Nome |
# |
Users’ Fingerprinting Techniques from TCP Traffic, file e384c42f-804a-d4b2-e053-9f05fe0a1d67
|
357
|
Detecting user actions from HTTP traces: Toward an automatic approach, file e384c42f-2cdc-d4b2-e053-9f05fe0a1d67
|
334
|
Mining and modeling web trajectories from passive traces, file e384c42f-e0c8-d4b2-e053-9f05fe0a1d67
|
250
|
Free Floating Electric Car Sharing in Smart Cities: Data Driven System Dimensioning, file e384c430-395c-d4b2-e053-9f05fe0a1d67
|
140
|
Characterizing Web Pornography Consumption from Passive Measurements, file e384c430-8789-d4b2-e053-9f05fe0a1d67
|
105
|
Heterogeneous industrial vehicle usage predictions: A real case, file e384c430-d5f7-d4b2-e053-9f05fe0a1d67
|
98
|
E-Scooter Sharing: Leveraging Open Data for System Design, file e384c432-6f82-d4b2-e053-9f05fe0a1d67
|
98
|
Turbomachinery design by a swarm-based optimization method coupled with a CFD solver, file e384c42e-df7a-d4b2-e053-9f05fe0a1d67
|
96
|
Data Driven Optimization of Charging Station Placement for EV Free Floating Car Sharing, file e384c430-9be3-d4b2-e053-9f05fe0a1d67
|
91
|
The Exploitation of Web Navigation Data: Ethical Issues and Alternative Scenarios, file e384c42f-065c-d4b2-e053-9f05fe0a1d67
|
88
|
Impact of Charging Infrastructure and Policies on Electric Car Sharing Systems, file e384c432-c427-d4b2-e053-9f05fe0a1d67
|
85
|
Free Floating Electric Car Sharing: A Data Driven Approach for System Design, file e384c431-184c-d4b2-e053-9f05fe0a1d67
|
72
|
On Scalability of Electric Car Sharing in Smart Cities, file e384c432-8d9d-d4b2-e053-9f05fe0a1d67
|
72
|
A hybrid swarm-based algorithm for single-objective optimization problems involving high-cost analyses, file e384c42e-e034-d4b2-e053-9f05fe0a1d67
|
70
|
You, the Web, and Your Device: Longitudinal Characterization of Browsing Habits, file e384c430-6186-d4b2-e053-9f05fe0a1d67
|
60
|
Unveiling Community Dynamics on Instagram Political Network, file e384c432-326d-d4b2-e053-9f05fe0a1d67
|
53
|
User Interaction with Online Advertisements: Temporal Modeling and Optimization of Ads Placement, file e384c431-3a01-d4b2-e053-9f05fe0a1d67
|
50
|
z-anonymity: Zero-Delay Anonymization for Data Streams, file e384c433-0430-d4b2-e053-9f05fe0a1d67
|
49
|
On Car-Sharing Usage Prediction with Open Socio-Demographic Data, file e384c431-282b-d4b2-e053-9f05fe0a1d67
|
45
|
Environmental and Economic Comparison of ICEV and EV in Car Sharing, file e384c434-2887-d4b2-e053-9f05fe0a1d67
|
45
|
Preventive maintenance for heterogeneous industrial vehicles with incomplete usage data, file e384c433-9067-d4b2-e053-9f05fe0a1d67
|
44
|
Mining Patterns in Mobile Network Logs, file e384c431-ba6e-d4b2-e053-9f05fe0a1d67
|
41
|
Benefits of Relocation on E-scooter Sharing - a Data-Informed Approach, file e384c434-5cc8-d4b2-e053-9f05fe0a1d67
|
41
|
A Network Analysis on Cloud Gaming: Stadia, GeForce Now and PSNow, file e384c434-4bac-d4b2-e053-9f05fe0a1d67
|
36
|
Data Analysis and Modelling of Users' Behavior on the Web, file e384c431-c21e-d4b2-e053-9f05fe0a1d67
|
35
|
Machine learning supported next-maintenance prediction for industrial vehicles, file e384c432-790c-d4b2-e053-9f05fe0a1d67
|
35
|
Towards Understanding Political Interactions on Instagram, file e384c431-56c2-d4b2-e053-9f05fe0a1d67
|
32
|
RL-IoT: Reinforcement Learning to Interact with IoT Devices, file e384c433-f031-d4b2-e053-9f05fe0a1d67
|
23
|
Temporal Dynamics of Posts and User Engagement of Influencers on Facebook and Instagram, file e384c434-2f87-d4b2-e053-9f05fe0a1d67
|
22
|
DarkVec: automatic analysis of darknet traffic with word embeddings, file e384c434-bc9b-d4b2-e053-9f05fe0a1d67
|
22
|
Human Behaviour on the Web: Evolution, Interactions and Exploitation, file e384c431-a3d1-d4b2-e053-9f05fe0a1d67
|
20
|
The New Abnormal: Network Anomalies in the AI Era, file e384c433-d0ec-d4b2-e053-9f05fe0a1d67
|
16
|
Message from the organizers of WAIN, file e384c434-522b-d4b2-e053-9f05fe0a1d67
|
15
|
Free floating electric car sharing design: Data driven optimisation, file e384c430-664c-d4b2-e053-9f05fe0a1d67
|
14
|
Free floating electric car sharing design: Data driven optimisation, file e384c433-e180-d4b2-e053-9f05fe0a1d67
|
13
|
Characterizing client usage patterns and service demand for car-sharing systems, file e384c433-067e-d4b2-e053-9f05fe0a1d67
|
12
|
Workshop WAIN: Welcome message, file e384c432-790f-d4b2-e053-9f05fe0a1d67
|
10
|
A PIMS Development Kit for New Personal Data Platforms, file e384c434-d363-d4b2-e053-9f05fe0a1d67
|
9
|
Mining and modelling temporal dynamics of followers' engagement on online social networks, file dbab45e6-25ca-4582-9fa3-c27b99ad72b8
|
8
|
Understanding web pornography usage from traffic analysis, file e384c432-9176-d4b2-e053-9f05fe0a1d67
|
8
|
On network backbone extraction for modeling online collective behavior, file 858202e9-e51d-40e7-b7a6-c76bdb49c0c7
|
7
|
Users’ Fingerprinting Techniques from TCP Traffic, file e384c42f-8660-d4b2-e053-9f05fe0a1d67
|
7
|
On the dynamics of political discussions on Instagram: A network perspective, file e384c433-a536-d4b2-e053-9f05fe0a1d67
|
7
|
Benchmarking Evolutionary Community Detection Algorithms in Dynamic Networks, file 1fc3bfa7-f90a-4724-b9a1-418fcb9eaeb3
|
6
|
You, the Web, and Your Device: Longitudinal Characterization of Browsing Habits, file e384c430-5c40-d4b2-e053-9f05fe0a1d67
|
6
|
DarkVec: automatic analysis of darknet traffic with word embeddings, file e384c434-135a-d4b2-e053-9f05fe0a1d67
|
6
|
Towards NLP-based Processing of Honeypot Logs, file e384c434-c9ee-d4b2-e053-9f05fe0a1d67
|
6
|
Reading(&)Machine. Un modello prototipale per la promozione della lettura in biblioteca, file 1d357c34-efad-4a0c-aad5-3df8c1d741e0
|
5
|
Recommendation Systems in Libraries: an Application with Heterogeneous Data Sources, file 637981a9-41e8-4771-897e-a674747cb69f
|
5
|
Demand Model Generation from Traces: Adaptive KDE Data-Driven Optimization, file 7216b70e-8881-4969-84ab-481b0f241d99
|
5
|
A hybrid ABC for expensive optimizations: CEC 2016 competition benchmark, file e384c42e-df7d-d4b2-e053-9f05fe0a1d67
|
5
|
Mining and modeling web trajectories from passive traces, file e384c42f-e5cc-d4b2-e053-9f05fe0a1d67
|
5
|
Human Behaviour on the Web: Evolution, Interactions and Exploitation, file e384c431-819f-d4b2-e053-9f05fe0a1d67
|
5
|
Towards website domain name classification using graph based semi-supervised learning, file e384c433-1f5a-d4b2-e053-9f05fe0a1d67
|
5
|
Practical anonymization for data streams: z-anonymity and relation with k-anonymity, file 7ab0e681-f3df-4a4d-9e93-8d0e2542a1eb
|
4
|
i-DarkVec: Incremental Embeddings for Darknet Traffic Analysis, file a1923107-1178-4f30-b9bb-23454829ae0d
|
4
|
Characterizing Web Pornography Consumption from Passive Measurements, file e384c430-a3fa-d4b2-e053-9f05fe0a1d67
|
4
|
Towards Understanding Political Interactions on Instagram, file e384c431-56c3-d4b2-e053-9f05fe0a1d67
|
4
|
User Interaction with Online Advertisements: Temporal Modeling and Optimization of Ads Placement, file e384c431-a52f-d4b2-e053-9f05fe0a1d67
|
4
|
Machine learning supported next-maintenance prediction for industrial vehicles, file e384c432-5c6c-d4b2-e053-9f05fe0a1d67
|
4
|
Understanding web pornography usage from traffic analysis, file e384c432-9006-d4b2-e053-9f05fe0a1d67
|
4
|
A multi-faceted characterization of free-floating car sharing service usage, file e384c433-1097-d4b2-e053-9f05fe0a1d67
|
4
|
The Internet with Privacy Policies: Measuring The Web Upon Consent, file f59cb92a-83af-4340-a526-95331db3db24
|
4
|
Exploring Temporal GNN Embeddings for Darknet Traffic Analysis, file 4828adbf-bbdb-4072-bf37-03ad406c292c
|
3
|
Demand Model Generation from Traces: Adaptive KDE Data-Driven Optimization, file 632227c3-9379-4a7a-a968-21c7790b7f7e
|
3
|
Practical anonymization for data streams: z-anonymity and relation with k-anonymity, file 689d2e2b-cf34-48a8-b23c-49fc83169667
|
3
|
Mining Patterns in Mobile Network Logs, file e384c431-a3b7-d4b2-e053-9f05fe0a1d67
|
3
|
E-Scooter Sharing: Leveraging Open Data for System Design, file e384c432-6f83-d4b2-e053-9f05fe0a1d67
|
3
|
z-anonymity: Zero-Delay Anonymization for Data Streams, file e384c433-1170-d4b2-e053-9f05fe0a1d67
|
3
|
Debate on online social networks at the time of COVID-19: An Italian case study, file e384c433-887b-d4b2-e053-9f05fe0a1d67
|
3
|
On the dynamics of political discussions on Instagram: A network perspective, file e384c434-3509-d4b2-e053-9f05fe0a1d67
|
3
|
The stock exchange of influencers: a financial approach for studying fanbase variation trends, file e384c434-700e-d4b2-e053-9f05fe0a1d67
|
3
|
Disentangling the Information Flood on OSNs: Finding Notable Posts and Topics, file f0501f7c-63f7-44c4-b598-ac681812b96b
|
3
|
Data Driven Scalability and Profitability Analysis in Free Floating Electric Car Sharing Systems, file 09f45681-8d75-48c0-ab9e-3ce9ec6de039
|
2
|
User Value in Modern Payment Platforms: A Graph Approach, file 2d2853fc-10f4-4fb9-8cc2-5a7d8407b769
|
2
|
The Internet with Privacy Policies: Measuring The Web Upon Consent, file 6f59feb9-c15b-462b-a4ce-1822daf35130
|
2
|
Data Driven Scalability and Profitability Analysis in Free Floating Electric Car Sharing Systems, file a825c01a-ba69-47a2-b24b-2cadbbaa6be2
|
2
|
Transformer-based Prediction of Emotional Reactions to Online Social Network Posts, file cb407792-de13-400b-b5e8-9081a87ea9ba
|
2
|
Message Passing Optimization of Harmonic Influence Centrality, file e384c42e-7ad3-d4b2-e053-9f05fe0a1d67
|
2
|
Multidiscipinary Optimization For Gas Turbines Design, file e384c42e-df7c-d4b2-e053-9f05fe0a1d67
|
2
|
Data Analysis and Modelling of Users’ Behaviour on the Web, file e384c42f-f3f0-d4b2-e053-9f05fe0a1d67
|
2
|
A hybrid swarm-based algorithm for single-objective optimization problems involving high-cost analyses, file e384c430-5f92-d4b2-e053-9f05fe0a1d67
|
2
|
Data Driven Optimization of Charging Station Placement for EV Free Floating Car Sharing, file e384c430-72fe-d4b2-e053-9f05fe0a1d67
|
2
|
Data Analysis and Modelling of Users' Behavior on the Web, file e384c431-a3b9-d4b2-e053-9f05fe0a1d67
|
2
|
Unveiling Community Dynamics on Instagram Political Network, file e384c432-8577-d4b2-e053-9f05fe0a1d67
|
2
|
Towards website domain name classification using graph based semi-supervised learning, file e384c432-ebe0-d4b2-e053-9f05fe0a1d67
|
2
|
Preventive maintenance for heterogeneous industrial vehicles with incomplete usage data, file e384c433-5960-d4b2-e053-9f05fe0a1d67
|
2
|
RL-IoT: Reinforcement Learning to Interact with IoT Devices, file e384c433-b6a3-d4b2-e053-9f05fe0a1d67
|
2
|
Temporal Dynamics of Posts and User Engagement of Influencers on Facebook and Instagram, file e384c434-956a-d4b2-e053-9f05fe0a1d67
|
2
|
A PIMS Development Kit for New Personal Data Platforms, file e384c434-dfef-d4b2-e053-9f05fe0a1d67
|
2
|
Message from the organizers of WAIN, file e384c434-e66c-d4b2-e053-9f05fe0a1d67
|
2
|
2-hop Neighbor Class Similarity (2NCS): A graph structural metric indicative of graph neural network performance, file e71e0e6a-3797-4712-9085-af76fc70b6f0
|
2
|
Modeling communication asymmetry and content personalization in online social networks, file 1f507df9-b907-4298-8cfe-0d63098ee30f
|
1
|
LogPrécis: Unleashing language models for automated malicious log analysis, file 2348bc13-616a-41dc-9511-05c65c9e9630
|
1
|
Cross-network Embeddings Transfer for Traffic Analysis, file 37fd5029-3e9a-4f62-b8cc-0216c589647b
|
1
|
Modeling communication asymmetry and content personalization in online social networks, file 5130b334-2302-4ee1-9ed3-1e0eb13753bf
|
1
|
On using pretext tasks to learn representations from network logs, file 7b63439b-5ec7-479f-8a82-3605b69dfde5
|
1
|
Disentangling the Information Flood on OSNs: Finding Notable Posts and Topics, file c882df1e-e0f6-4d24-9bcf-3578ffc216c6
|
1
|
User Value in Modern Payment Platforms: A Graph Approach, file d1eb74b6-27c1-4cda-9e05-f755b56e6167
|
1
|
Detecting user actions from HTTP traces: Toward an automatic approach, file e384c42f-2c61-d4b2-e053-9f05fe0a1d67
|
1
|
Totale |
2.906 |