Nome |
# |
A Network-Based Analysis of a Worksite Canteen Dataset, file d1fc77e2-b405-4012-a8ea-ae7bd9348021
|
722
|
Co-Authorship Networks Analysis to Discover Collaboration Patterns among Italian Researchers, file 2b0ee707-8102-420d-8599-2d7b7f59bc04
|
131
|
A geofencing algorithm fit for supply chain management, file dfe4d229-9c73-bb0a-e053-d805fe0a78d9
|
54
|
Virtualization for effective risk-free network security assessment, file dfe4d227-00f5-bb0a-e053-d805fe0a78d9
|
27
|
An efficient real-time architecture for collecting IoT data, file dfe4d22d-14d0-bb0a-e053-d805fe0a78d9
|
19
|
A social inspired broker for M2M protocols, file dfe4d22d-6c0f-bb0a-e053-d805fe0a78d9
|
19
|
The cost of trust in the dynamics of best attachment, file dfe4d228-18cc-bb0a-e053-d805fe0a78d9
|
18
|
Multisource agent-based healthcare data gathering, file dfe4d22d-21ec-bb0a-e053-d805fe0a78d9
|
18
|
A geofencing algorithm fit for supply chain management, file e49db3bc-2ff2-4174-818c-522b12834f83
|
13
|
CORSA: An open solution for social oriented real-time ride sharing, file dfe4d22d-27d4-bb0a-e053-d805fe0a78d9
|
12
|
An Intelligent and Pervasive Surveillance System for Home Security, file dfe4d227-0bf9-bb0a-e053-d805fe0a78d9
|
11
|
Network robustness improvement via long-range links, file dfe4d22d-6582-bb0a-e053-d805fe0a78d9
|
11
|
Connecting relatives in virtual worlds: The kinship networks, file dfe4d227-00ac-bb0a-e053-d805fe0a78d9
|
9
|
Search for overlapped communities by parallel genetic algorithms, file dfe4d227-9200-bb0a-e053-d805fe0a78d9
|
8
|
Extracting logical schema from the web, file dfe4d227-b5a1-bb0a-e053-d805fe0a78d9
|
8
|
Formal codesign methodology with multistep partitioning, file 4113cd96-90af-407f-835d-56953dc68d81
|
7
|
Fast Information Retrieval in a Self–Organising P2P Network, file dfe4d227-96c1-bb0a-e053-d805fe0a78d9
|
7
|
Context-based global expertise in recommendation systems, file dfe4d227-8a97-bb0a-e053-d805fe0a78d9
|
6
|
Hardware/Software Synthesis of Formal Specifications in Codesign of Embedded Systems, file b660ba57-4f5a-4bf7-8fb3-88810b7867df
|
5
|
Adaptive formative path in a web based learning environment, file dfe4d226-f3d4-bb0a-e053-d805fe0a78d9
|
5
|
An Architecture to Support Adaptive E-Learning, file 2d49a3fc-3a40-436a-9983-f428894abdf9
|
4
|
The Dilemma of Trust:A Social Network Based Approach, file dfe4d226-f87b-bb0a-e053-d805fe0a78d9
|
4
|
Modelling and optimization of wind farms’ processes using BPM, file dfe4d22d-f792-bb0a-e053-d805fe0a78d9
|
4
|
Direct trust assignment using social reputation and aging, file dfe4d22e-7677-bb0a-e053-d805fe0a78d9
|
4
|
Hardware/Software Synthesis of Formal Specifications in Codesign of Embedded Systems, file dfe4d226-f3cb-bb0a-e053-d805fe0a78d9
|
3
|
Object-oriented approach in re-engineering: The stmicroelectronics manufacturing model, file dfe4d226-f58b-bb0a-e053-d805fe0a78d9
|
3
|
Reliable peers and useful resources: Searching for the best personalised learning path in a trust- and recommendation-aware environment, file dfe4d226-fd6f-bb0a-e053-d805fe0a78d9
|
3
|
Efficient Searching and Retrieval of Documents in PROSA, file dfe4d227-8925-bb0a-e053-d805fe0a78d9
|
3
|
Searching for experts in a context-aware recommendation network, file dfe4d228-1ba3-bb0a-e053-d805fe0a78d9
|
3
|
Exploiting Long Distance Connections to Strengthen Network Robustness, file dfe4d22d-face-bb0a-e053-d805fe0a78d9
|
3
|
Emerging structures of P2P networks induced by social relationships, file dfe4d226-fb00-bb0a-e053-d805fe0a78d9
|
2
|
Efficient searching and retrieval of documents in PROSA, file dfe4d227-60a5-bb0a-e053-d805fe0a78d9
|
2
|
Climbing Ranking Position via Long-Distance Backlinks, file dfe4d22e-1c6e-bb0a-e053-d805fe0a78d9
|
2
|
Network size and
topology impact on trust-based ranking, file dfe4d22e-28ef-bb0a-e053-d805fe0a78d9
|
2
|
Synthesis of TTL Specification: A Case Study, file 0375ea7a-7608-4b00-ac31-0fdd1b8170c0
|
1
|
Extracting logical schema from the web, file 8f980023-5deb-464c-a570-a12e9ac7673f
|
1
|
Automatic Mesh Generation by Let-It-Grow Neural Network, file dfe4d226-f55b-bb0a-e053-d805fe0a78d9
|
1
|
AN ADAPTIVE OVERLAY NETWORK INSPIRED BY SOCIAL BEHAVIOUR, file dfe4d226-f74c-bb0a-e053-d805fe0a78d9
|
1
|
A Model for a Web-based Learning System, file dfe4d226-fd4f-bb0a-e053-d805fe0a78d9
|
1
|
Object-oriented re-engineering of manufacturing models: A case study., file dfe4d227-12c5-bb0a-e053-d805fe0a78d9
|
1
|
A Study on Security Mechanisms in KNX-based Home/Building Automation Networks, file dfe4d227-6012-bb0a-e053-d805fe0a78d9
|
1
|
Applying Fuzzy Logic to Codesign Partitioning, file dfe4d227-a903-bb0a-e053-d805fe0a78d9
|
1
|
Re-engineering the ST-Microelectronics manufacturing models, file dfe4d227-ad32-bb0a-e053-d805fe0a78d9
|
1
|
Trust assessment: a personalized, distributed, and secure approach, file dfe4d228-0f5e-bb0a-e053-d805fe0a78d9
|
1
|
Extending the definition of modularity to directed graphs with overlapping communities, file dfe4d228-1311-bb0a-e053-d805fe0a78d9
|
1
|
Users' attachment in trust networks: reputation vs. effort, file dfe4d228-171c-bb0a-e053-d805fe0a78d9
|
1
|
Black hole metric: Overcoming the pagerank normalization problem, file dfe4d22d-2992-bb0a-e053-d805fe0a78d9
|
1
|
Personal Health Record feeding via medical forums, file dfe4d22d-2eaa-bb0a-e053-d805fe0a78d9
|
1
|
A network-based analysis to understand food-habits of a multi-company canteen's customers, file dfe4d22d-f214-bb0a-e053-d805fe0a78d9
|
1
|
A pagerank inspired approach to measure network cohesiveness, file dfe4d22e-2894-bb0a-e053-d805fe0a78d9
|
1
|
Totale |
1.168 |