Nome |
# |
A toward framework for generic uncertainty management, file dfa8b98e-feee-748b-e053-3a05fe0a3a96
|
7.843
|
Big data analytics as-a-service: Issues and challenges, file dfa8b997-8994-748b-e053-3a05fe0a3a96
|
2.562
|
From security to assurance in the cloud: a survey, file dfa8b992-f3d2-748b-e053-3a05fe0a3a96
|
2.305
|
Process mining manifesto, file dfa8b98f-bf2d-748b-e053-3a05fe0a3a96
|
2.121
|
A Deep Learning Approach to Radio Signal Denoising, file dfa8b9a2-4fbb-748b-e053-3a05fe0a3a96
|
1.596
|
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities, file dfa8b99a-0c49-748b-e053-3a05fe0a3a96
|
1.092
|
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol, file dfa8b9a1-e631-748b-e053-3a05fe0a3a96
|
936
|
Secure collaborative supply-chain management, file dfa8b990-5a83-748b-e053-3a05fe0a3a96
|
935
|
Location privacy protection through obfuscation-based techniques, file dfa8b990-e52b-748b-e053-3a05fe0a3a96
|
872
|
STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets, file dfa8b9a8-27fc-748b-e053-3a05fe0a3a96
|
858
|
A fuzzy extension of the XPath query language, file dfa8b98e-fe5b-748b-e053-3a05fe0a3a96
|
794
|
Model-based Big Data Analytics-as-a-Service : Take Big Data to the Next Level, file dfa8b99a-de92-748b-e053-3a05fe0a3a96
|
749
|
Emergent semantics in distributed knowledge management, file dfa8b98f-9651-748b-e053-3a05fe0a3a96
|
731
|
Business intelligence meets big data : an overview on security and privacy, file dfa8b991-6786-748b-e053-3a05fe0a3a96
|
665
|
Efficient SOAP message exchange and evaluation through XML similarity, file dfa8b98e-fba2-748b-e053-3a05fe0a3a96
|
562
|
Bottom-up extraction and trust-based refinement of ontology metadata, file dfa8b98f-9650-748b-e053-3a05fe0a3a96
|
531
|
Evaluation Goals for Online Process Mining: a Concept Drift Perspective, file dfa8b9a2-e9ed-748b-e053-3a05fe0a3a96
|
494
|
Fuzzy XPath : using fuzzy logic and IR features to approximately query XML documents, file dfa8b98e-fcb3-748b-e053-3a05fe0a3a96
|
472
|
Artificial Intelligence Cybersecurity Challenges ; Threat Landscape for Artificial Intelligence, file dfa8b9a5-44c1-748b-e053-3a05fe0a3a96
|
431
|
Ensuring the identity of a user in time : a multi-modal fuzzy approach, file dfa8b98e-f314-748b-e053-3a05fe0a3a96
|
418
|
Securely updating XML, file dfa8b98e-fbb4-748b-e053-3a05fe0a3a96
|
401
|
iPrivacy : a distributed approach to privacy on the cloud, file dfa8b98f-bf95-748b-e053-3a05fe0a3a96
|
391
|
A trust assurance technique for Internet of things based on human behavior compliance, file dfa8b99e-52a6-748b-e053-3a05fe0a3a96
|
388
|
Using autoencoders for radio signal denoising, file dfa8b9a2-5462-748b-e053-3a05fe0a3a96
|
370
|
Towards privacy-aware identity management, file dfa8b98e-9855-748b-e053-3a05fe0a3a96
|
356
|
VICA, a visual counseling agent for emotional distress, file dfa8b9a0-031b-748b-e053-3a05fe0a3a96
|
342
|
A Modelling Framework for Evidence-based Public Health Policy Making, file dfa8b9a9-bc99-748b-e053-3a05fe0a3a96
|
336
|
CR2S : competency roadmap to strategy, file dfa8b98f-9670-748b-e053-3a05fe0a3a96
|
334
|
Using open source middleware for securing E-Gov applications, file dfa8b98e-f79a-748b-e053-3a05fe0a3a96
|
310
|
Flexible extension of XPath to improve XML querying, file dfa8b98e-fba8-748b-e053-3a05fe0a3a96
|
300
|
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems, file dfa8b9a4-101e-748b-e053-3a05fe0a3a96
|
295
|
Trustworthy IoT: An evidence collection approach based on smart contracts, file dfa8b9a0-097b-748b-e053-3a05fe0a3a96
|
293
|
Rules-based process mining to discover PLM system processes, file dfa8b9a9-25ff-748b-e053-3a05fe0a3a96
|
290
|
ODDI : a framework for semi-automatic data integration, file dfa8b98e-f740-748b-e053-3a05fe0a3a96
|
288
|
Test-based security certification of composite services, file dfa8b99d-09e9-748b-e053-3a05fe0a3a96
|
288
|
Toward IoT-Friendly Learning Models, file dfa8b99c-018e-748b-e053-3a05fe0a3a96
|
262
|
On the use of design patterns in collaborative design processes, file dfa8b990-5655-748b-e053-3a05fe0a3a96
|
245
|
Monitoring business processes in the networked
enterprise, file dfa8b990-67e7-748b-e053-3a05fe0a3a96
|
238
|
A general approach to securely querying XML, file dfa8b98e-fd0c-748b-e053-3a05fe0a3a96
|
218
|
Defining and matching test-based certificates in Open SOA, file dfa8b990-8a4c-748b-e053-3a05fe0a3a96
|
211
|
Estimating Degradation of Machine Learning Data Assets, file dfa8b9a8-9b54-748b-e053-3a05fe0a3a96
|
207
|
Cost-effective deployment of certified cloud composite services, file dfa8b9a0-56cd-748b-e053-3a05fe0a3a96
|
203
|
Editorial for intelligent interactive multimedia systems and services, file dfa8b98f-bc58-748b-e053-3a05fe0a3a96
|
202
|
Computing range queries on obfuscated data, file dfa8b98f-2ddc-748b-e053-3a05fe0a3a96
|
201
|
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem, file dfa8b9a0-fded-748b-e053-3a05fe0a3a96
|
201
|
Unleashing operational process mining, file dfa8b991-294c-748b-e053-3a05fe0a3a96
|
195
|
Dynamic and Scalable Enforcement of Access Control Policies for Big Data, file dfa8b9a8-d56a-748b-e053-3a05fe0a3a96
|
192
|
Towards pattern-based reliability certification of services, file dfa8b98f-56ca-748b-e053-3a05fe0a3a96
|
182
|
Certification-Based Cloud Adaptation, file dfa8b99a-70e3-748b-e053-3a05fe0a3a96
|
181
|
Web service assurance : the notion and the issues, file dfa8b98f-a224-748b-e053-3a05fe0a3a96
|
178
|
A general approach to securely querying XML, file dfa8b98e-fcad-748b-e053-3a05fe0a3a96
|
177
|
Decompositions of Bn and Πn using symmetric chains, file dfa8b98f-1bc3-748b-e053-3a05fe0a3a96
|
175
|
Bayer demosaicking with polynomial interpolation, file dfa8b9a6-40ba-748b-e053-3a05fe0a3a96
|
174
|
Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists, file dfa8b9a7-c865-748b-e053-3a05fe0a3a96
|
167
|
Towards the definition of an information quality metric for information fusion models, file dfa8b9a4-7ca1-748b-e053-3a05fe0a3a96
|
163
|
Dynamic Access Control to Semantics-Aware Streamed Process Logs, file dfa8b99f-56eb-748b-e053-3a05fe0a3a96
|
155
|
Modeling time, probability, and configuration constraints for continuous cloud service certification, file dfa8b999-ad00-748b-e053-3a05fe0a3a96
|
152
|
A WOWA-based aggregation technique on trust values connected to metadata, file dfa8b99f-2ac5-748b-e053-3a05fe0a3a96
|
152
|
Applying recommender systems in collaboration environments, file dfa8b992-e2bb-748b-e053-3a05fe0a3a96
|
150
|
Facial identification problem : a tracking based approach, file dfa8b98e-6fa4-748b-e053-3a05fe0a3a96
|
147
|
Toward a new generation of log pre-processing methods for process mining, file dfa8b999-83f1-748b-e053-3a05fe0a3a96
|
145
|
What can Machine Learning do for Radio Spectrum Management?, file dfa8b9a4-63fe-748b-e053-3a05fe0a3a96
|
142
|
Toward sensor-based context aware systems, file dfa8b990-5be9-748b-e053-3a05fe0a3a96
|
141
|
Securing machine learning algorithms, file dfa8b9a8-d4b0-748b-e053-3a05fe0a3a96
|
129
|
A semi-automatic and trustworthy scheme for continuous cloud service certification, file dfa8b997-d518-748b-e053-3a05fe0a3a96
|
128
|
A Continuous Certification Methodology for DevOps, file dfa8b9a1-00a6-748b-e053-3a05fe0a3a96
|
123
|
Scouting Big Data Campaigns using TOREADOR Labs, file dfa8b997-f367-748b-e053-3a05fe0a3a96
|
119
|
Real-time image processing systems using fuzzy and rough sets techniques, file dfa8b99d-23dd-748b-e053-3a05fe0a3a96
|
119
|
A design methodology for matching smart health requirements, file dfa8b9a3-ed57-748b-e053-3a05fe0a3a96
|
117
|
Performance Analysis of a Polling-Based Access Control Combining with the Sleeping Schema in V2I VANETs for Smart Cities, file dfa8b99d-455d-748b-e053-3a05fe0a3a96
|
115
|
Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach, file dfa8b99d-3f90-748b-e053-3a05fe0a3a96
|
113
|
Artificial intelligence in deep learning algorithms for multimedia analysis, file dfa8b9a5-1d72-748b-e053-3a05fe0a3a96
|
113
|
Extending the Outreach : From Smart Cities to Connected Communities, file dfa8b999-b8df-748b-e053-3a05fe0a3a96
|
110
|
Blockchain-based reputation systems: Implementation challenges and mitigation, file dfa8b9a5-5651-748b-e053-3a05fe0a3a96
|
110
|
Trustworthiness-related uncertainty of semantic web-style metadata : a possibilistic approach, file dfa8b98e-27aa-748b-e053-3a05fe0a3a96
|
109
|
Special issue on real-time image and video processing in mobile embedded systems, file dfa8b9a0-4f7c-748b-e053-3a05fe0a3a96
|
109
|
From Low-Level-Event-Logs to High-Level-Business-Process-Model-Activities: An Advanced Framework based on Machine Learning and Flexible BPMN Model Translation, file dfa8b9a8-997b-748b-e053-3a05fe0a3a96
|
106
|
Embodiment matters : toward culture-specific robotized counselling, file dfa8b9a2-b930-748b-e053-3a05fe0a3a96
|
97
|
Which role for an ontology of uncertainty?, file dfa8b98e-f85d-748b-e053-3a05fe0a3a96
|
87
|
Knowledge Driven Behavioural Analysis in Process Intelligence, file dfa8b992-ae16-748b-e053-3a05fe0a3a96
|
87
|
A semi-automatic framework for the design of rational resilient collaborative systems, file dfa8b991-340b-748b-e053-3a05fe0a3a96
|
82
|
From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain, file dfa8b9a4-d3c5-748b-e053-3a05fe0a3a96
|
82
|
A security certification scheme for Information-Centric Networks, file dfa8b9aa-28db-748b-e053-3a05fe0a3a96
|
81
|
Knowledge-Based Legal Document Retrieval: A Case Study on Italian Civil Court Decisions, file 53d0cfab-f090-4f35-ad33-8b3b89151760
|
80
|
Modeling Threats to AI-ML Systems Using STRIDE, file 7fe02b5e-30bc-4c62-ba30-6c78a0704384
|
79
|
Validating Vector-Label Propagation for Graph Embedding, file b55712c2-c4c9-45fd-adc9-d929131eba72
|
78
|
Handling confidential data on the untrusted cloud : an agent-based approach, file dfa8b98f-3573-748b-e053-3a05fe0a3a96
|
78
|
Information dissemination in unstructured networks by self-repulsive random walks, file dfa8b98e-d35d-748b-e053-3a05fe0a3a96
|
75
|
K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning, file dfa8b99f-da7e-748b-e053-3a05fe0a3a96
|
75
|
A scalable multi-party protocol for privacy-preserving equality test, file dfa8b9a4-2671-748b-e053-3a05fe0a3a96
|
74
|
A component-based architecture for secure data publication, file dfa8b9a2-fdad-748b-e053-3a05fe0a3a96
|
68
|
Toward model-based big data-as-a-service: The TOREADOR approach, file dfa8b999-d55b-748b-e053-3a05fe0a3a96
|
65
|
Dynamic Access Control to Semantics-Aware Streamed Process Logs, file dfa8b99f-9661-748b-e053-3a05fe0a3a96
|
64
|
De-Materializing Local Public Administration Processes, file dfa8b992-a378-748b-e053-3a05fe0a3a96
|
62
|
Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS), file dfa8b99b-9b45-748b-e053-3a05fe0a3a96
|
57
|
Robust computationally-efficient wireless emitter classification using autoencoders and convolutional neural networks, file dfa8b9a7-4a3c-748b-e053-3a05fe0a3a96
|
55
|
An Assurance Framework and Process for Hybrid Systems, file 170eea38-5210-471b-b4eb-7ebad22c84a4
|
49
|
A Methodology for Non-Functional Property Evaluation of Machine Learning Models, file dfa8b9a7-09c9-748b-e053-3a05fe0a3a96
|
48
|
Guest Editorial : QoS and security in software for wireless and mobile micro-services, file dfa8b9a7-4a3b-748b-e053-3a05fe0a3a96
|
47
|
Security Certification Scheme for Content-centric Networks, file dfa8b9a8-fb71-748b-e053-3a05fe0a3a96
|
43
|
Totale |
40.338 |