Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Luca Pajola"'
Publikováno v:
IEEE Access, Vol 11, Pp 9859-9875 (2023)
Augmented and Virtual Reality (AR and VR), collectively known as Extended Reality (XR), are increasingly gaining traction thanks to their technical advancement and the need for remote connections, recently accentuated by the pandemic. Remote surgery,
Externí odkaz:
https://doaj.org/article/36846a5a42324820bb80cc64754a1cd2
Autor:
Piergiorgio Stevanato, Chiara Broccanello, Luca Pajola, Filippo Biscarini, Chris Richards, Lee Panella, Mahdi Hassani, Elide Formentin, Claudia Chiodi, Giuseppe Concheri, Bahram Heidari
Publikováno v:
Genes, Vol 8, Iss 10, p 264 (2017)
Resistance gene analogs (RGAs) were searched bioinformatically in the sugar beet (Beta vulgaris L.) genome as potential candidates for improving resistance against different diseases. In the present study, Ion Torrent sequencing technology was used t
Externí odkaz:
https://doaj.org/article/b651422ef00c4ff98ee3e414eaf2856b
Publikováno v:
ACM Transactions on the Web.
Review platforms are viral online services where users share and read opinions about products (e.g., a smartphone) or experiences (e.g., a meal at a restaurant). Other users may be influenced by such opinions when making deciding what to buy. The usa
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031334870
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7bd4764c9695e3d0ea9dd07d2c173a19
https://doi.org/10.1007/978-3-031-33488-7_12
https://doi.org/10.1007/978-3-031-33488-7_12
Publikováno v:
IEEE Transactions on Network and Service Management. 18:1178-1190
The Internet of Things (IoT) is a reality that changes several aspects of our daily life, from smart home monitoring to the management of critical infrastructure. The “Routing Protocol for low power and Lossy networks” (RPL) is the only de-facto
Enhancing Network Intrusion Detection Systems (NIDS) with supervised Machine Learning (ML) is tough. ML-NIDS must be trained and evaluated, operations requiring data where benign and malicious samples are clearly labeled. Such labels demand costly ex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::37479bec65bc7ce1264b4b0e33e8f75b
https://hdl.handle.net/11577/3462401
https://hdl.handle.net/11577/3462401
Autor:
Luca Pajola, Mauro Conti
Publikováno v:
EuroS&P
The increased demand for machine learning applications made companies offer Machine-Learning-as-a-Service (MLaaS). In MLaaS (a market estimated 8000M USD by 2025), users pay for well-performing ML models without dealing with the complicated training
Publikováno v:
AISec@CCS
openaire: EC/H2020/688061/EU//TagItSmart With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem. In this paper, we reproduce seven state-of-the-art hate speech det