|
Search the dblp DataBase
Alberto Trombetta:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Danilo Montesi, Alberto Trombetta
Similarity Search through Fuzzy Relational Algebra. [Citation Graph (0, 0)][DBLP] DEXA Workshop, 1999, pp:235-239 [Conf]
- Paolo Ciaccia, Danilo Montesi, Wilma Penzo, Alberto Trombetta
Imprecision and User Preferences in Multimedia Queries: A Generic Algebraic Approach. [Citation Graph (0, 0)][DBLP] FoIKS, 2000, pp:50-71 [Conf]
- Michela Acquaviva, Marco Benini, Alberto Trombetta
Short-Term Content Adaptation in Web-based Learning Systems. [Citation Graph (0, 0)][DBLP] Web Technologies, Applications, and Services, 2005, pp:198-203 [Conf]
- Alberto Trombetta, Elisa Bertino
Private Updates to Anonymous Databases. [Citation Graph (0, 0)][DBLP] ICDE, 2006, pp:116- [Conf]
- Danilo Montesi, Alberto Trombetta
Imprecision Based Queries Over Materialized and Virtual Integrated Views. [Citation Graph (0, 0)][DBLP] ICEIS (1), 2003, pp:407-413 [Conf]
- Elisa Bertino, Danilo Montesi, Alberto Trombetta
Fuzzy and Presentation Algebras for Web and Multimedia Data. [Citation Graph (0, 0)][DBLP] IDEAS, 2000, pp:134-144 [Conf]
- Avigdor Gal, Alberto Trombetta, Ateret Anaby-Tavor, Danilo Montesi
A Model for Schema Integration in Heterogeneous Databases. [Citation Graph (0, 0)][DBLP] IDEAS, 2003, pp:2-11 [Conf]
- Alberto Trombetta, Danilo Montesi
Equivalences and Optimizations in an Expressive XSLT Fragment. [Citation Graph (0, 0)][DBLP] IDEAS, 2004, pp:171-180 [Conf]
- Ateret Anaby-Tavor, Avigdor Gal, Alberto Trombetta
Evaluating Matching Algorithms: the Monotonicity Principle. [Citation Graph (0, 0)][DBLP] IIWeb, 2003, pp:47-52 [Conf]
- Danilo Montesi, Alberto Trombetta
An Extraction Language for the Web. [Citation Graph (0, 0)][DBLP] Workshop on Web Information and Data Management, 1998, pp:49-52 [Conf]
- Marco Benini, Alberto Trombetta, Michela Acquaviva
A model for short-term content adaptation. [Citation Graph (0, 0)][DBLP] WWW (Special interest tracks and posters), 2005, pp:1034-1035 [Conf]
- Alberto Trombetta, Danilo Montesi
Equivalences and optimizations in an expressive XSLT subset. [Citation Graph (0, 0)][DBLP] Acta Inf., 2006, v:42, n:6-7, pp:515-539 [Journal]
- Elisa Bertino, Alberto Trombetta, Danilo Montesi
Workflow Architecture for Interactive Video Management Systems. [Citation Graph (0, 0)][DBLP] Distributed and Parallel Databases, 2002, v:11, n:1, pp:33-51 [Journal]
- Danilo Montesi, Alberto Trombetta, Peter A. Dearnley
A similarity based relational algebra for Web and multimedia data. [Citation Graph (0, 0)][DBLP] Inf. Process. Manage., 2003, v:39, n:2, pp:307-322 [Journal]
- Daniele Mundici, Alberto Trombetta
Optimal Comparison Strategies in Ulam's Searching Game with Two Errors. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1997, v:182, n:1-2, pp:217-232 [Journal]
- Danilo Montesi, Alberto Trombetta
An Imprecision-based Language for the Web. [Citation Graph (0, 0)][DBLP] J. Vis. Lang. Comput., 2001, v:12, n:1, pp:3-35 [Journal]
- Avigdor Gal, Ateret Anaby-Tavor, Alberto Trombetta, Danilo Montesi
A framework for modeling and evaluating automatic semantic reconciliation. [Citation Graph (0, 0)][DBLP] VLDB J., 2005, v:14, n:1, pp:50-67 [Journal]
- Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:57- [Conf]
- Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo
Privacy-aware role based access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:41-50 [Conf]
- Cristina Ghiselli, Loris Bozzato, Alberto Trombetta
Representation and management of ontologies in cultural heritage domain. [Citation Graph (0, 0)][DBLP] SWAP, 2005, pp:- [Conf]
Modbus/DNP3 State-Based Intrusion Detection System. [Citation Graph (, )][DBLP]
Adaptive and Distributed Access Control in Cognitive Radio Networks. [Citation Graph (, )][DBLP]
Identity-based long running negotiations. [Citation Graph (, )][DBLP]
Privately Updating Suppression and Generalization based k-Anonymous Databases. [Citation Graph (, )][DBLP]
Introducing privacy in a hospital information system. [Citation Graph (, )][DBLP]
Integrating Privacy Policies into Business Processes. [Citation Graph (, )][DBLP]
Modeling and Validating BPMN Diagrams. [Citation Graph (, )][DBLP]
Scada Malware, a Proof of Concept. [Citation Graph (, )][DBLP]
State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. [Citation Graph (, )][DBLP]
Building a Domain Ontology from Glossaries: A General Methodology. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.282secs
|