The SCEAS System
Navigation Menu

Search the dblp DataBase


Gianluca Lax: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Francesco Buccafurri, Gianluca Lax
    TLS: A Tree-Based DHT Lookup Service for Highly Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE (1), 2004, pp:563-580 [Conf]
  2. Francesco Buccafurri, Gianluca Lax, Domenico Rosaci, Domenico Ursino
    A User Behavior-Based Agent for Improving Web Usage. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE, 2002, pp:1168-1185 [Conf]
  3. Francesco Buccafurri, Gianluca Lax
    Pre-computing Approximate Hierarchical Range Queries in a Tree-Like Histogram. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2003, pp:350-359 [Conf]
  4. Francesco Buccafurri, Filippo Furfaro, Gianluca Lax, Domenico Saccà
    Binary-Tree Histograms with Tree Indices. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:861-870 [Conf]
  5. Francesco Buccafurri, Gianluca Lax
    Reducing Data Stream Sliding Windows by Cyclic Tree-Like Histograms. [Citation Graph (0, 0)][DBLP]
    PKDD, 2004, pp:75-86 [Conf]
  6. Francesco Buccafurri, Gianluca Lax
    L'Istogramma nLT: una Codifica Approssimata di Range Query Gerarchiche. [Citation Graph (0, 0)][DBLP]
    SEBD, 2003, pp:81-92 [Conf]
  7. Francesco Buccafurri, Gianluca Lax
    Rappresentazioni compresse di Data Stream attraverso istogrammi. [Citation Graph (0, 0)][DBLP]
    SEBD, 2004, pp:350-361 [Conf]
  8. Francesco Buccafurri, Gianluca Lax, Simona E. Rombo
    Riduzione del traffico nei sistemi P2P: un approccio semantico. [Citation Graph (0, 0)][DBLP]
    SEBD, 2004, pp:370-381 [Conf]
  9. Francesco Buccafurri, Gianluca Lax, Domenico Rosaci, Domenico Ursino
    Modellazione del comportamento degli utenti per supportarne l'accesso a sorgenti informative eterogenee. [Citation Graph (0, 0)][DBLP]
    SEBD, 2002, pp:145-152 [Conf]
  10. Francesco Buccafurri, Gianluca Lax, Domenico Saccà
    Progresses on Tree-Based Approaches to Improving Histogram Accuracy. [Citation Graph (0, 0)][DBLP]
    SEBD, 2006, pp:147-158 [Conf]
  11. Francesco Buccafurri, Gianluca Lax
    Fast range query estimation by N-level tree histograms. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2004, v:51, n:2, pp:257-275 [Journal]
  12. Francesco Buccafurri, Gianluca Lax, Domenico Rosaci, Domenico Ursino
    Dealing with semantic heterogeneity for improving Web usage. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2006, v:58, n:3, pp:436-465 [Journal]
  13. Francesco Buccafurri, Gianluca Lax
    Enabling Selective Flooding to Reduce P2P Traffic. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (1), 2007, pp:188-205 [Conf]
  14. Francesco Buccafurri, Luca Console, Pasquale De Meo, Maria Grazia Fugini, Anna Goy, Gianluca Lax, Pasquale Lops, Stefano Modafferi, Barbara Pernici, Claudia Picardi, Domenico Redavid, Giovanni Semeraro, Domenico Ursino
    Modellazione della QoS in Ambienti Web-Service con Applicazioni di Video Streaming. [Citation Graph (0, 0)][DBLP]
    SEBD, 2007, pp:298-307 [Conf]
  15. Francesco Buccafurri, Gianluca Lax
    Un Protocollo di Sicurezza contro le Vulnerabilitè derivanti da Software di Firma non Trusted. [Citation Graph (0, 0)][DBLP]
    SEBD, 2007, pp:64-75 [Conf]
  16. Francesco Buccafurri, Gianluca Lax, Domenico Saccà, Luigi Pontieri, Domenico Rosaci
    Enhancing Histograms by Tree-Like Bucket Indices [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  17. Francesco Buccafurri, Gianluca Lax, Domenico Saccà, Luigi Pontieri, Domenico Rosaci
    Enhancing histograms by tree-like bucket indices. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  18. A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions. [Citation Graph (, )][DBLP]

  19. Blue: A Reputation-Based Multi-Agent System to Support C2C in P2P Bluetooth Networks. [Citation Graph (, )][DBLP]

  20. Generating One-Time Passwords by Cheap and Fast Devices. [Citation Graph (, )][DBLP]

  21. A Probabilistic Framework for Localizing People with K-anonymity. [Citation Graph (, )][DBLP]

  22. Hardening digital signatures against untrusted signature software. [Citation Graph (, )][DBLP]

  23. An efficient k-anonymous localization technique for assistive environments. [Citation Graph (, )][DBLP]

  24. Fortifying the dalì attack on digital signature. [Citation Graph (, )][DBLP]

  25. Improving Similarity-Based Methods for Information Propagation on Social Networks. [Citation Graph (, )][DBLP]

  26. Analysis of QoS in cooperative services for real time applications. [Citation Graph (, )][DBLP]

  27. Approximating sliding windows by cyclic tree-like histograms for efficient range queries. [Citation Graph (, )][DBLP]

  28. CellTrust: a reputation model for C2C commerce. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002