
Contributo in atti di convegno
AntiCheetah: an Autonomic Multi-round Approach for Reliable Computing |
Outsourced computing is increasingly popular thanks to the effectiveness and convenience of cloud computing *-as-a-Service offerings. However, cloud nodes can potentially misbehave in order to save resources. As such, some guarantee over the correctness and availability of results is needed.… | |
Cyber risk management: a new challenge for actuarial mathematics |
A specific kind of insurance that is emerging within the domain of cyber-systems is that of cyber-insurance. Cyber-insurance is the transfer of financial risk associated with network and computer incidents to a third party. Insurance companies are increasingly offering such policies, in particular… | |
Asymptotic risk analysis for trust and reputation systems |
Trust and reputation systems are decision support tools used to drive parties' interactions on the basis of parties' reputation. In such systems, parties rate with each other after each interaction. Reputation scores for each ratee are computed via reputation functions on the basis of collected… | |
Cryptanalysis on GPUs with the Cube Attack: Design, Optimization and Performances Gains |
The cube attack is a flexible cryptanalysis technique, with a simple and fascinating theoretical implant. It combines offline exhaustive searches over selected tweakable public/IV bits (the sides of the "cube"), with an online key-recovery phase. Although virtually applicable to any cipher, and… | |
Enhanced pClustering and its applications to gene expression data |
Clustering has been one of the most popular methods to discover useful biological insights from DNA microarray. An interesting paradigm is simultaneous clustering of both genes and experiments. This "biclustering "paradigm aims at discovering clusters that consist of a subset of the genes showing a… | |
An evolutive model for magnetostrictive interacions: existence of weak solutions |
||
Mixed Algebraic Methods Based on Locally Tensor Product Functions |
||
Electrical RLC Networks and Semiconductor Devices |
||
Modelling of mass convection-diffusion in stent-based drug delivery |
||
Bayesian methods for time course microarray analysis: from genes detection to clustering |





