Zobrazeno 1 - 10
of 29 222
pro vyhledávání: '"Iacono"'
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 31, Iss 4, Pp 697-712 (2021)
The significant benefits of cloud computing (CC) resulted in an explosion of their usage in the last several years. From the security perspective, CC systems have to offer solutions that fulfil international standards and regulations. In this paper,
Externí odkaz:
https://doaj.org/article/78348d56960f4b8ab520d82bd67b30c5
This study explores the application of Virtual Reality (VR) as a tool for safety training in high-risk industrial settings, specifically focusing on the IPLOM refinery, Busalla (Italy). As industries increasingly adopt digital tools to enhance safety
Externí odkaz:
http://arxiv.org/abs/2412.13725
Autor:
Mohajer, Mohammadreza Bakhshizadeh, Barletta, Luca, Tuninetti, Daniela, Tomasoni, Alessandro, Iacono, Daniele Lo, Osnato, Fabio
Integrated sensing and communication is regarded as a key enabler for next-generation wireless networks. To optimize the transmitted waveform for both sensing and communication, various performance metrics must be considered. This work focuses on sen
Externí odkaz:
http://arxiv.org/abs/2410.22941
Publikováno v:
Neuropsychiatric Disease and Treatment, Vol Volume 16, Pp 131-152 (2020)
Roberto Gammeri, 1 Claudio Iacono, 1 Raffaella Ricci, 1, 2 Adriana Salatino 1 1Department of Psychology, SAMBA (SpAtial, Motor and Bodily Awareness) Research Group, University of Turin, Turin, Italy; 2Neuroscience Institute of Turin (NIT), University
Externí odkaz:
https://doaj.org/article/3fe31708b176412ebf0d7251790506cc
Publikováno v:
The 19th International Conference on Availability, Reliability and Security (ARES 2024), July 30-August 2, 2024, Vienna, Austria. ACM
HTTP client hints are a set of standardized HTTP request headers designed to modernize and potentially replace the traditional user agent string. While the user agent string exposes a wide range of information about the client's browser and device, c
Externí odkaz:
http://arxiv.org/abs/2405.13744
Publikováno v:
Journal of Experimental Pharmacology, Vol Volume 11, Pp 1-14 (2019)
Howard H Wang, 1 Hsi-Ming Lee, 2 Veena Raja, 2 Wei Hou, 3 Vincent J Iacono, 4 Joseph Scaduto, 5 Francis Johnson, 6,7 Lorne M Golub, 2 Ying Gu 8 1Department of Periodontology and Endodontology, School of Dental Medicine, State University of New York a
Externí odkaz:
https://doaj.org/article/8d0bd814dbd14049996f06c49770cfc5
Autor:
Iacono D, Favoino E, Borgia A, Fasano S, Pantano I, D'Abrosca V, Picillo G, Grembiale RD, Perosa F, Valentini G
Publikováno v:
Open Access Rheumatology: Research and Reviews, Vol Volume 10, Pp 129-134 (2018)
Daniela Iacono,1 Elvira Favoino,2 Alessia Borgia,1 Serena Fasano,1 Ilenia Pantano,1 Virginia D’Abrosca,1 Giuseppe Picillo,1 Rosa Daniela Grembiale,3 Federico Perosa,2 Gabriele Valentini1 1Department of Clinical and Experimental Medicine, Rheumatolo
Externí odkaz:
https://doaj.org/article/e3d64f6401de43b68d1bc3b35bed63ee
An $\ell$-vertex-ranking of a graph $G$ is a colouring of the vertices of $G$ with integer colours so that in any connected subgraph $H$ of $G$ with diameter at most $\ell$, there is a vertex in $H$ whose colour is larger than that of every other ver
Externí odkaz:
http://arxiv.org/abs/2404.16340
Autor:
Haeupler, Bernhard, Hladík, Richard, Iacono, John, Rozhon, Vaclav, Tarjan, Robert, Tětek, Jakub
We consider the problem of sorting $n$ items, given the outcomes of $m$ pre-existing comparisons. We present a simple and natural deterministic algorithm that runs in $O(m+\log T)$ time and does $O(\log T)$ comparisons, where $T$ is the number of tot
Externí odkaz:
http://arxiv.org/abs/2404.04552
Risk-based authentication (RBA) is used in online services to protect user accounts from unauthorized takeover. RBA commonly uses contextual features that indicate a suspicious login attempt when the characteristic attributes of the login context dev
Externí odkaz:
http://arxiv.org/abs/2403.11798