ALDINI, ALESSANDRO
 Distribuzione geografica
Continente #
NA - Nord America 9.221
EU - Europa 5.957
AS - Asia 2.277
SA - Sud America 26
AF - Africa 19
OC - Oceania 19
Continente sconosciuto - Info sul continente non disponibili 17
Totale 17.536
Nazione #
US - Stati Uniti d'America 9.190
GB - Regno Unito 2.147
CN - Cina 1.409
IT - Italia 943
UA - Ucraina 852
SE - Svezia 507
TR - Turchia 390
DE - Germania 340
FI - Finlandia 293
SG - Singapore 266
PL - Polonia 204
FR - Francia 201
IE - Irlanda 186
RU - Federazione Russa 154
JP - Giappone 62
IN - India 44
KR - Corea 38
CA - Canada 27
BE - Belgio 26
AU - Australia 18
VN - Vietnam 16
AT - Austria 15
CH - Svizzera 14
IR - Iran 14
RO - Romania 14
EU - Europa 13
NL - Olanda 13
BR - Brasile 10
ES - Italia 10
TG - Togo 8
LT - Lituania 7
HU - Ungheria 6
PE - Perù 6
ID - Indonesia 5
IL - Israele 5
LB - Libano 5
A2 - ???statistics.table.value.countryCode.A2??? 4
AR - Argentina 4
HK - Hong Kong 4
CL - Cile 3
IM - Isola di Man 3
KG - Kirghizistan 3
LU - Lussemburgo 3
MA - Marocco 3
SA - Arabia Saudita 3
BA - Bosnia-Erzegovina 2
BG - Bulgaria 2
CM - Camerun 2
CZ - Repubblica Ceca 2
EC - Ecuador 2
EE - Estonia 2
EG - Egitto 2
KE - Kenya 2
LA - Repubblica Popolare Democratica del Laos 2
LV - Lettonia 2
MX - Messico 2
PT - Portogallo 2
SM - San Marino 2
UZ - Uzbekistan 2
ZA - Sudafrica 2
AM - Armenia 1
AZ - Azerbaigian 1
BD - Bangladesh 1
BO - Bolivia 1
CR - Costa Rica 1
GR - Grecia 1
IS - Islanda 1
JM - Giamaica 1
KZ - Kazakistan 1
MY - Malesia 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
OM - Oman 1
PH - Filippine 1
PK - Pakistan 1
RS - Serbia 1
SI - Slovenia 1
TM - Turkmenistan 1
Totale 17.536
Città #
Southend 2.000
Fairfield 1.217
Woodbridge 1.201
Houston 956
Ann Arbor 815
Jacksonville 670
Chandler 617
Ashburn 598
Wilmington 526
Seattle 500
Cambridge 494
Nanjing 403
Izmir 285
Singapore 221
Boardman 188
Kraków 183
Dublin 180
New York 145
Nanchang 138
Urbino 131
Helsinki 129
Bremen 109
Princeton 108
Beijing 88
Shenyang 88
San Mateo 73
Hebei 71
Kunming 67
Tianjin 62
Jiaxing 59
San Diego 55
Moscow 51
Changsha 47
Istanbul 44
Düsseldorf 34
Rome 34
Velikiy Novgorod 34
Jinan 32
Milan 32
San Francisco 32
Seongnam 31
Shanghai 31
London 30
Guangzhou 29
Des Moines 26
Hangzhou 25
Zhengzhou 25
Brussels 22
Santa Clara 22
Wuppertal 20
Pesaro 19
Munich 18
Lanzhou 17
Venice 16
Changchun 15
Ningbo 15
Toronto 15
Ancona 14
Jesi 14
Kocaeli 14
Norwalk 13
Taizhou 13
Dearborn 12
Dong Ket 12
Grafing 12
Redwood City 12
Bologna 10
Civitanova Marche 10
Falls Church 10
Mülheim 10
Paris 9
Pieve 9
Augusta 8
Indiana 8
Lomé 8
Los Angeles 8
Melbourne 8
Pergine Valsugana 8
Amsterdam 7
Fabriano 7
Florence 7
Vienna 7
Acton 6
Auburn Hills 6
Bonn 6
Hanover 6
Leawood 6
Lima 6
Nora 6
Nuremberg 6
Pisa 6
Portland 6
Pune 6
San Severino Marche 6
Shenzhen 6
Ardabil 5
Borås 5
Cagliari 5
Campi Bisenzio 5
Colorno 5
Totale 13.446
Nome #
"Worth one minute": An anonymous rewarding platform for crowd-sensing systems 269
Approximate Testing Equivalence Based on Time, Probability, and Observed Behavior 267
Introducing a flexible rewarding platform for mobile crowd-sensing applications 264
Theory of Knowing Machines: Revisiting Gödel and the Mechanistic Thesis 264
A Formal Framework for Modeling Trust and Reputation in Collective Adaptive Systems 257
Alcune note sui Teoremi di Incompletezza di Gödel e la conoscenza delle macchine 257
Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances 252
Modeling and verification of trust and reputation systems 247
A Methodology Based on Formal Methods for Predicting the Impact of Dynamic Power Management 237
QoS Evaluation of IP Telephony Services: A Specification Language Based Simulation Software Tool 235
A General Approach to Deadlock Freedom Verification for Software Architectures 231
Virtual Currency and Reputation-Based Cooperation Incentives in User-Centric Networks 230
Classification of Security Properties in a Linda-like Process Algebra 215
A Study About Trade-off Between Performance and Security in an Internet Audio Mechanism 214
Weak Markovian Bisimilarity: Abstracting from Prioritized/Weighted Internal Immediate Actions 214
On Securing Real Time Speech Transmission over the Internet: An Experimental Study 211
Expressing Processes with Different Action Durations through Probabilities 208
Non-determinism in Probabilistic Timed Systems with General Distributions 205
A Collaborative Framework for Generating Probabilistic Contracts 205
Towards a Formal Treatment of Secrecy against Computational Adversaries 203
Two Formal Approaches for Approximating Noninterference Properties 202
Security Analysis of a Probabilistic Non-repudiation Protocol 201
Handling Communications in Process Algebraic Architectural Description Languages: Modeling, Verification, and Implementation 200
Design and Verification of Trusted Collective Adaptive Systems 199
Data Privacy Management and Security Assurance. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings 198
Estimating the Maximum Information Leakage 197
A Process-algebraic Approach for the Analysis of Probabilistic Non-interference 197
A Quantitative Approach to Noninterference for Probabilistic Systems 197
Foundations of Security Analysis and Design V 197
Comparing the QoS of Internet Audio Mechanisms via Formal Methods 197
Combining Trust and Aggregate Computing 197
A Formal Approach to the Integrated Analysis of Security and QoS 196
Towards attack-resistant Aggregate Computing using trust mechanisms 195
A Probabilistic Formulation of Imperfect Cryptography 193
Discrete Time Generative-Reactive Probabilistic Processes with Different Advancing Speeds 192
Component-Oriented Specification of Performance Measures 189
Foundations of Security Analysis and Design VII 187
Probabilistic Information Flow in a Process Algebra 187
Detection of repackaged mobile applications through a collaborative approach 185
Foundations of Security Analysis and Design IV 185
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 185
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth 185
A Simulative Analysis of Internet Audio Mechanisms Using Formal Methods 183
Mixing Logics and Rewards for the Component-Oriented Specification of Performance Measures 183
Weak Behavioral Equivalences for Verifying Secure and Performance-Aware Component-Based Systems 183
TwoTowers 4.0: Towards the Integration of Security Analysis and Performance Evaluation 177
An Asynchronous Calculus for Generative-Reactive Probabilistic Systems 177
On Quantitative Analysis of Probabilistic Protocols 176
On Probabilistic Application Compliance 176
A Process Algebraic Approach to Software Architecture Design 176
From Knowledge to Trust: A Logical Framework for Pre-trust Computations 173
On the Tradeoff Among Trust, Privacy, and Cost in Incentive-Based Networks 172
Coordination Model and Noninterference 172
A Trust Logic for Pre-Trust Computations 171
A Calculus for Trust and Reputation Systems 170
Foundations of Security Analysis and Design III 168
Component-Oriented Verification of Noninterference 168
Approximating Imperfect Cryptography in a Formal Model 167
Expected-Delay-Summing Weak Bisimilarity for Markov Automata 167
Predicting the Functional/Performance Impact of Dynamic Power Management 165
On the Extension of Non-interference with Probabilities 163
On the Usability of Process Algebra: An Architectural View 159
A Secure Protocol for Voice-Operated E-Commerce Systems over IP Networks 159
Design and validation of a trust-based opportunity-enabled risk management system 159
A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference 158
A Taxonomy of Computational Models for Trust Computing in Decision-Making Procedures 156
Stochastic Process Algebras for the Analysis of Internet Protocols 155
An Algebraic Model for Evaluating the Performance of an ATM Switch with Explicit Rate Marking 155
Performability Measure Specification: Combining CSRL and MSL 149
Modeling and Verification of the Worth-One-Minute Security Protocols 148
User-Centric Networking - Future Perspectives 143
Approximating Markovian Testing Equivalence 142
A Note on Knowing Machines 141
Data Privacy Management, and Security Assurance. 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers 137
Formal Modeling and Verification of Opportunity-enabled Risk Management 135
Logics to Reason Formally About Trust Computation and Manipulation 135
Do the Self-Knowing Machines Dream of Knowing Their Factivity? 134
A Trust Logic for the Varieties of Trust 129
European Performance Engineering Workshop (EPEW 2010) 128
Formal Methods for Quantitative Aspects of Programming Languages (SFM 2010) 127
Model Checking of Trust-Based User-Centric Cooperative Networks 124
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages(QAPL 2007), Braga, Portugal 120
An Adaptive Mechanism for Real-time Secure Speech Transmission over the Internet 116
Proceedings 16th Workshop on Quantitative Aspects of Programming Languages and Systems 116
Trading Performance and Cooperation Incentives in User-Centric Networks 111
Reasoning About Ignorance and Beliefs 109
Proceedings of the 3rd International Workshop on Views on Designing Complex Architectures (VODCA2008) 108
Formal Approach to Design and Automatic Verification of Cooperation-Based Networks 107
Noninterference and the Most Powerful Probabilistic Adversary 103
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices 102
Quantitative Aspects in Security Assurance, Special Issue of the International Journal of Secure Software Engineering (IJSSE) 101
Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures 95
PROCEDIMENTO DI SELEZIONE AUTOMATICA DI FOTOGRAFIE DIGITALI DA UN ARCHIVIO PER LA CREAZIONE AUTOMATICA DI UNA SEQUENZA DI FOTO CHE RAPPRESENTA UNA STORIA EMOZIONALE DA STAMPARE E/O CONSERVARE 93
Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures 92
Teoria degli automi per linguaggi formali 92
Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless CommunicationsSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications 92
Special Issue of the Italian Conference on Theoretical Computer Science 2018 91
Procedimento di valutazione automatica della qualità di foto digitali 90
Trust Evidence Logic 90
A Framework Balancing Privacy and Cooperation Incentives in User-Centric Networks 86
Totale 17.020
Categoria #
all - tutte 61.136
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 61.136


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.451 0 0 0 0 0 261 303 266 193 211 94 123
2020/20212.330 65 148 125 219 185 187 309 220 345 205 227 95
2021/20221.542 103 168 155 228 63 51 77 87 105 109 47 349
2022/20231.959 222 105 56 222 191 426 9 170 311 60 109 78
2023/2024582 47 49 34 39 59 183 26 55 3 15 12 60
2024/20251.009 107 105 436 110 94 157 0 0 0 0 0 0
Totale 17.881