowlege Society. A Computer Science and Information Systems Manifesto, First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September 24-26, 2008. Proceedings (2008) (3)
- Open Source Systems: IFIP Working Group 2.13 Foundation Conference on Open Source Software, June 8-10, 2006, Como, Italy (IFIP International Federation for Information Processing) (2006) (3)
- Novel EEG Risk Framework to Identify Insider Threats in National Critical Infrastructure Using Deep Learning Techniques (2020) (3)
- Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication (2022) (3)
- Improving Quality and Cost-Effectiveness in Enterprise Software Application Development: An Open, Holistic Approach for Project Monitoring and Control (2011) (3)
- Semantic Web Personalization and Context Awareness - Management of Personal Identities and Social Networking (2011) (3)
- Privacy in the Electronic Society: Emerging Problems and Solutions (2008) (3)
- Reusing Analysis Schemas in ODB Applications: a Chart Based Approach (1997) (3)
- Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud (2016) (3)
- FPGA-Based Hash Circuit Synthesis with Evolutionary Algorithms (Special Section on Nonlinear Theory and Its Applications) (1999) (3)
- Process Mining in Big Data Scenario (2015) (3)
- Unleashing Operational Process Mining (Dagstuhl Seminar 13481) (2013) (3)
- Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol (2013) (3)
- Supply Chain Risk Analysis: Open Source Simulator (2009) (3)
- Using WG-log Schemata to Represent Semistructured Data (1999) (3)
- Exploiting Quantum Gates in Secure Computation (2017) (3)
- Guest editorial: large-scale Web virtualized environment (2015) (3)
- Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS) (2018) (3)
- Proceedings of the 3rd ACM workshop on Secure web services (2006) (3)
- Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists (2021) (3)
- A Fast and Incremental Development Life Cycle for Data Analytics as a Service (2018) (3)
- Emerging Technologies and Information Systems for the Knowledge Society: First World Summit on the Knowledge Society, WSKS 2008, Athens, Greece, September ... / Lecture Notes in Artificial Intelligence) (2008) (3)
- Navigation Dynamics as a Biometrics for Authentication (2007) (3)
- A Novel Protocol for Security of Location Based Services in Multi-agent Systems (2019) (3)
- A Multi-Party Protocol for Privacy-Preserving Range Queries (2013) (3)
- Towards a Collaborative Innovation Catalyst (2012) (3)
- A Trust and Reputation System for IoT Service Interactions (2022) (3)
- Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography (2015) (3)
- Consensus Emergence from Naming Games in Representative AgentSemantic Overlay Networks (2008) (3)
- Proceedings of the 8th international conference on Agile processes in software engineering and extreme programming (2007) (3)
- Dynamic Access Control to Semantics-Aware Streamed Process Logs (2019) (3)
- STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets (2021) (3)
- Poisoning Attacks and Defenses on Artificial Intelligence: A Survey (2022) (3)
- Balanced Affinity Loss for Highly Imbalanced Baggage Threat Contour-Driven Instance Segmentation (2022) (3)
- A General-Purpose Fuzzy Engine for Crop Control (1999) (3)
- More General Evaluation of a Client-Centered Counseling Agent (2019) (2)
- Can a Rock song have a Jazz audience? Relationshipbetween folksonomy and collaborative filtering in musicrecommender systems (2011) (2)
- Design of Counseling Robot for Production by 3D Printer (2017) (2)
- Spago4Q and the QEST nD Model: An Open Source Solution for Software Performance Measurement (2010) (2)
- Open Culture for Education and Research Environment (2007) (2)
- Towards identity management for e-services (2005) (2)
- Automating Process Discovery Through Meta-learning (2022) (2)
- Trusting Testcases Using Blockchain-Based Repository Approach (2021) (2)
- Trends in XML Technology for the Global Information Infrastructure (2003) (2)
- Selecting Optimal Trace Clustering Pipelines with AutoML (2021) (2)
- Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals (2023) (2)
- A Privacy Preserving Reputation Protocol for Web Service Provider Selection (2011) (2)
- I3D: a new dataset for testing denoising and demosaicing algorithms (2018) (2)
- Privacy-Preserving Big Data Exchange: Models, Issues, Future Research Directions (2021) (2)
- Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency (2017) (2)
- What can Machine Learning do for Radio Spectrum Management? (2020) (2)
- An Adaptable Architecture for Human-Robot Visual Interaction (2007) (2)
- A Methodology for Cross-Platform, Event-Driven Big Data Analytics-as-a-Service (2019) (2)
- Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype (2018) (2)
- Global consensus emergence in an unstructured semantic network (2008) (2)
- Assessing Business Process Security: a Service-Oriented Approach (2007) (2)
- Toward Domain Adaptation for small data sets (2021) (2)
- Proceedings of the 6th ACM Workshop On Secure Web Services, SWS 2009, Chicago, Illinois, USA, November 13, 2009 (2009) (2)
- A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test (2013) (2)
- Equipping a context respectful counseling agent with a human-like voice synthesizer (2016) (2)
- Why Human-Centered e-Business? (2003) (2)
- FPGAaaS: A Survey of Infrastructures and Systems (2022) (2)
- Anomalies Detection in Mobile Network Management Data (2007) (2)
- Sampling Online Social Networks with Tailored Mining Strategies (2019) (2)
- An Ontology-Based Knowledge Management System Enabling Regional Innovation (2002) (2)
- Container-Level Security Certification of Services (2010) (2)
- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges (2020) (2)
- Automatic synthesis of hashing function circuits using evolutionary techniques (1998) (2)
- A composite machine-learning-based framework for supporting low-level event logs to high-level business process model activities mappings enhanced by flexible BPMN model translation (2020) (2)
- Integrating Advanced Security Certification and Policy Management (2013) (2)
- Travel ban effects on SARS-CoV-2 transmission lineages in the UAE as inferred by genomic epidemiology (2022) (2)
- Multimodality in Pervasive Environment (2010) (2)
- An access control system for svgdocuments (2000) (2)
- A Certification-Aware Service-Oriented Architecture (2014) (2)
- Detecting Ontology Change from Application Data Flows (2005) (2)
- Computer-supported collaboration environments and the emergence of collaboration aspects (2013) (2)
- On the predictive power of university curricula (2016) (2)
- Open Source Systems, IFIP Working Group 2.13 Foundation on Open Source Software, June 8-10, 2006, Como, Italy (2014) (2)
- The THREAT-ARREST CyberSecurity Training Platform (2019) (2)
- Identifying Drone Operator by Deep Learning and Ensemble Learning of IMU and Control Data (2021) (2)
- Baggage Threat Recognition Using Deep Low-Rank Broad Learning Detector (2022) (2)
- Multimedia Security and Digital Rights Management Technology (2004) (2)
- DeepIIoT: An Explainable Deep Learning Based Intrusion Detection System for Industrial IOT (2022) (2)
- Moon Cloud: A Cloud Platform for ICT Security Governance (2018) (2)
- A Framework for Semi-automatic Data Integration (2008) (2)
- Assessing Strategies for Sampling Dynamic Social Networks (2019) (2)
- Towards AI-Powered Multiple Cloud Management (2019) (2)
- Proceedings of the 2004 workshop on Quantitative techniques for software agile process (2004) (2)
- Ontology Robustness in Evolution (2008) (2)
- Guest Editorial: Security and Dependability in SOA and Business Processes (2011) (2)
- A Methodology for Non-Functional Property Evaluation of Machine Learning Models (2020) (2)
- Extending the SVM integration with case based restarting GA to predict solar flare (2017) (2)
- Assurance Evaluation for OSS Adoption in a Telco Context (2009) (2)
- Improving Software Process Accountability with Spago 4 Q (2008) (2)
- Toward Value-Based Control of Knowledge Sharing in Networked Services Design (2009) (2)
- Gossiping solutions for distributed consensus on unstructured overlays (2010) (2)
- Context respectful counseling agent integrated with robot nodding for dialog promotion (2017) (2)
- An ontology for artificial immune systems (2009) (2)
- An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme (2018) (2)
- A multiple valued logic approach for the synthesis of garbled circuits (2017) (2)
- Generate Context Metadata Based on Biometric System (2005) (1)
- Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August ... (Lecture Notes in Computer Science) (2006) (1)
- Open Source Systems: Adoption and Impact (2015) (1)
- Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security (2017) (1)
- Big Data Assurance Evaluation: An SLA-Based Approach (2018) (1)
- Digital eco-system for online shopping (2013) (1)
- All-Implicants Neural Networks for Efficient Boolean Function Representation (2018) (1)
- Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based (2018) (1)
- The design of a microkernel application platform for shop-floor automation extended abstract (1992) (1)
- Proxy topology building and routing in P2P SIP architectures (2010) (1)
- Monitoring darknet activities by using network telescope (2017) (1)
- Using XML Similarity to Enhance SOAP Messages Security (2008) (1)
- Towards semantic-based P2P reputation systems (2009) (1)
- Semantics-Aware Perimeter Protection (2003) (1)
- An Architecture of a Wavelet Based Approach for the Approximate Querying of Huge Sets of Data in the Telecommunication Environment (2005) (1)
- Database and Expert Systems Applications (1993) (1)
- An Enhanced Conceptual Security Model for Autonomous Vehicles (2020) (1)
- Towards Model-Driven Big-Data-as-a-Service (2016) (1)
- The CDESF Toolkit: An Introduction (2020) (1)
- An Assurance Framework and Process for Hybrid Systems (2020) (1)
- High Performance Personal Adaptation Speech Recognition Framework by Incremental Learning with Plural Language Models (2019) (1)
- ODDI - A Framework for Semi-automatic Data Integration (2008) (1)
- General chairs and keynote speakers (2013) (1)
- Security in information systems : Advances and new challenges (2014) (1)
- SyQL: A Controlled Experiment Concerning the Evaluation of its Benefits (2010) (1)
- A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities (2021) (1)
- Bargaining Compatible Explanations (2019) (1)
- A Knowledge-Based IoT Security Checker (2018) (1)
- An efficient language pipeline for flexible rule-based context representation (2013) (1)
- Sensor-Aware Web interface (2010) (1)
- A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem (2020) (1)
- Software-Based Attestation (2011) (1)
- Smart Healthcare, IoT and Machine Learning: A Complete Survey (2021) (1)
- Intelligent Multimedia Information Management (2000) (1)
- Monitoring Business Processes (2010) (1)
- Pay-with-a-Selfie, a human-centred digital payment system (2017) (1)
- Computational intelligence for multimedia and industrial applications (2017) (1)
- A Scattering Technique for Protecting Cryptographic Keys in the Cloud (2017) (1)
- Security enhancements to TLS for improved national control (2017) (1)
- The Ninth IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2000, San Antonio, Texas, USA, May 7-10, 2000. Proceedings (2000) (1)
- The Simplification Conspiracy (2017) (1)
- Learning Vector Quantization and Radial Basis Function Performance Comparison Based Intrusion Detection System (2021) (1)
- Information dissemination in unstructured networks by self-repulsive random walks (2009) (1)
- Flick: Japanese Input Method Editor Using N-Gram and Recurrent Neural Network Language Model Based Predictive Text Input (2017) (1)
- Mapping Linux Security Targets to Existing Test Suites (2008) (1)
- OntoExtractor: A Fuzzy-Based Approach to Content and Structure-Based Metadata Extraction (2006) (1)
- Semantics-aware querying in the WWW: the WG-Log Web query system (1999) (1)
- Privacy Preserving Risk Assessment of Credit Securities (2009) (1)
- DEE : a tool for genetic tuning of softwarecomponents on a distributed network ofworkstations (1998) (1)
- Assurance Process for Large Open Source Code Bases (2009) (1)
- Heterogeneous Business Process Management: A Metamodel-Based Approach (2015) (1)
- A semi-automatic framework for the design of rational resilient collaborative systems (2014) (1)
- Goal Aware Context Respectful Counseling Agent (2016) (1)
- A Trust Assurance Technique for IoT based on Human Behavior Compliance (2019) (1)
- An Emerging Security Framework for Connected Autonomous Vehicles (2020) (1)
- OSS security certification (2009) (1)
- Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXIX (2018) (1)
- Broadcasting in Opportunistic Networks (2008) (1)
- Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy (2005) (1)
- Conceptual modeling in the era of Big Data and Artificial Intelligence: Research topics and introduction to the special issue (2021) (1)
- Fuzzy Service Selection in a Distributed (2001) (1)
- Implementing Open Source Software Governance in Real Software Assurance Processes (2010) (1)
- Directions and trends of XML and web service security (2006) (1)
- Counseling (ro)bot as a use case for 5G/6G (2022) (1)
- Unleashing Operational Process Mining (2014) (1)
- Chapter 7 Assessing Compliance of Open Data in Politics with European Data Protection Regulation (2019) (1)
- Techniques, Technologies and Models for Big Data as a service (2016) (1)
- Temporal aspects of semistructured data (Extended Abstract) (2001) (1)
- Clause Anaphora Resolution for Japanese Demonstrative Determiner Based on Semantic Similarity between Different Part-of-Speech (2013) (1)
- Enhanced Context Respectful Counseling Agent (2015) (1)
- Towards privacy-aware identity management (2005) (1)
- Network virtualization by differentially switched VPN for stable business communication with offshore computers (2016) (1)
- Robust Fuzzy Filter for Noise Reduction in Video Deinterlacing (2008) (1)
- Innovation Factory: An Innovative Collaboration and Management Scenario (2015) (1)
- Flexible query techniques for well-formed XML documents (2000) (1)
- CovidSense: A Smartphone-based Initiative for Fighting COVID-19 Spreading (2020) (1)
- Towards Self-Organizing Internet of Things - Aware Systems for Online Sales (2015) (1)
- Editorial for intelligent interactive multimedia systems and services (2012) (1)
- Reputation-Aware Relay Selection With Opportunistic Spectrum Access: A Blockchain Approach (2023) (1)
- Speaker Identification from emotional and noisy speech data using learned voice segregation and Speech VGG (2022) (1)
- Secure and Scalable Collaborative Edge Computing using Decision Tree (2022) (1)
- Security Certification Scheme for Content-centric Networks (2021) (1)
- New data poison attacks on machine learning classifiers for mobile exfiltration (2022) (1)
- Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network (2022) (1)
- Self-Supervised Online and Lightweight Anomaly and Event Detection for IoT Devices (2022) (1)
- A Surrogate-Based Technique for Android Malware Detectors' Explainability (2022) (1)
- Battery Recharging Time-Based Routing for Power Constrained IoT Networks (2021) (1)
- Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices (2022) (1)
- A Modelling Framework for Evidence-Based Public Health Policy Making (2022) (1)
- Evaluation Goals for Online Process Mining: a Concept Drift Perspective (2022) (1)
- Selecting Optimal Trace Clustering Pipelines with Meta-learning (2022) (1)
- Assessing Business Process Security Awareness: A Service-Oriented Approach (2007) (1)
- Toward Open World and Multimodal Situation Models for Sensor-Aware Web Platforms (2011) (1)
- Designing a Recommender System for Touristic Activities in a Big Data as a Service Platform (2019) (1)
- Hypermedia Information Systems (2003) (0)
- Converging Trends Towards Human-Centerednes and Enabling Theories (2003) (0)
- An interval type-2 fuzzy active contour model for auroral oval segmentation (2015) (0)
- HARDWARE-ASSISTED VIRTUALIZATION AND ITS APPLICATIONS TO SYSTEMS SECURITY (2013) (0)
- Flexible Queries to Semistructured Datasources: The WG-log Approach (1999) (0)
- Designing and Developing Monitoring Agents for ERP Systems (2009) (0)
- Guest editorial: large-scale Web virtualized environment (2015) (0)
- Introduction to OSS 2007 Tutorial Program (2007) (0)
- RACOON : A Framework for the Design of Accountable Selfish-Resilient Cooperative Systems Technical Report (2015) (0)
- Granulating XML information (2002) (0)
- How Reliable are Experts’ Assessments? A Case Study on UAV Security (2017) (0)
- Intelligent Multimedia Multi-Agent Clinical Diagnosis and Treatment Support System (2000) (0)
- Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers (2020) (0)
- Welcome from the Conference General Chairs (2020) (0)
- ICWS 2010 - 2010 IEEE 8th International Conference on Web Services: Message from the general chairs (2010) (0)
- Big Data Semantics (2018) (0)
- Chapter 15 Privacy-Enhanced Location Services (2007) (0)
- SPADE: A Framework for After-Disaster Adaptive Recovery Processes (2013) (0)
- Learning Simplified Functions to Understand (2020) (0)
- Security Aspects of De-materialized Local Public Administration Processes (2015) (0)
- Database and Expert Systems Applications - 28th International Conference, DEXA 2017, Part II (2017) (0)
- Editorial: Special issue on trusted Cloud-Edges computations (2021) (0)
- Evaluation of Novel Approaches to Software Engineering: 14th International Conference, ENASE 2019, Heraklion, Crete, Greece, May 4–5, 2019, Revised Selected Papers (2020) (0)
- Real-time image processing systems using fuzzy and rough sets techniques (2018) (0)
- PHP 2019 Reviewers (2019) (0)
- Database and Expert Systems Applications (2017) (0)
- A Human Centered Architecture for Distributed Retrieval of Medical Images (1999) (0)
- eHR-KM - First International Workshop on Knowledge Management and e-Human Resources Practices for Innovation (2011) (0)
- Real-time probing of control-flow and data-flow in event logs (2022) (0)
- Ensuring theidentity ofauserintime: amulti-modal fuzzy approach (2007) (0)
- SETOP'2012 and FPS'2012 special issue (2013) (0)
- Clustering Models in Secure Clustered Multiparty Computation (2013) (0)
- Basic Notions on Access Control (2009) (0)
- Scouting Big Data Campaigns using TOREADOR Labs (2017) (0)
- A foreword from the guest editors (1998) (0)
- W15 - ELSys '07: 1st International Workshop on E-Learning Systems (2007) (0)
- Preface (2006) (0)
- Big Multimodal Data Analysis: Models and Performance Analysis (2022) (0)
- Fuzzy applications (panel session) (title only) (1996) (0)
- Network virtualization by differentially switched VPN for stable business communication with offshore computers (2016) (0)
- Human-Centered E-Business System Development Framework (2003) (0)
- Resilience learning through self adaptation in digital twins of human-cyber-physical systems (2021) (0)
- Offline Expansion of XACML Policies (2005) (0)
- Securing the banking ecosystem: A quantum leap? Italian open panel (2012) (0)
- Script Language Security (2011) (0)
- Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services (2021) (0)
- Managing Multiple and Dependable Identities Definitions and Requirements Motivations Underlying Mddi Demand (2003) (0)
- Long-term OSS security certifications: An Outlook (2009) (0)
- A Security Certification Scheme for Information-Centric Networks (2022) (0)
- Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000 (2019) (0)
- Preface From The General Chairs (2008) (0)
- Evaluation of Language Pipeline for Awareness Service Platform (2012) (0)
- A Brokerage System for Electronic Commerce Based on HCVM (2000) (0)
- Fuzzy Retrieval of Object-Oriented Software Components (2001) (0)
- Deep learning approaches for vulnerable road users safety (2023) (0)
- Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security (2006) (0)
- T OWARDS I DENTITY M ANAGEMENT FOR E-S ERVICES (0)
- Computational intelligence for multimedia and industrial applications (2017) (0)
- SWWS 2009 PC Co-chairs' Message (2009) (0)
- 11 th conference on advanced information technologies for management (2013) (0)
- Database and Expert Systems Applications (1994) (0)
- Balanced Measurement Sets: Criteria for Improving Project Management Practices (2014) (0)
- Software reuse technology practices and assessment tool-kit (2000) (0)
- E-Sales Recruitment (2003) (0)
- Program Committee Chair del "12th International Symposium on distributed objects, middleware, and applications (DOA)" (2010) (0)
- Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- Querying UMUXMI Design Information (2001) (0)
- Session details: Session 4 (2007) (0)
- Combining Semantic Lifting and Ad-hoc Contextual Analysis in a Data Loss Scenario (2013) (0)
- Invited Talk - Towards Semantics-Aware Access Control (2004) (0)
- Controlling Leakage and Disclosure Risk in Big Data applications (2017) (0)
- Extensible Markup Language has (2001) (0)
- Human-Centered Knowledge Management (2003) (0)
- Database and Expert Systems Applications (2017) (0)
- Guest Editorial (2008) (0)
- Dynamic clustering for technology-based domain analysis (TDA) (1997) (0)
- Fast and low cost 3d object recognition (2009) (0)
- Special issue: Semantics-Aware Techniques for Security (2004) (0)
- L-VCONF: A Location-Aware Infrastructure for Battlefield Videoconferences (2007) (0)
- Activity Theory forOSS Ecosystems (2007) (0)
- Processes meet big data (2015) (0)
- On-the-fly collaboration for legacy business process systems in an open service environment (2019) (0)
- ODDI: Ontology-Driven Data Integration (2008) (0)
- Risk assessment of credit securities: The notion and the issues (2012) (0)
- Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005 (2005) (0)
- Accessing Identity Data via EJB (2005) (0)
- Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study (2008) (0)
- An emotional word focused counseling agent and its evaluation (2014) (0)
- Inter-rater Agreement Based Risk Assessment Scheme for ICT Corporates (2022) (0)
- Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach (2007) (0)
- Hr-semantics Roadmap Human Resources Domain Executive Summary (0)
- Emergent Innovation and Sustainable Knowledge Co- Creation A Socio-Epistemological Approach to “Innovation from Within” (2019) (0)
- An efficient language pipeline for flexible rule-based context representation (2012) (0)
- Landmark-assisted location and tracking in outdoor mobile network (2011) (0)
- Value-based Modeling of Supply Chains for Disclosure Risk Assessment (2009) (0)
- EUREA project: collaboration between LERU universities in terms of higher education and teaching through ICT. (2005) (0)
- Recent Investigation of EEG Signals with Respect to Malicious Intention (2018) (0)
- Using WG-Log to interact with heterogeneous data sources: the example of OEM (1998) (0)
- Session details: Neuro-fuzzy applications (2002) (0)
- Visual Cryptography in Action: The Pay-with-a-Selfie Demo (2017) (0)
- Evaluation of Novel Approaches to Software Engineering (2018) (0)
- The Problem of Handling Multiple Headers in WS-Security Implementations (2014) (0)
- Active Rules for Business Value Models (2009) (0)
- Asset-centric security-aware service selection (2016) (0)
- Visual Counseling Agent and its Evaluation (2018) (0)
- Editorial to the second workshop on Security and Privacy in Enterprise Computing (InSPEC09) (2009) (0)
- A Modern Solution for Identifying, Monitoring, and Selecting Configurations for SSL/TLS Deployment (2018) (0)
- Blockcheck: A consortium blockchain-based conformance checking framework for business processes (2022) (0)
- Validating Vector-Label Propagation for Graph Embedding (2022) (0)
- Soft Computing Techniques for an Intelligent use of Internet Resources (2000) (0)
- Simulating a Trust-Based Peer-to-Peer Metadata Publication Center (2006) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- A Framework for Trace Clustering and Concept-drift Detection in Event Streams (2017) (0)
- Rules-based process mining to discover PLM system processes (2021) (0)
- ARiskModel for Cloud Processes (2015) (0)
- Formal methods for software verification (2009) (0)
- Guest Editorial: QoS and security in software for wireless and mobile micro-services (2021) (0)
- Session details: Secure service-oriented architectures (2009) (0)
- Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds (2015) (0)
- Mobile medical ignorance APP (MOMIA) : a new tool for promoting questions, questioning and questioners (Q3)- anytime, anywhere, anyone (2015) (0)
- Foreword from the program chairs (2011) (0)
- Modeling Human Dynamics and Breakdowns — Intelligent Agents for Internet Games and Recruitment (2000) (0)
- Human-Centered System Development Framework (2000) (0)
- IEEE 2020 World Congress on Services Message from the Program Chairs in Chief (2020) (0)
- S Security, Privacy, and Trust in Mobile Systems (2016) (0)
- Big Multimodal Data Analysis: Applications (2022) (0)
- Successful Systems or Successful Technologies (2000) (0)
- Towards fully de-materialized check management (2017) (0)
- Security Certification for the Cloud: The CUMULUS Approach (2015) (0)
- Set-Based Counterfactuals in Partial Classification (2022) (0)
- A graph-based meta-model for heterogeneous data management (2018) (0)
- Flexible Queries to XML Information (2003) (0)
- Optimal Resource Allocation for Containerized Cloud Microservices (2022) (0)
- 4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs (2014) (0)
- Embodiment matters: toward culture-specific robotized counselling (2020) (0)
- Erratum to: Translating BPMN to Business Rules (2016) (0)
- Spago4Q and the QEST (2010) (0)
- Rich Context Representation for Situation Aware System (2012) (0)
- Evaluation of Method for Multiplexing Communication Routes to Avoid Intentional Barriers (2015) (0)
- Session details: Access control (2005) (0)
- The Integrated Wg-log System for Querying Semi-structured Information (1999) (0)
- Subgroup Cryptosystems (2011) (0)
- VICA, a visual counseling agent for emotional distress (2019) (0)
- K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning (2018) (0)
- Analysis of Energy-Efficient Buildings through Simulation and Formal Methods (2016) (0)
- PAPER Special Section on Nonlinear Theory and Its Applications FPGA-Based Hash Circuit Synthesis with Evolutionary Algorithms (1999) (0)
- Big Data and Data Analytics Research (2019) (0)
- 2020 IEEE World Congress on Services Message from the Steering Committee Chair (2019) (0)
- Semantics-aware techniques for security (2004) (0)
- Collective brain surrogates (2020) (0)
- A human-centered approach for intelligent Internet applications (2002) (0)
- SWWS 2006 PC Co-chairs' Message (2006) (0)
- Special Issue on Soft Computing in the Semantic Web (2008) (0)
- DOA-SVI 2011 PC Co-chairs' Message (2011) (0)
- Editorial (2009) (0)
- The role of virtual testing labs (2009) (0)
- Knowledge-Based Legal Document Retrieval: A Case Study on Italian Civil Court Decisions (2022) (0)
- On Analysis of Security and Elasticity Dependency in IIoT Platform Services On Analysis of Security and Elasticity Dependency in IIoT Platform Services (2021) (0)
- Open Source Systems: Adoption and Impact 11th IFIP WG 2.13 International Conference, OSS 2015, Florence, Italy, May 16-17, 2015 (2015) (0)
- Session details: Session 2 (2007) (0)
- Deep Learning-Based Arrhythmia Detection Using RR-Interval Framed Electrocardiograms (2020) (0)
- Hash-comb: a Hierarchical Distance-Preserving Multi-hash Data Representation for Collaborative Analytics (2022) (0)
- Human-Centered Intelligent Web Based Missing Person Clothing Identification System (2003) (0)
- Message from the fuzzy applications track chair (track introduction only) (2000) (0)
- Guest editorial: online multimedia signal and image processing (2015) (0)
- The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions (2023) (0)
- Metadata management in encrypted outsourced databases (2005) (0)
- Special issue: Open Source Certification (2010) (0)
- Using Generative Adversarial Networks to Simulate System Calls of Malicious Android Processes (2022) (0)
- Open Source Systems (2006) (0)
- Robust ML Model Ensembles via Risk-driven Anti-clustering of Training Data (2023) (0)
- ON SIMILARITY-BASED SOAP PROCESSING PERFORMANCE ENHANCEMENT (2018) (0)
- Test based security certifications (2009) (0)
- Editorial (2013) (0)
- A Visualized Malware Detection Framework with CNN and Conditional GAN (2022) (0)
- HCVM Based Context-Dependent Data Organization for E-Commerce (2003) (0)
- Data independent warmup scheme for non-IID federated learning (2022) (0)
- Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions (2022) (0)
- 2018 World Automation Congress (2018) (0)
- 8 Trust Management (2007) (0)
- Hybrid Intrusion Detection and Prevention Systems Using Hierarchical Radial Basis Function Neural Networks (2022) (0)
- Querying UML/XML Design Information (2000) (0)
- Proactive Random-Forest Autoscaler for Microservice Resource Allocation (2023) (0)
- A User-Centered Approach to Content-Based Retrieval of Medical Images (2000) (0)
- A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model (2022) (0)
- Disaster Early Warning and Relief: A Human-Centered Approach (2014) (0)
- From Low-Level-Event-Logs to High-Level-Business-Process-Model-Activities: An Advanced Framework based on Machine Learning and Flexible BPMN Model Translation (2021) (0)
- Automated Monitoring of Collaborative Working Environments for Supporting Open Innovation (2018) (0)
- A TRUST ASSERTION MAKER TOOL (2006) (0)
- The Role of Encryption (2001) (0)
- 2018 World Automation Congress (2018) (0)
- Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks (2016) (0)
- A Novel Protocol for Security of Location Based Services in Multi-agent Systems (2019) (0)
- PMLite: An Open Source Solution for Process Monitoring (2008) (0)
- Explainable Label-flipping Attacks on Human Emotion Assessment System (2023) (0)
- Track 2 - ecosystem inspired computing (2010) (0)
- SWS '05 : proceedings of the 2005 ACM Workshop on Secure Web Services : November 11, 2005, Fairfax, Virginia, USA (co-located with CCS 2005) (2005) (0)
- Robotized Counselor Evaluation using Linguistic Detection of Feeling Polarity Change (2019) (0)
- AI-based Block Identification and Classification in the Blockchain Integrated IoT (2022) (0)
- EA-VGG: A new approach for emotional speech classification (2022) (0)
- Drone usage and privacy infringement : (2020) (0)
- Clause Anaphora Resolution of Japanese Demonstrative Determiner by Ontology Extension Using Distributed Expression of Words (2017) (0)
- Summarization-Guided Greedy Optimization of Machine Learning Model (2017) (0)
- A predictive target tracking framework for IoT using CNN–LSTM (2023) (0)
- On the Robustness of Ensemble-Based Machine Learning Against Data Poisoning (2022) (0)
- Blockchain Data Structures and Integrated Adaptive Learning: Features and Futures (2023) (0)
- ModularFed: Leveraging Modularity in Federated Learning Frameworks (2022) (0)
- Case Study 2: ICSA and CCHIT Certifications (2009) (0)
- Transformers for Imbalanced Baggage Threat Recognition (2022) (0)
- Trust-3DM: Trustworthiness-Based Data-Driven Decision-Making Framework Using Smart Edge Computing for Continuous Sensing (2022) (0)
- Blockchain-Enabled Moving Target Defense for Secure CR Networks (2022) (0)
- RSVP-TE Based Impairments Collection Mechanism in DWDM Network (2009) (0)
- Efficient and Rich Context Representation for Web Applications (2011) (0)
- Privacy Enhanced Authorizations and Data Handling (2006) (0)
- Virtual Lab : implementazione open source di un laboratorio virtuale (2007) (0)
- Pragmatic Considerations and Enabling Theories (2000) (0)
- Human-Centered Virtual Machine (2003) (0)
- A Java-based certification framework for service compositions (2013) (0)
- Toward Distributed Ledger Support for 5G Network Services (2022) (0)
- Break-out session: Securing the banking ecosystem (2012) (0)
- WMS 2003 PC Co-chairs' Message (2003) (0)
- Access Control for the Web-Based Infrastructure (Data-Centric Systems and Applications) (2005) (0)
- A Throughput Driven Task Scheduler for Batch Jobs in Shared MapReduce Environments (2014) (0)
- Database and Expert Systems Applications (1997) (0)
- Special issue on intelligent systems and applications in vision, image and information computing (2016) (0)
- E-Business Concepts and Technologies (2003) (0)
- A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models (2007) (0)
- Chapter V Towards Semantic-Based P 2 P Reputation Systems (2015) (0)
- SWWS 2011, MONET 2011 and SeDeS 2011 PC Co-chairs' Message (2011) (0)
- Chapter 6 - Monitoring Business Processes (2010) (0)
- A Data Quality-Driven Selection Mechanism for Continuous Mobile Crowdsensing: A Smart Edge Decision-Making (2022) (0)
- Multi-modal traffic event detection using shapelets (2022) (0)
- SWWS'10 - PC Co-chairs Message (2010) (0)
- HERMES: A XML-Based Environment for Flexible Requirements Management (2020) (0)
- C CL LO OU UD D 2 20 00 09 9 O Or rg ga an ni iz zi in ng g C Co om mm mi it tt te ee e CLOUD 2009 General Chair (2009) (0)
- Special issue: Web service security (2006) (0)
- A Multi-Agent System for Face Detection and Annotation (2000) (0)
- DOA'10 - PC Co-chairs Message (2010) (0)
- Real-time signal processing in embedded systems (2016) (0)
- Multimedia on the web - editorial (2014) (0)
- A Late Multi-Modal Fusion Model for Detecting Hybrid Spam E-mail (2022) (0)
- Customer Relationship Management and E-Banking (2003) (0)
- Malware Mitigation and Remediation Strategies (2009) (0)
- LESSONS LEARNED FROM THE EDITORIAL BOARD (2015) (0)
- Preface: Springer computing journal (2020) (0)
- Case Study 1: Linux certification (2009) (0)
- On the use of design patterns in collaborative design processes (2011) (0)
- Privacy in Big Data (2016) (0)
- Papers in track 9 - Digital business ecosystems (2008) (0)
- Untangling the XRP Ledger: Insights and Analysis (2020) (0)
- Data Poisoning Attacks on EEG Signal-based Risk Assessment Systems (2023) (0)
- Message from the technical programme chairs (2010) (0)
- Fine Grained A ess Control for SOAP E-Servi es (2001) (0)
- Reward Shaping Using Convolutional Neural Network (2022) (0)
- Implementing a Reputation-AwareGnutella (2002) (0)
- Editorial for intelligent interactive multimedia systems and services (2012) (0)
- 6 XML Security (2017) (0)
- Information Security Theory and Practice (2017) (0)
- Guest Editor di International journal on semantic Web and information systems. Special issue: Soft computing in the semantic Web (2008) (0)
This paper list is powered by the following services:
Other Resources About Ernesto Damiani
What Schools Are Affiliated With Ernesto Damiani?
Ernesto Damiani is affiliated with the following schools: