ALDINI, ALESSANDRO
 Distribuzione geografica
Continente #
NA - Nord America 8.956
EU - Europa 5.735
AS - Asia 1.720
SA - Sud America 23
OC - Oceania 19
AF - Africa 18
Continente sconosciuto - Info sul continente non disponibili 17
Totale 16.488
Nazione #
US - Stati Uniti d'America 8.929
GB - Regno Unito 2.144
CN - Cina 1.198
IT - Italia 862
UA - Ucraina 852
SE - Svezia 507
DE - Germania 333
TR - Turchia 311
FI - Finlandia 285
PL - Polonia 204
FR - Francia 197
IE - Irlanda 186
JP - Giappone 62
RU - Federazione Russa 52
IN - India 44
KR - Corea 37
BE - Belgio 26
CA - Canada 23
AU - Australia 18
VN - Vietnam 16
CH - Svizzera 14
IR - Iran 14
EU - Europa 13
RO - Romania 13
AT - Austria 11
BR - Brasile 10
ES - Italia 10
NL - Olanda 10
SG - Singapore 8
TG - Togo 8
HU - Ungheria 5
ID - Indonesia 5
IL - Israele 5
LB - Libano 5
A2 - ???statistics.table.value.countryCode.A2??? 4
AR - Argentina 4
PE - Perù 4
IM - Isola di Man 3
KG - Kirghizistan 3
MA - Marocco 3
SA - Arabia Saudita 3
BA - Bosnia-Erzegovina 2
BG - Bulgaria 2
CL - Cile 2
CM - Camerun 2
EC - Ecuador 2
EG - Egitto 2
KE - Kenya 2
LT - Lituania 2
LU - Lussemburgo 2
LV - Lettonia 2
MX - Messico 2
PT - Portogallo 2
SM - San Marino 2
AM - Armenia 1
AZ - Azerbaigian 1
BD - Bangladesh 1
BO - Bolivia 1
CR - Costa Rica 1
CZ - Repubblica Ceca 1
EE - Estonia 1
GR - Grecia 1
HK - Hong Kong 1
IS - Islanda 1
JM - Giamaica 1
KZ - Kazakistan 1
LA - Repubblica Popolare Democratica del Laos 1
MY - Malesia 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
OM - Oman 1
RS - Serbia 1
SI - Slovenia 1
UZ - Uzbekistan 1
ZA - Sudafrica 1
Totale 16.488
Città #
Southend 2.000
Fairfield 1.217
Woodbridge 1.201
Houston 956
Ann Arbor 815
Jacksonville 670
Chandler 617
Ashburn 589
Wilmington 526
Seattle 500
Cambridge 494
Nanjing 403
Izmir 285
Kraków 183
Dublin 180
New York 144
Nanchang 138
Urbino 126
Helsinki 123
Bremen 109
Princeton 108
Shenyang 88
San Mateo 73
Beijing 71
Hebei 71
Kunming 66
Tianjin 61
Jiaxing 56
San Diego 55
Changsha 47
Boardman 38
Düsseldorf 34
Velikiy Novgorod 34
San Francisco 32
Jinan 31
Seongnam 31
London 30
Milan 29
Rome 28
Des Moines 26
Zhengzhou 25
Hangzhou 23
Brussels 22
Wuppertal 20
Lanzhou 17
Munich 17
Venice 15
Changchun 14
Guangzhou 14
Jesi 14
Kocaeli 14
Ningbo 14
Pesaro 14
Toronto 14
Norwalk 13
Taizhou 13
Dearborn 12
Dong Ket 12
Grafing 12
Redwood City 12
Civitanova Marche 10
Falls Church 10
Mülheim 10
Ancona 9
Pieve 9
Shanghai 9
Augusta 8
Indiana 8
Lomé 8
Melbourne 8
Paris 8
Pergine Valsugana 8
Fabriano 7
Los Angeles 7
Acton 6
Auburn Hills 6
Bologna 6
Bonn 6
Hanover 6
Leawood 6
Nora 6
Pisa 6
Portland 6
Pune 6
San Severino Marche 6
Amsterdam 5
Ardabil 5
Borås 5
Campi Bisenzio 5
Colorno 5
Florence 5
Forlì 5
Orange 5
Ravenna 5
Recanati 5
Tappahannock 5
Vienna 5
Warsaw 5
Bangalore 4
Barchi 4
Totale 12.854
Nome #
Approximate Testing Equivalence Based on Time, Probability, and Observed Behavior 257
Theory of Knowing Machines: Revisiting Gödel and the Mechanistic Thesis 256
A Formal Framework for Modeling Trust and Reputation in Collective Adaptive Systems 248
Introducing a flexible rewarding platform for mobile crowd-sensing applications 248
"Worth one minute": An anonymous rewarding platform for crowd-sensing systems 247
Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances 242
Modeling and verification of trust and reputation systems 239
Alcune note sui Teoremi di Incompletezza di Gödel e la conoscenza delle macchine 228
Virtual Currency and Reputation-Based Cooperation Incentives in User-Centric Networks 224
QoS Evaluation of IP Telephony Services: A Specification Language Based Simulation Software Tool 224
A Methodology Based on Formal Methods for Predicting the Impact of Dynamic Power Management 222
A General Approach to Deadlock Freedom Verification for Software Architectures 221
Classification of Security Properties in a Linda-like Process Algebra 209
A Study About Trade-off Between Performance and Security in an Internet Audio Mechanism 209
Weak Markovian Bisimilarity: Abstracting from Prioritized/Weighted Internal Immediate Actions 209
On Securing Real Time Speech Transmission over the Internet: An Experimental Study 205
Expressing Processes with Different Action Durations through Probabilities 201
Non-determinism in Probabilistic Timed Systems with General Distributions 199
Security Analysis of a Probabilistic Non-repudiation Protocol 197
Towards a Formal Treatment of Secrecy against Computational Adversaries 197
A Collaborative Framework for Generating Probabilistic Contracts 195
Data Privacy Management and Security Assurance. 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings 194
Two Formal Approaches for Approximating Noninterference Properties 193
Combining Trust and Aggregate Computing 192
Handling Communications in Process Algebraic Architectural Description Languages: Modeling, Verification, and Implementation 191
Estimating the Maximum Information Leakage 190
Comparing the QoS of Internet Audio Mechanisms via Formal Methods 190
Towards attack-resistant Aggregate Computing using trust mechanisms 189
Foundations of Security Analysis and Design V 188
Design and Verification of Trusted Collective Adaptive Systems 188
A Formal Approach to the Integrated Analysis of Security and QoS 186
A Process-algebraic Approach for the Analysis of Probabilistic Non-interference 185
Discrete Time Generative-Reactive Probabilistic Processes with Different Advancing Speeds 184
Foundations of Security Analysis and Design VII 182
Probabilistic Information Flow in a Process Algebra 182
Component-Oriented Specification of Performance Measures 181
A Quantitative Approach to Noninterference for Probabilistic Systems 181
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 181
A Probabilistic Formulation of Imperfect Cryptography 180
Detection of repackaged mobile applications through a collaborative approach 179
Foundations of Security Analysis and Design IV 178
Mixing Logics and Rewards for the Component-Oriented Specification of Performance Measures 177
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth 177
Weak Behavioral Equivalences for Verifying Secure and Performance-Aware Component-Based Systems 174
On Quantitative Analysis of Probabilistic Protocols 171
TwoTowers 4.0: Towards the Integration of Security Analysis and Performance Evaluation 170
On Probabilistic Application Compliance 170
A Simulative Analysis of Internet Audio Mechanisms Using Formal Methods 169
An Asynchronous Calculus for Generative-Reactive Probabilistic Systems 169
On the Tradeoff Among Trust, Privacy, and Cost in Incentive-Based Networks 166
Coordination Model and Noninterference 166
From Knowledge to Trust: A Logical Framework for Pre-trust Computations 165
A Trust Logic for Pre-Trust Computations 162
Foundations of Security Analysis and Design III 161
Component-Oriented Verification of Noninterference 161
Expected-Delay-Summing Weak Bisimilarity for Markov Automata 161
A Process Algebraic Approach to Software Architecture Design 160
Approximating Imperfect Cryptography in a Formal Model 159
A Calculus for Trust and Reputation Systems 159
On the Extension of Non-interference with Probabilities 158
Predicting the Functional/Performance Impact of Dynamic Power Management 155
Design and validation of a trust-based opportunity-enabled risk management system 154
On the Usability of Process Algebra: An Architectural View 153
A Secure Protocol for Voice-Operated E-Commerce Systems over IP Networks 148
A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference 148
A Taxonomy of Computational Models for Trust Computing in Decision-Making Procedures 146
Stochastic Process Algebras for the Analysis of Internet Protocols 145
An Algebraic Model for Evaluating the Performance of an ATM Switch with Explicit Rate Marking 145
Performability Measure Specification: Combining CSRL and MSL 144
User-Centric Networking - Future Perspectives 137
Approximating Markovian Testing Equivalence 135
Data Privacy Management, and Security Assurance. 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers 132
A Note on Knowing Machines 130
Formal Modeling and Verification of Opportunity-enabled Risk Management 130
Modeling and Verification of the Worth-One-Minute Security Protocols 130
Logics to Reason Formally About Trust Computation and Manipulation 127
Formal Methods for Quantitative Aspects of Programming Languages (SFM 2010) 122
Model Checking of Trust-Based User-Centric Cooperative Networks 121
Do the Self-Knowing Machines Dream of Knowing Their Factivity? 120
European Performance Engineering Workshop (EPEW 2010) 120
A Trust Logic for the Varieties of Trust 118
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages(QAPL 2007), Braga, Portugal 114
Proceedings 16th Workshop on Quantitative Aspects of Programming Languages and Systems 112
An Adaptive Mechanism for Real-time Secure Speech Transmission over the Internet 111
Trading Performance and Cooperation Incentives in User-Centric Networks 107
Formal Approach to Design and Automatic Verification of Cooperation-Based Networks 102
Proceedings of the 3rd International Workshop on Views on Designing Complex Architectures (VODCA2008) 101
Noninterference and the Most Powerful Probabilistic Adversary 98
Reasoning About Ignorance and Beliefs 97
Quantitative Aspects in Security Assurance, Special Issue of the International Journal of Secure Software Engineering (IJSSE) 96
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices 94
Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures 90
Teoria degli automi per linguaggi formali 88
Special Issue of the Italian Conference on Theoretical Computer Science 2018 87
Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless CommunicationsSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications 87
Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures 86
Quantitative Aspects of Programming Languages and Systems over the past 2^4 years and beyond 80
PROCEDIMENTO DI SELEZIONE AUTOMATICA DI FOTOGRAFIE DIGITALI DA UN ARCHIVIO PER LA CREAZIONE AUTOMATICA DI UNA SEQUENZA DI FOTO CHE RAPPRESENTA UNA STORIA EMOZIONALE DA STAMPARE E/O CONSERVARE 80
Trust Evidence Logic 80
Procedimento di valutazione automatica della qualità di foto digitali 79
Totale 16.195
Categoria #
all - tutte 49.859
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 49.859


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019931 0 0 0 0 0 0 0 0 0 0 294 637
2019/20203.418 584 144 269 803 167 261 303 266 193 211 94 123
2020/20212.330 65 148 125 219 185 187 309 220 345 205 227 95
2021/20221.542 103 168 155 228 63 51 77 87 105 109 47 349
2022/20231.959 222 105 56 222 191 426 9 170 311 60 109 78
2023/2024520 47 49 34 39 59 183 26 55 3 15 10 0
Totale 16.810