Sfoglia per ???browse.type.metadata.subjectIsicrui??? Scienza e Ingegneria Informatica
Bidding strategies in QoS-aware cloud systems based on N-armed bandit problems
2014-01-01 Abundo, M; Di Valerio, V; Cardellini, V; LO PRESTI, F
Biospecimen Digital Twins: Moving from a "High Quality" to a "Fit-for-Purpose" Concept in the Era of Omics Sciences
2023-06-01 Nanni, U; Ferroni, P; Riondino, S; Spila, A; Valente, Mg; Del Monte, G; Roselli, M; Guadagni, F
Bounded Probabilistic Model Checking with the Murφ Verifier
2004-01-01 Della Penna, G; Intrigila, B; Melatti, I; Tronci, E; Zilli, M
Budgeted matching and budgeted matroid intersection via the gasoline puzzle
2011-01-01 Berger, A; Bonifaci, V; Grandoni, F; Schäfer, G
Centrality Measures for Evacuation: Finding Agile Evacuation Routes
2018-01-01 Lujak, M; Giordani, S
Certification and Security in E-Services: From E-Government to E-Business
2003-01-01 Nardelli, E; Posadziejewski, S; Talamo, M
Certification and Security in Inter-Organizational E-Services
2005-01-01 Nardelli, E; Posadziejewski, S; Talamo, M
Certifying performance of cooperative services in a digital government framework
2003-01-01 Arcieri, F; Fioravanti, F; Giaccio, R; Nardelli, E; Talamo, M
CHAPTER 19: Information Spreading in Dynamic Networks: An Analytical Approach
2010-01-01 Clementi, A; Pasquale, F
Characterization results of all shortest paths interval routing schemes
2001-01-01 Flammini, M; Gambosi, G; Nanni, U; Tan, Rb
CNIPA, FUB and University of Rome "Tor Vergata" at TREC 2008 Legal Track
2008-01-01 Amati, G; Bianchi, M; Draoli, M; Celi, A; Gambosi, G; Stilo, G
Coherence maintainance in cooperative information systems: the access key warehouse approach
2002-03-01 Arcieri, F; Cappadozzi, E; Naggar, P; Nardelli, E; Talamo, M
Collaborative proxy system for distributed Web content transcoding
2000-11-01 Cardellini, V; Yu, P; Huang, Yw
Compact implicit representation of graphs (extended abstract)
1998-01-01 Talamo, M; Vocca, P
Comparing code reading techniques applied to object-oriented software frameworks with regard to effectiveness and defect detection rate
2004-07-01 Abdelnabi, Z; Cantone, G; Ciolkowski, M; Rombach, D
Competitive subset selection with two agents
2011-01-01 Nicosia, G; Pacifici, A; Pferschy, U
Complex linguistic features for text classification: a comprehensive study
2004-01-01 Moschitti, A; Basili, R
A comprehensive characterization of NLP techniques for identifying equivalent requirements
2010-09-10 Falessi, D; Cantone, G; Canfora, G
Computational approaches to Max-cut
2012-01-01 Palagi, L; Piccialli, V; Rendl, F; Rinaldi, G; Wiegele, A
Computational models of myocardial endomysial collagen arrangement
2007-01-01 Intrigila, B; Melatti, I; Tofani, A; Macchiarelli, G
Data di pubblicazione | Titolo | Autore(i) | Tipo | File |
---|---|---|---|---|
1-gen-2014 | Bidding strategies in QoS-aware cloud systems based on N-armed bandit problems | Abundo, M; Di Valerio, V; Cardellini, V; LO PRESTI, F | Intervento a convegno | |
1-giu-2023 | Biospecimen Digital Twins: Moving from a "High Quality" to a "Fit-for-Purpose" Concept in the Era of Omics Sciences | Nanni, U; Ferroni, P; Riondino, S; Spila, A; Valente, Mg; Del Monte, G; Roselli, M; Guadagni, F | Articolo su rivista | |
1-gen-2004 | Bounded Probabilistic Model Checking with the Murφ Verifier | Della Penna, G; Intrigila, B; Melatti, I; Tronci, E; Zilli, M | Intervento a convegno | |
1-gen-2011 | Budgeted matching and budgeted matroid intersection via the gasoline puzzle | Berger, A; Bonifaci, V; Grandoni, F; Schäfer, G | Articolo su rivista | |
1-gen-2018 | Centrality Measures for Evacuation: Finding Agile Evacuation Routes | Lujak, M; Giordani, S | Articolo su rivista | |
1-gen-2003 | Certification and Security in E-Services: From E-Government to E-Business | Nardelli, E; Posadziejewski, S; Talamo, M | Curatele | |
1-gen-2005 | Certification and Security in Inter-Organizational E-Services | Nardelli, E; Posadziejewski, S; Talamo, M | Curatele | |
1-gen-2003 | Certifying performance of cooperative services in a digital government framework | Arcieri, F; Fioravanti, F; Giaccio, R; Nardelli, E; Talamo, M | Intervento a convegno | |
1-gen-2010 | CHAPTER 19: Information Spreading in Dynamic Networks: An Analytical Approach | Clementi, A; Pasquale, F | Contributo in libro | |
1-gen-2001 | Characterization results of all shortest paths interval routing schemes | Flammini, M; Gambosi, G; Nanni, U; Tan, Rb | Articolo su rivista | |
1-gen-2008 | CNIPA, FUB and University of Rome "Tor Vergata" at TREC 2008 Legal Track | Amati, G; Bianchi, M; Draoli, M; Celi, A; Gambosi, G; Stilo, G | Intervento a convegno | |
1-mar-2002 | Coherence maintainance in cooperative information systems: the access key warehouse approach | Arcieri, F; Cappadozzi, E; Naggar, P; Nardelli, E; Talamo, M | Articolo su rivista | |
1-nov-2000 | Collaborative proxy system for distributed Web content transcoding | Cardellini, V; Yu, P; Huang, Yw | Intervento a convegno | |
1-gen-1998 | Compact implicit representation of graphs (extended abstract) | Talamo, M; Vocca, P | Intervento a convegno | |
1-lug-2004 | Comparing code reading techniques applied to object-oriented software frameworks with regard to effectiveness and defect detection rate | Abdelnabi, Z; Cantone, G; Ciolkowski, M; Rombach, D | Intervento a convegno | |
1-gen-2011 | Competitive subset selection with two agents | Nicosia, G; Pacifici, A; Pferschy, U | Articolo su rivista | |
1-gen-2004 | Complex linguistic features for text classification: a comprehensive study | Moschitti, A; Basili, R | Intervento a convegno | |
10-set-2010 | A comprehensive characterization of NLP techniques for identifying equivalent requirements | Falessi, D; Cantone, G; Canfora, G | Intervento a convegno | |
1-gen-2012 | Computational approaches to Max-cut | Palagi, L; Piccialli, V; Rendl, F; Rinaldi, G; Wiegele, A | Contributo in libro | |
1-gen-2007 | Computational models of myocardial endomysial collagen arrangement | Intrigila, B; Melatti, I; Tofani, A; Macchiarelli, G | Articolo su rivista |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile