Sfoglia Dipartimento di Ingegneria Informatica, Modellistica, Elettronica e Sistemistica - Tesi di Dottorato per Titolo
Items 170-189 di 199
-
SiGe BicMOS Building Blocks for 5G Applications
(2019-01-18)SiGe BiCMOS semiconductor technology has been increasing its application domain especially for the development of complex microwave monolithically integrated circuits (MMIC) required for modern telecommunication systems. ... -
A spatial data infrastructure
(2012-10-24) -
Study characterization of modern 4h-sic power mosfetsF
(Università della Calabria, 2021-05-05) -
Study of two epigenetic age-associated modifications: DNA methylation of the rRNA gene promoter in humans and histone tail acetylation at the subtelomeric region in S. cerevisiae
(2014-10-29)Il presente lavoro di tesi è stato realizzato in parte presso il laboratorio di genetica dell'Università della Calabria, sotto la supervisione della Professoressa Dina Bellizzi e in parte presso la Davis School of Gerontology, ... -
Super peer models for public resource computing
(2014-03-06) -
Survey, diagnosis and monitoring of structures and land using geomatics techniques: theoretical and experimental aspects
(2016-02-11)The Geomatics techniques for the detection and representation of the land and objects have seen an exceptional development in recent years. The applications are innumerable and range from land planning to geophysics, ... -
Swarm-Based Algorithms for Decentralized Clustering and Resource Discovery in Grids
(2012-11-09)In this thesis, some novel algorithms based on swarm intelligent paradigm are proposed. In particular, the swarm agents, was exploited to tackle the following issues: - P2P Clustering. A swarm-based algorithm is used ... -
Theoretical and Practical Aspects of Trusted Execution Environments in Information Security and Volunteer Computing
(2018-08-06)Commodity operating systems, both on desktop and mobile devices, offer rich functionality and consequently a significant attack surface. A compromise of the operating system, however, means that an attacker also has access ... -
Topics in real-time fleet management
(2014-06-06)