Browsing Archivio delle tesi by Ph.D. or Bachelor Series "Informatica - computer science"

DSpace/Manakin Repository

Browsing Archivio delle tesi by Ph.D. or Bachelor Series "Informatica - computer science"

Sort by: Order: Results:

  • Visentin, Thomas <1996> (Università Ca' Foscari Venezia, 2022-10-21)
    The aim of the thesis is to understand how the various obfuscation techniques among those provided by the Tigress software increase the complexity of the code and therefore are therefore to be preferred to avoid reverse ...
  • Dulecha, Tinsae Gebrechristos <1985> (Università Ca' Foscari Venezia, 2014-10-31)
    Cluster Analysis (Clustering) is the process of finding group of objects where, objects in the same group will be similar (related) to one another and dissimilar from objects in other groups. A fundamental and the major ...
  • Magnan, Giorgio <1994> (Università Ca' Foscari Venezia, 2018-10-25)
    In recent years flow scheduling on the Internet has attracted a lot of interest in scientific research, in particular the study of how the distribution of flow size can influence system performance. Many queuing models ...
  • Cina', Antonio Emanuele <1995> (Università Ca' Foscari Venezia, 2019-07-10)
    Machine learning is becoming more and more used by businesses and private users as an additional tool for aiding in decision making and automation processes. However, over the past few years, there has been an increased ...
  • Tajwar, Muhammad <1996> (Università Ca' Foscari Venezia, 2023-10-16)
    Pruning is a technique in machine learning used to simplify models, reduce over-fitting, and improve efficiency. It works by reducing the complexity of a model through the removal of certain components. In the context of ...
  • Capacchione, Vito <1987> (Università Ca' Foscari Venezia, 2014-03-11)
    In this thesis I address the problem of energy consumption reduction in existing buildings, providing comfort levels for inhabitants. In the first part I will describe some aspects of the environmental problem related ...
  • Phung, Nhu Kien <1987> (Università Ca' Foscari Venezia, 2016-03-09)
    This paper addresses the issues of energy consumption reduction in existing buildings while providing comfort levels for inhabitants. Beside, representing an information-driven for the advancement of an HVAC(heating, ...
  • Abebe, Seyum Assefa <1987> (Università Ca' Foscari Venezia, 2017-07-06)
    In today's connected world there are complex systems and the science of network has been given significant time and advances to understand those complex structures. The community structure of real networks and finding those ...
  • Daniel, Luca <1995> (Università Ca' Foscari Venezia, 2019-10-29)
    Forecasting the results of sport tournaments is a topic of considerable interest. This thesis focuses on statistical modelling of football matches. The methodology discussed in the thesis stems from a cumulative logit ...
  • Pezzuto, Jacopo <1995> (Università Ca' Foscari Venezia, 2020-07-28)
    Nowadays on-line Social Network has lead to the creation of an enormous quantity of data, this data can be viewed as a graph composed by nodes that are people and edges that are the interactions between them. More scientists ...
  • Siviero, Enrico <1995> (Università Ca' Foscari Venezia, 2023-03-16)
    Password are stored in the form of one-way hashes, some password cracking tools such as hashcat can be used to crack efficiently the password using dictionaries and appropriate rules. Recent work show how the tools can be ...
  • Di Campi, Alessia Michela <1997> (Università Ca' Foscari Venezia, 2021-07-16)
    Passwords are essential in our life. They are the access key for all systems that require a security mechanism to avoid the disclosure of sensitive data. However a very common mistake is to create weak passwords based on ...
  • Noalettin, Marco <1992> (Università Ca' Foscari Venezia, 2018-03-21)
    With the increasing growth of the Internet of Things (IoT), more and more devices are connected to the Internet to exchange data. These devices are used in many different fields and most of them are powered with battery ...
  • Amadio, Alberto <1986> (Università Ca' Foscari Venezia, 2014-03-11)
    Many modern programming languages allow the programmer to allocate the memory in a simple and transparent way, without the need of the explicit deallocation of the memory when an object is not necessary any more. This is ...
  • Vivian, Francesco <1998> (Università Ca' Foscari Venezia, 2023-03-16)
    Optical and chemical images are collected from ice cores and are useful for the ice science community to study the evolution of paleoclimate. In the first part of this thesis, an exploratory analysis of cleaning visual ...
  • Rossato, Davide <1998> (Università Ca' Foscari Venezia, 2022-10-20)
    In the last 20 years, social networks have revolutionized many sectors. Politics, advertising, job search, commerce (from the multinational to the local shop), economics, social interactions and information are all fields ...
  • Veronese, Leonardo <1995> (Università Ca' Foscari Venezia, 2021-05-10)
    Time/memory trade-offs are general techniques used in the cryptanalysis of hash functions, block ciphers and stream ciphers that aim to reduce the computational effort at the cost of memory usage. Among these techniques ...
  • Pivato, Giovanni <1997> (Università Ca' Foscari Venezia, 2023-07-21)
    Climate change and environmental sustainability are topics of great interest and the need for improving awareness about the related issues is urgent. The aim of this thesis is to determine if communicating environmental ...
  • Sallaku, Redlon <1994> (Università Ca' Foscari Venezia, 2019-03-07)
    The main purpose of the thesis is to study Privacy and how protecting Privacy, including the new regulation framework proposed by EU the GDPR, investigating how static analysis could help GDPR enforcement, and develop a ...
  • Steffinlongo, Enrico <1987> (Università Ca' Foscari Venezia, 2014-06-26)
    In many software systems as modern web browsers the user and his sensitive data often interact with the untrusted outer world. This scenario can pose a serious threat to the user's private data and gives new relevance to ...