Cerca
Items 131-140 di 184
Anomalies in cyber security: detection, prevention and simulation approaches
(2018-07-03)
With themassive adoption of the Internet both our private andworking life has drastically
changed. The Internet has introduced new ways to communicate and complete
every day tasks. Organisations of any kind have taken ...
Design and development of membranes for CO2/CH4 separation
(2015-12-16)
The objective of this work is to compare different membrane materials and different operation
modes for the separation of CO2 from CH4. In this context, the working principles in terms of gas
transport properties will ...
Integration of nanophotonic devices on silicon
(2019-06-20)
The purpose of this thesis research project has been the integration of photonic
nanostructures on silicon substrate.
In particular, three different devices have been developed, whose application
fields fall within the ...
Global Optimization, Ordinary Differential Equations and Infinity Computing
(2018-06-08)
La tesi consiste in 4 capitoli. I primi due capitoli riguardano l’ottimizzazione globale utilizzando il framework dei computer tradizionali, mentre gli altri due capitoli riguardano l’utilizzo della nuova tipologia dei ...
<<A>> Defect-Centric analysis of the channel hot carrier degradation
(2016-02-02)
Durante l'ultimo decennio, il channel hot carrier (CHC) e
stato considerato uno dei pi u importanti meccanismi di degrado
della moderna tecnologia CMOS. La degradazione CHC si veri-
ca quando un voltaggio superiore a ...
Optimized dynamic load balancing in distributed exascale computing systems
(2016-02-08)
The dynamic nature of new generation scientific problems needs undergoing review in the traditional and static management of computing resources in Exascale computing systems. Doing so will support dynamic and unpredictable ...
User behavioral problems in complex social networks
(2019-06-20)
Over the past two decades, we witnessed the advent and the rapid growth of
numerous social networking platforms. Their pervasive diffusion dramatically
changed the way we communicate and socialize with each other. They ...
Hardening the security of modern operating systems against side-channel and rowhammer attacks
(2019-06-20)
Advancements in exploitation techniques call for the need of advanced defenses. Modern
operating systems have to face new sophisticate attacks that do not rely on any programming
mistake, rather they exploit leaking ...