Now showing items 1-5 of 5

    • A Certification Technique for Cloud Security Adaptation 

      Ardagna CA; Asal R; Damiani E; El Ioini N; Pahl C; Dimitrakos T (IEEE, 2016)
      Unpredictability of cloud computing due to segregation of visibility and control between applications, data owners, and cloud providers increases tenants’ uncertainty when using cloud services. Adaptation techniques become ...
    • Certification-Based Cloud Adaptation 

      Ardagna CA; Asal R; Damiani E; Dimitrakos T; El Ioini N; Pahl C (2018)
      Performance and dependability levels of cloud-based computations are difficult to guarantee by-design due to segregation of visibility and control between applications, data owners, and cloud providers. Lack of predictability ...
    • Modeling time, probability, and configuration constraints for continuous cloud service certification 

      Anisetti M; Ardagna CA; Damiani E; El Ioini N; Gaudenzi F (ELSEVIER ADVANCED TECHNOLOGY, 2018)
      Cloud computing proposes a paradigm shift where resources and services are allocated, provisioned, and accessed at runtime and on demand. New business opportunities emerge for service providers and their customers, at a ...
    • A Multimedia Summarizer Integrating Text and Images 

      d'Acierno A; Gargiulo F; Moscato V; Penta A; Persia F; Picariello A; Sansone C; Sperlì G (Springer, 2015)
      We present a multimedia summarizer system for retrieving relevant information from some web repositories based on the extraction of semantic descriptors of documents. In particular, semantics attached to each document ...
    • Process Mining Manifesto 

      van der Aalst WMP; Adriansyah A; Alves De Medeiros AK; Arcieri F; Baier T; Blickle T; Jagadeesh Chandra Bose RP; van den Brand P; Brandtjen R; Buijs JCAM; Burattin A; Carmona J; Castellanos M; Claes J; Cook J; Costantini N; Curbera F; Damiani E; De Leoni M; Delias P; van Dongen BF; Dumas M; Dustdar S; Fahland D; Ferreira DR; Gaaloul W; van Geffen F; Goel S; Gunther CW; Guzzo A; Harmon P; ter Hofstede AHM; Hoogland J; Ingvaldsen JE; Kato K; Kuhn R; Kumar A; La Rosa M; Maggi FM; Malerba D; Mans RS; Manuel A; Mccreesh M; Mello P; Mendling J; Montali M; Nezhad HRM; zur Muehlen M; Munoz-Gama J; Pontieri L; Ribeiro J; Rozinat A; Perez HS; Perez RS; Sepulveda M; Sinur J; Soffer P; Song M; Sperduti A; Stilo G; Stoel C; Swenson KD; Talamo M; Tan W; Turner C; Vanthienen J; Varvaressos G; Verbeek E; Verdonk M; Vigo R; Wang J; Weber B; Weidlich M; Weijters T; Wen L; Westergaard M; Wynn MT (Springer, 2011)
      Process mining techniques are able to extract knowledge from event logs commonly available in today’s information systems. These techniques provide new means to discover, monitor, and improve processes in a variety of ...