Остановите войну!
for scientists:
default search action
Gabriele Gianini
- > Home > Persons > Gabriele Gianini
Publications
- 2024
- [j30]Annalisa Barsotti, Gabriele Gianini, Corrado Mio, Jianyi Lin, Himanshi Babbar, Aman Singh, Fatma Taher, Ernesto Damiani:
A Decade of Churn Prediction Techniques in the TelCo Domain: A Survey. SN Comput. Sci. 5(4): 404 (2024) - 2022
- [c46]Gabriele Gianini, Jianyi Lin, Corrado Mio, Ernesto Damiani:
Set-Based Counterfactuals in Partial Classification. IPMU (2) 2022: 560-571 - [c45]Roberto Cassata, Gabriele Gianini, Marco Anisetti, Valerio Bellandi, Ernesto Damiani, Alessandro Cavaciuti:
Inter-rater Agreement Based Risk Assessment Scheme for ICT Corporates. KES-IDT 2022: 63-76 - 2021
- [j27]Ahmed Mostefaoui, Gabriele Gianini, Ernesto Damiani, Geyong Min:
Guest Editorial: QoS and security in software for wireless and mobile micro-services. Computing 103(6): 1057-1059 (2021) - [j26]Mohammed Amine Merzoug, Ahmed Mostefaoui, Gabriele Gianini, Ernesto Damiani:
Smart connected parking lots based on secured multimedia IoT devices. Computing 103(6): 1143-1164 (2021) - [j24]Ebtesam Almazrouei, Gabriele Gianini, Nawaf I. Almoosa, Ernesto Damiani:
Robust Computationally-Efficient Wireless Emitter Classification Using Autoencoders and Convolutional Neural Networks. Sensors 21(7): 2414 (2021) - 2020
- [j22]Gabriele Gianini, Leopold Ghemmogne Fossi, Corrado Mio, Olivier Caelen, Lionel Brunie, Ernesto Damiani:
Managing a pool of rules for credit card fraud detection by a Game Theory based approach. Future Gener. Comput. Syst. 102: 549-561 (2020) - [j21]Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani:
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem. J. Inf. Secur. Appl. 51: 102462 (2020) - [c41]Ebtesam Almazrouei, Gabriele Gianini, Nawaf I. Almoosa, Ernesto Damiani:
What can Machine Learning do for Radio Spectrum Management? Q2SWinet 2020: 15-21 - 2019
- [j18]Fabrice Saffre, Gabriele Gianini, Hanno Hildmann, J. Davies, Shawn Bullock, Ernesto Damiani, Jean-Louis Deneubourg:
Long-term memory-induced synchronisation can impair collective performance in congested systems. Swarm Intell. 13(2): 95-114 (2019) - [j17]Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie:
RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems. IEEE Trans. Dependable Secur. Comput. 16(4): 635-650 (2019) - [c39]Ghalia Tello, Gabriele Gianini, Rabeb Mizouni, Ernesto Damiani:
Machine Learning-Based Framework for Log-Lifting in Business Process Mining Applications. BPM 2019: 232-249 - [c36]Ebtesam Almazrouei, Gabriele Gianini, Corrado Mio, Nawaf I. Almoosa, Ernesto Damiani:
Using AutoEncoders for Radio Signal Denoising. Q2SWinet 2019: 11-17 - [c33]Ebtesam Almazrouei, Gabriele Gianini, Nawaf I. Almoosa, Ernesto Damiani:
A Deep Learning Approach to Radio Signal Denoising. WCNC Workshops 2019: 1-8 - 2018
- [c32]Ernesto Damiani, Gabriele Gianini, Michelangelo Ceci, Donato Malerba:
Toward IoT-Friendly Learning Models. ICDCS 2018: 1284-1289 - [c31]Federico Buffoni, Gabriele Gianini, Ernesto Damiani, Michael Granitzer:
All-Implicants Neural Networks for Efficient Boolean Function Representation. ICCC 2018: 82-86 - [c28]Corrado Mio, Gabriele Gianini, Ernesto Damiani:
K-Means Clustering in Dual Space for Unsupervised Feature Partitioning in Multi-view Learning. SITIS 2018: 1-8 - 2017
- [c27]Guido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie:
Analysing Selfishness Flooding with SEINE. DSN 2017: 603-614 - 2016
- [j11]Gabriele Gianini, Alessandro Rizzi, Ernesto Damiani:
A Retinex model based on Absorbing Markov Chains. Inf. Sci. 327: 149-174 (2016) - [p2]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud. Computational Intelligence and Quantitative Software Engineering 2016: 173-207 - 2015
- [j9]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini, Antonio Zilli:
Toward Economic-Aware Risk Assessment on the Cloud. IEEE Secur. Priv. 13(6): 30-37 (2015) - [c22]Ernesto Damiani, Gabriele Gianini, Marcello Leida:
Toward behavioral business process analysis. CEC 2015: 2347-2353 - [c19]Guido Lena Cota, Sonia Ben Mokhtar, Julia Lawall, Gilles Muller, Gabriele Gianini, Ernesto Damiani, Lionel Brunie:
A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems. SRDS 2015: 276-285 - 2014
- [j7]Ernesto Damiani, Stelvio Cimato, Gabriele Gianini:
A risk model for cloud processes. ISC Int. J. Inf. Secur. 6(2): 99-123 (2014) - 2013
- [c17]Gabriele Gianini, Ernesto Damiani, Tobias René Mayer, David Coquil, Harald Kosch, Lionel Brunie:
Many-player inspection games in networked environments. DEST 2013: 1-6 - [c16]Gabriele Gianini, Ernesto Damiani:
The cover time of neighbor-avoiding gossiping on geometric random networks. DEST 2013: 7-12 - 2012
- [j6]Joe Tekli, Ernesto Damiani, Richard Chbeir, Gabriele Gianini:
SOAP Processing Performance and Enhancement. IEEE Trans. Serv. Comput. 5(3): 387-403 (2012) - [c14]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Risk assessment of credit securities: The notion and the issues. DEST 2012: 1-5 - 2010
- [c12]Paolo Ceravolo, Ernesto Damiani, Daisy Fasoli, Gabriele Gianini:
Representing Immaterial Value in Business Model. EDOCW 2010: 323-329 - [c11]Marco Anisetti, Ernesto Damiani, Fulvio Frati, Stelvio Cimato, Gabriele Gianini:
Using incentive schemes to alleviate supply chain risks. MEDES 2010: 221-228 - 2009
- [c9]Marco Anisetti, Valerio Bellandi, Ernesto Damiani, Fulvio Frati, Gabriele Gianini, Gwanggil Jeon, Jechang Jeong:
Supply Chain Risk Analysis: Open Source Simulator. SITIS 2009: 443-450 - [c8]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Privacy Preserving Risk Assessment of Credit Securities. SITIS 2009: 506-513 - 2008
- [c7]Gabriele Gianini, Ernesto Damiani, Paolo Ceravolo:
Consensus Emergence from Naming Games in Representative AgentSemantic Overlay Networks. OTM Workshops 2008: 1066-1075 - [c6]Gabriele Gianini, Ernesto Damiani:
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. Secure Data Management 2008: 133-150 - [c5]Gabriele Gianini, Ernesto Damiani:
Cloaking games in location based services. SWS 2008: 61-70 - [c4]Gabriele Gianini, Antonia Azzini, Ernesto Damiani, Stefania Marrara:
Global consensus emergence in an unstructured semantic network. CSTST 2008: 185-191 - [p1]Marco Anisetti, Valerio Bellandi, Ernesto Damiani, Gabriele Gianini:
Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study. New Directions in Intelligent Interactive Multimedia 2008: 555-564 - 2007
- [j4]Gabriele Gianini, Ernesto Damiani:
Poisson-noise removal in self-similarity studies based on packet-counting: factorial-moment/strip-integral approach. SIGMETRICS Perform. Evaluation Rev. 35(2): 3-5 (2007) - [c3]Ernesto Damiani, Gabriele Gianini:
Navigation Dynamics as a Biometrics for Authentication. KES (2) 2007: 832-839 - [c2]Ernesto Damiani, Gabriele Gianini:
A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models. XP 2007: 123-136 - 2006
- [j3]Ernesto Damiani, Gabriele Gianini, Hiroshi Maruyama:
Special issue: Web service security. Comput. Syst. Sci. Eng. 21(5) (2006) - [j1]Alberto Colombo, Ernesto Damiani, Gabriele Gianini:
Discovering the software process by means of stochastic workflow analysis. J. Syst. Archit. 52(11): 684-692 (2006) - 2004
- [c1]Gabriele Gianini, Ernesto Damiani:
An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events. KES 2004: 321-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 23:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint