DAMIANI, ERNESTO
 Distribuzione geografica
Continente #
EU - Europa 18.894
NA - Nord America 11.170
AS - Asia 7.205
AF - Africa 1.227
SA - Sud America 532
OC - Oceania 488
Continente sconosciuto - Info sul continente non disponibili 46
Totale 39.562
Nazione #
US - Stati Uniti d'America 10.458
DE - Germania 10.144
IT - Italia 2.744
CN - Cina 1.977
IN - India 1.413
GB - Regno Unito 1.256
FR - Francia 885
NL - Olanda 649
CA - Canada 518
KR - Corea 488
IR - Iran 485
AU - Australia 412
ZA - Sudafrica 395
ID - Indonesia 332
JP - Giappone 324
RU - Federazione Russa 321
BR - Brasile 266
IE - Irlanda 263
MY - Malesia 239
AT - Austria 231
ES - Italia 227
CZ - Repubblica Ceca 219
PK - Pakistan 218
HK - Hong Kong 216
UA - Ucraina 208
SE - Svezia 205
VN - Vietnam 200
SG - Singapore 195
TR - Turchia 188
BE - Belgio 179
EG - Egitto 174
GR - Grecia 158
CH - Svizzera 157
RO - Romania 152
PL - Polonia 147
FI - Finlandia 138
AE - Emirati Arabi Uniti 134
PT - Portogallo 105
NO - Norvegia 104
NG - Nigeria 98
TW - Taiwan 98
DZ - Algeria 94
IL - Israele 93
PH - Filippine 93
CU - Cuba 92
SA - Arabia Saudita 91
EU - Europa 89
TN - Tunisia 88
MA - Marocco 87
TH - Thailandia 84
CL - Cile 64
JO - Giordania 63
MX - Messico 59
AR - Argentina 57
ET - Etiopia 57
NZ - Nuova Zelanda 57
DK - Danimarca 56
KE - Kenya 54
PE - Perù 49
RS - Serbia 48
CO - Colombia 47
HU - Ungheria 43
LU - Lussemburgo 42
IQ - Iraq 41
BD - Bangladesh 30
BG - Bulgaria 29
EE - Estonia 28
LK - Sri Lanka 27
CM - Camerun 25
HR - Croazia 24
LT - Lituania 24
EC - Ecuador 23
MU - Mauritius 22
MM - Myanmar 20
SK - Slovacchia (Repubblica Slovacca) 20
MT - Malta 19
SI - Slovenia 17
A1 - Anonimo 16
AL - Albania 15
GH - Ghana 15
OM - Oman 15
SD - Sudan 15
CY - Cipro 14
NP - Nepal 13
QA - Qatar 13
IS - Islanda 12
MO - Macao, regione amministrativa speciale della Cina 11
PS - Palestinian Territory 11
SY - Repubblica araba siriana 11
VE - Venezuela 11
ZW - Zimbabwe 11
BO - Bolivia 10
LB - Libano 9
LS - Lesotho 9
PA - Panama 9
BW - Botswana 8
FJ - Figi 8
LV - Lettonia 8
NC - Nuova Caledonia 8
BJ - Benin 7
Totale 39.435
Città #
Houston 850
Milan 806
Ashburn 702
Fairfield 685
Ann Arbor 547
Nürnberg 533
Seattle 391
Woodbridge 356
Wilmington 337
Beijing 335
Buffalo 313
Guangzhou 307
Mountain View 282
Cambridge 277
Kiez 271
Santa Cruz 222
Dublin 180
Rome 164
Redmond 138
London 135
Jakarta 130
Shanghai 125
Leawood 124
Hangzhou 123
Seoul 123
Johannesburg 117
Munich 116
Bengaluru 114
Hanoi 113
Mumbai 110
Boardman 107
Chicago 105
Ottawa 99
Norwalk 96
University Park 92
La Habana 91
Los Angeles 91
Singapore 91
Southend 90
Tokyo 87
Paris 82
Wuhan 82
San Diego 81
Toronto 81
Tehran 78
Vienna 77
Bangalore 74
New York 68
New Delhi 67
Sydney 67
Shenyang 66
Islamabad 65
Phoenix 65
Melbourne 64
Taipei 64
Council Bluffs 63
Gurgaon 63
Central 61
Central District 61
Chennai 61
Modena 61
Bergamo 60
Kuala Lumpur 59
Hyderabad 57
Pune 57
Athens 56
Juan-les-pins 56
Cairo 55
Frankfurt am Main 54
Sunnyvale 53
Berlin 52
Montréal 52
San Jose 52
Changsha 51
Pretoria 51
Abu Dhabi 49
Cape Town 49
Stuttgart 48
Eindhoven 47
Las Vegas 47
Ankara 46
Helsinki 46
Brisbane 45
Delhi 45
Istanbul 45
Albany 44
Amsterdam 44
Costa Mesa 43
Nanjing 42
Atlanta 41
Dallas 41
Fremont 41
Suri 40
Clearwater 39
Kolkata 39
San Francisco 39
Brussels 38
Utrecht 38
Duncan 36
Hamburg 36
Totale 13.259
Nome #
A toward framework for generic uncertainty management, file dfa8b98e-feee-748b-e053-3a05fe0a3a96 7.843
Big data analytics as-a-service: Issues and challenges, file dfa8b997-8994-748b-e053-3a05fe0a3a96 2.562
From security to assurance in the cloud: a survey, file dfa8b992-f3d2-748b-e053-3a05fe0a3a96 2.305
Process mining manifesto, file dfa8b98f-bf2d-748b-e053-3a05fe0a3a96 2.121
A Deep Learning Approach to Radio Signal Denoising, file dfa8b9a2-4fbb-748b-e053-3a05fe0a3a96 1.596
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities, file dfa8b99a-0c49-748b-e053-3a05fe0a3a96 1.092
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol, file dfa8b9a1-e631-748b-e053-3a05fe0a3a96 936
Secure collaborative supply-chain management, file dfa8b990-5a83-748b-e053-3a05fe0a3a96 935
Location privacy protection through obfuscation-based techniques, file dfa8b990-e52b-748b-e053-3a05fe0a3a96 872
STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets, file dfa8b9a8-27fc-748b-e053-3a05fe0a3a96 858
A fuzzy extension of the XPath query language, file dfa8b98e-fe5b-748b-e053-3a05fe0a3a96 794
Model-based Big Data Analytics-as-a-Service : Take Big Data to the Next Level, file dfa8b99a-de92-748b-e053-3a05fe0a3a96 749
Emergent semantics in distributed knowledge management, file dfa8b98f-9651-748b-e053-3a05fe0a3a96 731
Business intelligence meets big data : an overview on security and privacy, file dfa8b991-6786-748b-e053-3a05fe0a3a96 665
Efficient SOAP message exchange and evaluation through XML similarity, file dfa8b98e-fba2-748b-e053-3a05fe0a3a96 562
Bottom-up extraction and trust-based refinement of ontology metadata, file dfa8b98f-9650-748b-e053-3a05fe0a3a96 531
Evaluation Goals for Online Process Mining: a Concept Drift Perspective, file dfa8b9a2-e9ed-748b-e053-3a05fe0a3a96 494
Fuzzy XPath : using fuzzy logic and IR features to approximately query XML documents, file dfa8b98e-fcb3-748b-e053-3a05fe0a3a96 472
Artificial Intelligence Cybersecurity Challenges ; Threat Landscape for Artificial Intelligence, file dfa8b9a5-44c1-748b-e053-3a05fe0a3a96 431
Ensuring the identity of a user in time : a multi-modal fuzzy approach, file dfa8b98e-f314-748b-e053-3a05fe0a3a96 418
Securely updating XML, file dfa8b98e-fbb4-748b-e053-3a05fe0a3a96 401
iPrivacy : a distributed approach to privacy on the cloud, file dfa8b98f-bf95-748b-e053-3a05fe0a3a96 391
A trust assurance technique for Internet of things based on human behavior compliance, file dfa8b99e-52a6-748b-e053-3a05fe0a3a96 388
Using autoencoders for radio signal denoising, file dfa8b9a2-5462-748b-e053-3a05fe0a3a96 370
Towards privacy-aware identity management, file dfa8b98e-9855-748b-e053-3a05fe0a3a96 356
VICA, a visual counseling agent for emotional distress, file dfa8b9a0-031b-748b-e053-3a05fe0a3a96 342
A Modelling Framework for Evidence-based Public Health Policy Making, file dfa8b9a9-bc99-748b-e053-3a05fe0a3a96 336
CR2S : competency roadmap to strategy, file dfa8b98f-9670-748b-e053-3a05fe0a3a96 334
Using open source middleware for securing E-Gov applications, file dfa8b98e-f79a-748b-e053-3a05fe0a3a96 310
Flexible extension of XPath to improve XML querying, file dfa8b98e-fba8-748b-e053-3a05fe0a3a96 300
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems, file dfa8b9a4-101e-748b-e053-3a05fe0a3a96 295
Trustworthy IoT: An evidence collection approach based on smart contracts, file dfa8b9a0-097b-748b-e053-3a05fe0a3a96 293
Rules-based process mining to discover PLM system processes, file dfa8b9a9-25ff-748b-e053-3a05fe0a3a96 290
ODDI : a framework for semi-automatic data integration, file dfa8b98e-f740-748b-e053-3a05fe0a3a96 288
Test-based security certification of composite services, file dfa8b99d-09e9-748b-e053-3a05fe0a3a96 288
Toward IoT-Friendly Learning Models, file dfa8b99c-018e-748b-e053-3a05fe0a3a96 262
On the use of design patterns in collaborative design processes, file dfa8b990-5655-748b-e053-3a05fe0a3a96 245
Monitoring business processes in the networked enterprise, file dfa8b990-67e7-748b-e053-3a05fe0a3a96 238
A general approach to securely querying XML, file dfa8b98e-fd0c-748b-e053-3a05fe0a3a96 218
Defining and matching test-based certificates in Open SOA, file dfa8b990-8a4c-748b-e053-3a05fe0a3a96 211
Estimating Degradation of Machine Learning Data Assets, file dfa8b9a8-9b54-748b-e053-3a05fe0a3a96 207
Cost-effective deployment of certified cloud composite services, file dfa8b9a0-56cd-748b-e053-3a05fe0a3a96 203
Editorial for intelligent interactive multimedia systems and services, file dfa8b98f-bc58-748b-e053-3a05fe0a3a96 202
Computing range queries on obfuscated data, file dfa8b98f-2ddc-748b-e053-3a05fe0a3a96 201
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem, file dfa8b9a0-fded-748b-e053-3a05fe0a3a96 201
Unleashing operational process mining, file dfa8b991-294c-748b-e053-3a05fe0a3a96 195
Dynamic and Scalable Enforcement of Access Control Policies for Big Data, file dfa8b9a8-d56a-748b-e053-3a05fe0a3a96 192
Towards pattern-based reliability certification of services, file dfa8b98f-56ca-748b-e053-3a05fe0a3a96 182
Certification-Based Cloud Adaptation, file dfa8b99a-70e3-748b-e053-3a05fe0a3a96 181
Web service assurance : the notion and the issues, file dfa8b98f-a224-748b-e053-3a05fe0a3a96 178
A general approach to securely querying XML, file dfa8b98e-fcad-748b-e053-3a05fe0a3a96 177
Decompositions of Bn and Πn using symmetric chains, file dfa8b98f-1bc3-748b-e053-3a05fe0a3a96 175
Bayer demosaicking with polynomial interpolation, file dfa8b9a6-40ba-748b-e053-3a05fe0a3a96 174
Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists, file dfa8b9a7-c865-748b-e053-3a05fe0a3a96 167
Towards the definition of an information quality metric for information fusion models, file dfa8b9a4-7ca1-748b-e053-3a05fe0a3a96 163
Dynamic Access Control to Semantics-Aware Streamed Process Logs, file dfa8b99f-56eb-748b-e053-3a05fe0a3a96 155
Modeling time, probability, and configuration constraints for continuous cloud service certification, file dfa8b999-ad00-748b-e053-3a05fe0a3a96 152
A WOWA-based aggregation technique on trust values connected to metadata, file dfa8b99f-2ac5-748b-e053-3a05fe0a3a96 152
Applying recommender systems in collaboration environments, file dfa8b992-e2bb-748b-e053-3a05fe0a3a96 150
Facial identification problem : a tracking based approach, file dfa8b98e-6fa4-748b-e053-3a05fe0a3a96 147
Toward a new generation of log pre-processing methods for process mining, file dfa8b999-83f1-748b-e053-3a05fe0a3a96 145
What can Machine Learning do for Radio Spectrum Management?, file dfa8b9a4-63fe-748b-e053-3a05fe0a3a96 142
Toward sensor-based context aware systems, file dfa8b990-5be9-748b-e053-3a05fe0a3a96 141
Securing machine learning algorithms, file dfa8b9a8-d4b0-748b-e053-3a05fe0a3a96 129
A semi-automatic and trustworthy scheme for continuous cloud service certification, file dfa8b997-d518-748b-e053-3a05fe0a3a96 128
A Continuous Certification Methodology for DevOps, file dfa8b9a1-00a6-748b-e053-3a05fe0a3a96 123
Scouting Big Data Campaigns using TOREADOR Labs, file dfa8b997-f367-748b-e053-3a05fe0a3a96 119
Real-time image processing systems using fuzzy and rough sets techniques, file dfa8b99d-23dd-748b-e053-3a05fe0a3a96 119
A design methodology for matching smart health requirements, file dfa8b9a3-ed57-748b-e053-3a05fe0a3a96 117
Performance Analysis of a Polling-Based Access Control Combining with the Sleeping Schema in V2I VANETs for Smart Cities, file dfa8b99d-455d-748b-e053-3a05fe0a3a96 115
Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach, file dfa8b99d-3f90-748b-e053-3a05fe0a3a96 113
Artificial intelligence in deep learning algorithms for multimedia analysis, file dfa8b9a5-1d72-748b-e053-3a05fe0a3a96 113
Extending the Outreach : From Smart Cities to Connected Communities, file dfa8b999-b8df-748b-e053-3a05fe0a3a96 110
Blockchain-based reputation systems: Implementation challenges and mitigation, file dfa8b9a5-5651-748b-e053-3a05fe0a3a96 110
Trustworthiness-related uncertainty of semantic web-style metadata : a possibilistic approach, file dfa8b98e-27aa-748b-e053-3a05fe0a3a96 109
Special issue on real-time image and video processing in mobile embedded systems, file dfa8b9a0-4f7c-748b-e053-3a05fe0a3a96 109
From Low-Level-Event-Logs to High-Level-Business-Process-Model-Activities: An Advanced Framework based on Machine Learning and Flexible BPMN Model Translation, file dfa8b9a8-997b-748b-e053-3a05fe0a3a96 106
Embodiment matters : toward culture-specific robotized counselling, file dfa8b9a2-b930-748b-e053-3a05fe0a3a96 97
Which role for an ontology of uncertainty?, file dfa8b98e-f85d-748b-e053-3a05fe0a3a96 87
Knowledge Driven Behavioural Analysis in Process Intelligence, file dfa8b992-ae16-748b-e053-3a05fe0a3a96 87
A semi-automatic framework for the design of rational resilient collaborative systems, file dfa8b991-340b-748b-e053-3a05fe0a3a96 82
From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain, file dfa8b9a4-d3c5-748b-e053-3a05fe0a3a96 82
A security certification scheme for Information-Centric Networks, file dfa8b9aa-28db-748b-e053-3a05fe0a3a96 81
Knowledge-Based Legal Document Retrieval: A Case Study on Italian Civil Court Decisions, file 53d0cfab-f090-4f35-ad33-8b3b89151760 80
Modeling Threats to AI-ML Systems Using STRIDE, file 7fe02b5e-30bc-4c62-ba30-6c78a0704384 79
Validating Vector-Label Propagation for Graph Embedding, file b55712c2-c4c9-45fd-adc9-d929131eba72 78
Handling confidential data on the untrusted cloud : an agent-based approach, file dfa8b98f-3573-748b-e053-3a05fe0a3a96 78
Information dissemination in unstructured networks by self-repulsive random walks, file dfa8b98e-d35d-748b-e053-3a05fe0a3a96 75
K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning, file dfa8b99f-da7e-748b-e053-3a05fe0a3a96 75
A scalable multi-party protocol for privacy-preserving equality test, file dfa8b9a4-2671-748b-e053-3a05fe0a3a96 74
A component-based architecture for secure data publication, file dfa8b9a2-fdad-748b-e053-3a05fe0a3a96 68
Toward model-based big data-as-a-service: The TOREADOR approach, file dfa8b999-d55b-748b-e053-3a05fe0a3a96 65
Dynamic Access Control to Semantics-Aware Streamed Process Logs, file dfa8b99f-9661-748b-e053-3a05fe0a3a96 64
De-Materializing Local Public Administration Processes, file dfa8b992-a378-748b-e053-3a05fe0a3a96 62
Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS), file dfa8b99b-9b45-748b-e053-3a05fe0a3a96 57
Robust computationally-efficient wireless emitter classification using autoencoders and convolutional neural networks, file dfa8b9a7-4a3c-748b-e053-3a05fe0a3a96 55
An Assurance Framework and Process for Hybrid Systems, file 170eea38-5210-471b-b4eb-7ebad22c84a4 49
A Methodology for Non-Functional Property Evaluation of Machine Learning Models, file dfa8b9a7-09c9-748b-e053-3a05fe0a3a96 48
Guest Editorial : QoS and security in software for wireless and mobile micro-services, file dfa8b9a7-4a3b-748b-e053-3a05fe0a3a96 47
Security Certification Scheme for Content-centric Networks, file dfa8b9a8-fb71-748b-e053-3a05fe0a3a96 43
Totale 40.338
Categoria #
all - tutte 56.976
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 56.976


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20191.916 0 0 0 0 0 181 252 227 297 276 351 332
2019/20203.332 253 116 231 394 333 333 284 277 367 296 246 202
2020/20214.524 226 314 274 343 344 319 433 385 404 558 494 430
2021/20227.121 491 433 428 872 795 551 542 508 556 541 849 555
2022/20236.046 343 428 713 676 676 523 521 448 436 384 492 406
2023/20242.424 478 413 467 389 539 138 0 0 0 0 0 0
Totale 41.273