ALDINI, ALESSANDRO
 Distribuzione geografica
Continente #
EU - Europa 191
NA - Nord America 128
AS - Asia 17
AF - Africa 1
Totale 337
Nazione #
IT - Italia 143
US - Stati Uniti d'America 124
DE - Germania 10
SE - Svezia 8
GB - Regno Unito 7
FR - Francia 5
CA - Canada 4
JP - Giappone 4
SG - Singapore 4
CN - Cina 3
IE - Irlanda 3
PL - Polonia 3
CH - Svizzera 2
FI - Finlandia 2
GR - Grecia 2
AE - Emirati Arabi Uniti 1
AM - Armenia 1
BE - Belgio 1
BG - Bulgaria 1
CZ - Repubblica Ceca 1
DZ - Algeria 1
HK - Hong Kong 1
ID - Indonesia 1
IL - Israele 1
IN - India 1
NL - Olanda 1
RO - Romania 1
UA - Ucraina 1
Totale 337
Città #
Urbino 32
Ashburn 25
Rome 9
Stockholm 8
Milan 7
Seattle 7
Boardman 6
Chicago 6
Los Angeles 6
Buffalo 5
Dallas 5
Montegranaro 5
Sant Angelo 5
Henderson 4
Jesi 4
Singapore 4
Terni 4
Bevagna 3
Campagnola Emilia 3
Cloppenburg 3
Council Bluffs 3
Crugers 3
Dublin 3
Rovereto 3
San Francisco 3
Tokyo 3
Bologna 2
Breda di Piave 2
Bremen 2
Brooklyn 2
Coriano 2
Dresden 2
Dulles 2
Edmonton 2
Helsinki 2
Houston 2
Jacksonville 2
Lombard 2
Nea Smyrni 2
Occhiobello 2
Parma 2
Pesaro 2
Portland 2
Santa Clara 2
Vallefoglia 2
Alexandria 1
Ann Arbor 1
Appignano 1
Beijing 1
Bellevue 1
Bourdonne 1
Brussels 1
Cambridge 1
Cesena 1
Cisano Bergamasco 1
Denver 1
Falconara Marittima 1
Ferrara di Monte Baldo 1
Fleming Island 1
Gainesville 1
Geneva 1
Genoa 1
Heidelberg 1
Herndon 1
Hong Kong 1
Jersey City 1
Las Vegas 1
Latisana 1
Lethbridge 1
Lincoln 1
London 1
Lucca 1
Macerata 1
Manchester 1
Montescudo 1
Naples 1
New York 1
Olbia 1
Olgiate Olona 1
Ottawa 1
Pasadena 1
Recanati 1
Reston 1
San Marcello 1
San Salvo 1
Sant'Ilario d'Enza 1
Scottsdale 1
Seregno 1
Shanghai 1
Sofia 1
Taranto 1
Trieste 1
Warsaw 1
Wichita Falls 1
Yerevan 1
York 1
Zurich 1
Totale 259
Nome #
Towards attack-resistant Aggregate Computing using trust mechanisms, file e18b865d-541f-1ee6-e053-3a05fe0ae544 47
Design and Verification of Trusted Collective Adaptive Systems, file e18b865d-5465-1ee6-e053-3a05fe0ae544 46
Detection of repackaged mobile applications through a collaborative approach, file e18b865d-9070-1ee6-e053-3a05fe0ae544 18
"Worth one minute": An anonymous rewarding platform for crowd-sensing systems, file e18b865c-eecc-1ee6-e053-3a05fe0ae544 16
A Process-algebraic Approach for the Analysis of Probabilistic Non-interference, file e18b865b-7a8f-1ee6-e053-3a05fe0ae544 12
Teoria degli automi per linguaggi formali, file e18b865b-8841-1ee6-e053-3a05fe0ae544 12
On the Modeling and Verification of Collective and Cooperative Systems, file 84e681c9-db34-4123-8344-f0b1a745f834 9
Introducing a flexible rewarding platform for mobile crowd-sensing applications, file e18b865c-7da2-1ee6-e053-3a05fe0ae544 8
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices, file e18b865d-2736-1ee6-e053-3a05fe0ae544 8
Modeling and verification of trust and reputation systems, file e18b865d-9076-1ee6-e053-3a05fe0ae544 7
Trust Evidence Logic, file e18b865d-9b75-1ee6-e053-3a05fe0ae544 7
Estimating the Maximum Information Leakage, file e18b865b-7a8b-1ee6-e053-3a05fe0ae544 6
Probabilistic Information Flow in a Process Algebra, file e18b865b-7efa-1ee6-e053-3a05fe0ae544 6
Foundations of Security Analysis and Design VII, file e18b865b-8c5e-1ee6-e053-3a05fe0ae544 6
Expected-Delay-Summing Weak Bisimilarity for Markov Automata, file e18b865b-a7c0-1ee6-e053-3a05fe0ae544 6
Design and validation of a trust-based opportunity-enabled risk management system, file e18b865c-0b8d-1ee6-e053-3a05fe0ae544 6
Analysis of Diagnostic Images of Artworks and Feature Extraction: Design of a Methodology, file e18b865d-5220-1ee6-e053-3a05fe0ae544 6
Classification of Security Properties in a Linda-like Process Algebra, file e18b865b-7a91-1ee6-e053-3a05fe0ae544 5
Approximating Markovian Testing Equivalence, file e18b865b-8666-1ee6-e053-3a05fe0ae544 5
User-Centric Networking - Future Perspectives, file e18b865b-8ae1-1ee6-e053-3a05fe0ae544 5
A Calculus for Trust and Reputation Systems, file e18b865b-8ae2-1ee6-e053-3a05fe0ae544 5
A Collaborative Framework for Generating Probabilistic Contracts, file e18b865b-8d7f-1ee6-e053-3a05fe0ae544 5
Quantitative Aspects of Programming Languages and Systems over the past 2^4 years and beyond, file e18b865c-ee64-1ee6-e053-3a05fe0ae544 5
Discrete Time Generative-Reactive Probabilistic Processes with Different Advancing Speeds, file e18b865b-7a8c-1ee6-e053-3a05fe0ae544 4
Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless CommunicationsSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, file e18b865b-887f-1ee6-e053-3a05fe0ae544 4
On the Tradeoff Among Trust, Privacy, and Cost in Incentive-Based Networks, file e18b865b-8ae3-1ee6-e053-3a05fe0ae544 4
Detection of repackaged mobile applications through a collaborative approach, file e18b865b-ab5a-1ee6-e053-3a05fe0ae544 4
Theory of Knowing Machines: Revisiting Gödel and the Mechanistic Thesis, file e18b865b-e530-1ee6-e053-3a05fe0ae544 4
Design and Verification of Trusted Collective Adaptive Systems, file e18b865c-83c8-1ee6-e053-3a05fe0ae544 4
Handling Communications in Process Algebraic Architectural Description Languages: Modeling, Verification, and Implementation, file e18b865c-9a53-1ee6-e053-3a05fe0ae544 4
A Process Algebraic Approach to Software Architecture Design, file e18b865b-82a7-1ee6-e053-3a05fe0ae544 3
Handling Communications in Process Algebraic Architectural Description Languages: Modeling, Verification, and Implementation, file e18b865b-83b8-1ee6-e053-3a05fe0ae544 3
A Formal Framework for Modeling Trust and Reputation in Collective Adaptive Systems, file e18b865b-cf7a-1ee6-e053-3a05fe0ae544 3
Towards attack-resistant Aggregate Computing using trust mechanisms, file e18b865c-9d02-1ee6-e053-3a05fe0ae544 3
Reasoning About Ignorance and Beliefs, file e18b865d-3a83-1ee6-e053-3a05fe0ae544 3
A hierarchical characterization of ignorance in epistemic Logic, file 31554802-5077-451a-9427-61f8e996a7d7 2
Branching Bisimulation Semantics Enables Noninterference Analysis of Reversible Systems, file 4222781d-bf99-46ff-995f-a7250ec61c8c 2
A Formal Approach to the Integrated Analysis of Security and QoS, file e18b865b-78a3-1ee6-e053-3a05fe0ae544 2
Mixing Logics and Rewards for the Component-Oriented Specification of Performance Measures, file e18b865b-7a88-1ee6-e053-3a05fe0ae544 2
On Securing Real Time Speech Transmission over the Internet: An Experimental Study, file e18b865b-7a8d-1ee6-e053-3a05fe0ae544 2
Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances, file e18b865b-8001-1ee6-e053-3a05fe0ae544 2
European Performance Engineering Workshop (EPEW 2010), file e18b865b-829c-1ee6-e053-3a05fe0ae544 2
Modeling and verification of trust and reputation systems, file e18b865b-a409-1ee6-e053-3a05fe0ae544 2
Modeling and Verification of the Worth-One-Minute Security Protocols, file e18b865d-0d17-1ee6-e053-3a05fe0ae544 2
From belief to trust: A quantitative framework based on modal logic, file e18b865d-ba77-1ee6-e053-3a05fe0ae544 2
A Methodology Based on Formal Methods for Predicting the Impact of Dynamic Power Management, file e18b865b-7cab-1ee6-e053-3a05fe0ae544 1
Predicting the Functional/Performance Impact of Dynamic Power Management, file e18b865b-8003-1ee6-e053-3a05fe0ae544 1
A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference, file e18b865b-8328-1ee6-e053-3a05fe0ae544 1
Weak Behavioral Equivalences for Verifying Secure and Performance-Aware Component-Based Systems, file e18b865b-8393-1ee6-e053-3a05fe0ae544 1
Performability Measure Specification: Combining CSRL and MSL, file e18b865b-84f5-1ee6-e053-3a05fe0ae544 1
Virtual Currency and Reputation-Based Cooperation Incentives in User-Centric Networks, file e18b865b-8a4a-1ee6-e053-3a05fe0ae544 1
Do the Self-Knowing Machines Dream of Knowing Their Factivity?, file e18b865b-aa26-1ee6-e053-3a05fe0ae544 1
A Framework Balancing Privacy and Cooperation Incentives in User-Centric Networks, file e18b865b-b139-1ee6-e053-3a05fe0ae544 1
Alcune note sui Teoremi di Incompletezza di Gödel e la conoscenza delle macchine, file e18b865b-d14e-1ee6-e053-3a05fe0ae544 1
Introducing a flexible rewarding platform for mobile crowd-sensing applications, file e18b865c-7bbc-1ee6-e053-3a05fe0ae544 1
Weak Markovian Bisimilarity: Abstracting from Prioritized/Weighted Internal Immediate Actions, file e18b865c-7e17-1ee6-e053-3a05fe0ae544 1
TwoTowers 4.0: Towards the Integration of Security Analysis and Performance Evaluation, file e18b865c-8065-1ee6-e053-3a05fe0ae544 1
An Algebraic Model for Evaluating the Performance of an ATM Switch with Explicit Rate Marking, file e18b865c-81e3-1ee6-e053-3a05fe0ae544 1
Component-Oriented Verification of Noninterference, file e18b865c-83fd-1ee6-e053-3a05fe0ae544 1
Italian Conference on Theoretical Computer Science (ICTCS 2018), file e18b865c-b0e6-1ee6-e053-3a05fe0ae544 1
Data Privacy Management, and Security Assurance. 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers, file e18b865c-d2fc-1ee6-e053-3a05fe0ae544 1
Data Privacy Management and Security Assurance. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, file e18b865c-d359-1ee6-e053-3a05fe0ae544 1
Special Issue of the Italian Conference on Theoretical Computer Science 2018, file e18b865d-0184-1ee6-e053-3a05fe0ae544 1
Algoritmi di Image Analysis applicati alle immagini diagnostiche, file e18b865d-aa6d-1ee6-e053-3a05fe0ae544 1
On the modeling and verification of the spread of fake news, algebraically, file e18b865d-b0e1-1ee6-e053-3a05fe0ae544 1
Totale 339
Categoria #
all - tutte 1.884
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 1.884


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20205 2 0 0 0 0 0 0 0 1 2 0 0
2020/202116 0 0 0 0 0 0 0 0 5 4 2 5
2021/202251 2 2 1 1 2 6 7 6 3 8 3 10
2022/2023198 29 6 16 38 19 11 24 30 10 8 5 2
2023/202433 9 1 1 5 6 5 1 4 1 0 0 0
Totale 339