Sfoglia per Rivista
A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems
2019-01-01 B D, D.; Al-Turjman, F.; Mostarda, L.
Lightweight Vision Transformer for Frame-Level Ergonomic Posture Classification in Industrial Workflows
2025-01-01 Cruciata, Luca; Contino, Salvatore; Ciccarelli, Marianna; Pirrone, Roberto; Mostarda, Leonardo; Papetti, Alessandra; Piangerelli, Marco
A Scalable Approach to IoT Interoperability: The Share Pattern
2025-01-01 Petracci, R.; Culmone, R.
Secure and Decentralized Hybrid Multi-Face Recognition for IoT Applications
2025-01-01 Abdullahu, Erëza; Wache, Holger; Piangerelli, Marco
A technological system for post‐earthquake damage scenarios based on the monitoring by means of an urban seismic network
2021-01-01 Costanzo, A.; Falcone, S.; D'Alessandro, A.; Vitale, G.; Giovinazzi, S.; Morici, M.; Dall'Asta, A.; Buongiorno, M. F.
| Titolo | Data di pubblicazione | Autore(i) | Tipo | File |
|---|---|---|---|---|
| A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems | 1-gen-2019 | B D, D.; Al-Turjman, F.; Mostarda, L. | Articolo | |
| Lightweight Vision Transformer for Frame-Level Ergonomic Posture Classification in Industrial Workflows | 1-gen-2025 | Cruciata, Luca; Contino, Salvatore; Ciccarelli, Marianna; Pirrone, Roberto; Mostarda, Leonardo; Papetti, Alessandra; Piangerelli, Marco | Articolo | |
| A Scalable Approach to IoT Interoperability: The Share Pattern | 1-gen-2025 | Petracci, R.; Culmone, R. | Articolo | |
| Secure and Decentralized Hybrid Multi-Face Recognition for IoT Applications | 1-gen-2025 | Abdullahu, Erëza; Wache, Holger; Piangerelli, Marco | Articolo | |
| A technological system for post‐earthquake damage scenarios based on the monitoring by means of an urban seismic network | 1-gen-2021 | Costanzo, A.; Falcone, S.; D'Alessandro, A.; Vitale, G.; Giovinazzi, S.; Morici, M.; Dall'Asta, A.; Buongiorno, M. F. | Articolo |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile