array(1) { [0]=> object(Apache_Solr_Document)#24 (3) { ["_documentBoost":protected]=> bool(false) ["_fields":protected]=> array(6) { ["content_id"]=> array(1) { [0]=> string(14) "DIRECTORY_3588" } ["content_title"]=> array(1) { [0]=> string(16) "GIUSEPPE BIANCHI" } ["description"]=> array(1) { [0]=> string(88661) "

Giuseppe Bianchi is Full Professor of Telecommunications at the School of Engineering of the University of Roma Tor Vergata, current chair of the relevant Bachelor/Master teaching programme in Internet Technology engineering, and former chair of the Telecommunications and microelectronics PhD programme. His research activity, documented in about 170 peer-reviewed papers accounting for more than 9000 citations, spans several areas including wireless LANs, privacy and security, design and performance evaluation of broadband networks, network monitoring. His analytical models concerning the performance analysis of 802.11 WLAN networks are well known in the research community. He is in the editorial board for IEEE/ACM transactions on Networking, IEEE Transactions of Wireless Communications, and Elsevier's Computer communication. He has (co-)chaired more than 10 international IEEE/ACM conferences/workshops, the most recents being IEEE WoWMoM 2010 and ACM WinTech 2011, and the next major one being IEEE Infocom 2014 as technical co-chair. He has been involved in several European funded project, with general and/or technical coordination roles for the projects FP6-DISCREET (privacy in smart environments), FP7-PRISM (privacy-preserving network monitoring), FP7-DEMONS (distributed network monitoring) and FP7-FLAVIA (programmable wireless systems).

Giuseppe Bianchi is Full Professor of Telecommunications at the School of Engineering of the University of Roma Tor Vergata, current chair of the relevant Bachelor/Master teaching programme in Internet Technology engineering, and former chair of the Telecommunications and microelectronics PhD programme. His research activity, documented in about 170 peer-reviewed papers accounting for more than 9000 citations, spans several areas including wireless LANs, privacy and security, design and performance evaluation of broadband networks, network monitoring. His analytical models concerning the performance analysis of 802.11 WLAN networks are well known in the research community. He is in the editorial board for IEEE/ACM transactions on Networking, IEEE Transactions of Wireless Communications, and Elsevier's Computer communication. He has (co-)chaired more than 10 international IEEE/ACM conferences/workshops, the most recents being IEEE WoWMoM 2010 and ACM WinTech 2011, and the next major one being IEEE Infocom 2014 as technical co-chair. He has been involved in several European funded project, with general and/or technical coordination roles for the projects FP6-DISCREET (privacy in smart environments), FP7-PRISM (privacy-preserving network monitoring), FP7-DEMONS (distributed network monitoring) and FP7-FLAVIA (programmable wireless systems).

a:105:{i:0;a:14:{s:9:"citazione";s:165:"Di Domenico, S., De Sanctis, M., Cianca, E., & Bianchi, G. (2018). Exploring Training Options for RF Sensing Using CSI. IEEE COMMUNICATIONS MAGAZINE, 56(5), 116-123.";s:4:"data";s:4:"2018";s:2:"id";s:20:"PUBBLICAZIONE_333449";s:6:"handle";s:11:"2108/200385";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:51:"Exploring Training Options for RF Sensing Using CSI";s:9:"metadata6";s:52:"Di Domenico, S; De Sanctis, M; Cianca, E; Bianchi, G";s:9:"metadata7";s:25:"10.1109/MCOM.2018.1700145";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:1;a:14:{s:9:"citazione";s:221:"Lee, P.-., Yu, C.-., Dargahi, T., Conti, M., & Bianchi, G. (2018). MDSClone: Multidimensional scaling aided clone detection in internet of things. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 13(8), 2031-2046.";s:4:"data";s:4:"2018";s:2:"id";s:20:"PUBBLICAZIONE_333451";s:6:"handle";s:11:"2108/200387";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";s:76:"Network security; clone attack; internet of things; multidimensional scaling";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:78:"MDSClone: Multidimensional scaling aided clone detection in internet of things";s:9:"metadata6";s:49:"Lee, P-; Yu, C-; Dargahi, T; Conti, M; Bianchi, G";s:9:"metadata7";s:25:"10.1109/TIFS.2018.2805291";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:2;a:14:{s:9:"citazione";s:223:"Ateniese, G., Bianchi, G., Capossele, A., Petrioli, C., & Spenza, D. (2017). HELIOS: Outsourcing of security operations in Green Wireless Sensor Networks. In 2017 IEEE Symposium on Computers and Communications (ISCC). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333698";s:6:"handle";s:11:"2108/200559";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:76:"HELIOS: Outsourcing of security operations in Green Wireless Sensor Networks";s:9:"metadata6";s:61:"Ateniese, G; Bianchi, G; Capossele, A; Petrioli, C; Spenza, D";s:9:"metadata7";s:30:"10.1109/VTCSpring.2017.8108500";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:3;a:14:{s:9:"citazione";s:216:"Ateniese, G., Bianchi, G., Capossele, A.t., Petrioli, C., & Spenza, D. (2017). Low-cost standard signatures for energy-harvesting wireless sensor networks. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 16(3), 1-23.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333460";s:6:"handle";s:11:"2108/200395";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";s:150:"Energy harvesting; ultra-low-energy systems; low-energy authentication; low-energy digital signatures; IoT and WSNs security; wireless sensor networks";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:75:"Low-cost standard signatures for energy-harvesting wireless sensor networks";s:9:"metadata6";s:62:"Ateniese, G; Bianchi, G; Capossele, At; Petrioli, C; Spenza, D";s:9:"metadata7";s:15:"10.1145/2994603";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:4;a:14:{s:9:"citazione";s:227:"Bianchi, G., Bonola, M., Bruschi, V., Petrucci, L., & Pontarelli, S. (2017). Implementing a per-flow token bucket using open packet processor. In Communications in Computer and Information Science (pp.251-262). Springer Verlag.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333717";s:6:"handle";s:11:"2108/200575";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";s:41:"Computer Science (all); Mathematics (all)";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:64:"Implementing a per-flow token bucket using open packet processor";s:9:"metadata6";s:61:"Bianchi, G; Bonola, M; Bruschi, V; Petrucci, L; Pontarelli, S";s:9:"metadata7";s:28:"10.1007/978-3-319-67639-5_18";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:5;a:14:{s:9:"citazione";s:286:"Bianchi, G., Carusi, C., & Bracciale, L. (2017). An online approach for joint task assignment and worker evaluation in crowd-sourcing. In 2017 International Symposium on Networks, Computers and Communications, ISNCC 2017 (pp.1-8). Institute of Electrical and Electronics Engineers Inc..";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333712";s:6:"handle";s:11:"2108/200571";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";s:63:"Computer Networks and Communications; Hardware and Architecture";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:84:"An online approach for joint task assignment and worker evaluation in crowd-sourcing";s:9:"metadata6";s:35:"Bianchi, G; Carusi, C; Bracciale, L";s:9:"metadata7";s:26:"10.1109/ISNCC.2017.8072005";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:6;a:14:{s:9:"citazione";s:263:"Bianchi, G., Di Domenico, S., De Sanctis, M., Liberati, L., Perrotta, V., & Cianca, E. (2017). Unveiling access point signal instability in WiFi-based passive sensing. In 26th International Conference on Computer Communication and Networks (ICCCN) (pp.1-9). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_332787";s:6:"handle";s:11:"2108/199815";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";s:1665:"In the last few years, there has been a growing interest on the usage of passive WiFi signals for detecting and classifying human behavior activities. In most generality, the idea underlying most state of the art approaches is to monitor changes in the Channel State Information (CSI) or equivalent spectral metrics, caused by the different multi- path conditions (and their temporal variations) induced by human activity. The (implicit) underlying intuitive assumption is that, in a static environment, i.e. with no moving humans, the multi-path conditions do not vary, and hence the CSI gathered at the passive receiver side should remain substantially stable in time. Goal of this paper is to document, with an extensive set of experimental measurements, a perhaps surprising result: with modern multi-antenna 802.11n/ac access points, such an intuitive assumption does not seem to hold anymore. Rather, the measured CSI time pattern, which differs for different access point brands, appears to be affected by access points' implementation artifacts. Indeed, our measurements unveil frequent fluctuations of the CSI pattern among multiple "modes". Albeit still preliminary and, at least in part, still requiring a more thorough understanding (that only the reverse engineering of the access points' implementation may ultimately provide), our measurements unveil a phenomenon which may play havoc with several CSI-based human behavior detection approaches proposed in past works, and especially with those based on CSI measured on data frames, opposed to those based on relatively more stable (but still to be reconsidered in sight of our results) Beacon frames.";s:9:"metadata5";s:71:"Unveiling access point signal instability in WiFi-based passive sensing";s:9:"metadata6";s:78:"Bianchi, G; Di Domenico, S; De Sanctis, M; Liberati, L; Perrotta, V; Cianca, E";s:9:"metadata7";s:26:"10.1109/ICCCN.2017.8038449";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:7;a:14:{s:9:"citazione";s:232:"Bonola, M., Bianchi, G., Picierro, G., Pontarelli, S., & Monaci, M. (2017). StreaMon: A Data-Plane Programming Abstraction for Software-Defined Stream Monitoring. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 14(6), 664-678.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333458";s:6:"handle";s:11:"2108/200393";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";s:29:"SDN; network monitoring; XFSM";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:85:"StreaMon: A Data-Plane Programming Abstraction for Software-Defined Stream Monitoring";s:9:"metadata6";s:60:"Bonola, M; Bianchi, G; Picierro, G; Pontarelli, S; Monaci, M";s:9:"metadata7";s:25:"10.1109/TDSC.2015.2499747";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:8;a:14:{s:9:"citazione";s:289:"Bonola, M., Bifulco, R., Petrucci, L., Pontarelli, S., Tulumello, A., & Bianchi, G. (2017). Implementing advanced network functions for datacenters with stateful programmable data planes. In 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN) (pp.1-6). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333702";s:6:"handle";s:11:"2108/200563";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:94:"Implementing advanced network functions for datacenters with stateful programmable data planes";s:9:"metadata6";s:75:"Bonola, M; Bifulco, R; Petrucci, L; Pontarelli, S; Tulumello, A; Bianchi, G";s:9:"metadata7";s:27:"10.1109/LANMAN.2017.7972130";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:9;a:14:{s:9:"citazione";s:296:"Cuomo, F., Campo, M., Caponi, A., Bianchi, G., Rossini, G., & Pisani, P. (2017). EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations. In 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp.1-8). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333693";s:6:"handle";s:11:"2108/200553";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:83:"EXPLoRa: Extending the performance of LoRa by suitable spreading factor allocations";s:9:"metadata6";s:64:"Cuomo, F; Campo, M; Caponi, A; Bianchi, G; Rossini, G; Pisani, P";s:9:"metadata7";s:26:"10.1109/WiMOB.2017.8115779";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:10;a:14:{s:9:"citazione";s:186:"Dargahi, T., Caponi, A., Ambrosin, M., Bianchi, G., & Conti, M. (2017). A Survey on the Security of Stateful SDN Data Planes. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 19(3), 1701-1725.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333453";s:6:"handle";s:11:"2108/200389";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";s:152:"Software-defined networking (SDN); stateful SDN data planes; data plane programmability; SDN security; vulnerability assessment; OpenFlow; OpenState; P4";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:52:"A Survey on the Security of Stateful SDN Data Planes";s:9:"metadata6";s:56:"Dargahi, T; Caponi, A; Ambrosin, M; Bianchi, G; Conti, M";s:9:"metadata7";s:26:"10.1109/COMST.2017.2689819";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:11;a:14:{s:9:"citazione";s:202:"Di Domenico, S., De Sanctis, M., Cianca, E., Colucci, P., & Bianchi, G. (2017). LTE-based passive device-free crowd density estimation. In IEEE International Conference on Communications (pp.1-6). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_332780";s:6:"handle";s:11:"2108/199811";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";s:75:"Computer Networks and Communications; Electrical and Electronic Engineering";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:54:"LTE-based passive device-free crowd density estimation";s:9:"metadata6";s:64:"Di Domenico, S; De Sanctis, M; Cianca, E; Colucci, P; Bianchi, G";s:9:"metadata7";s:24:"10.1109/ICC.2017.7997194";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:12;a:14:{s:9:"citazione";s:280:"Palmisano, D., Ventre, P., Caponi, A., Siracusano, G., Salsano, S., Bonola, M., et al. (2017). D-STREAMON - NFV-capable distributed framework for network monitoring. In 2017 29th International Teletraffic Congress (ITC 29) (pp.30-35). 345 E 47TH ST, NEW YORK, NY 10017 USA : IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333612";s:6:"handle";s:11:"2108/200508";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";s:94:"Network Function Virtualization; Network Monitoring; Threat Detection; Network Programmability";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:69:"D-STREAMON - NFV-capable distributed framework for network monitoring";s:9:"metadata6";s:84:"Palmisano, D; Ventre, P; Caponi, A; Siracusano, G; Salsano, S; Bonola, M; Bianchi, G";s:9:"metadata7";s:25:"10.23919/ITC.2017.8065707";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:13;a:14:{s:9:"citazione";s:279:"Petrucci, L., Bonola, M., Pontarelli, S., Bianchi, G., & Bifulco, R. (2017). Demo: Implementing iptables using a programmable stateful data plane abstraction. In SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research (pp.193-194). Association for Computing Machinery, Inc.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333715";s:6:"handle";s:11:"2108/200573";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";s:46:"Computer Networks and Communications; Software";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:80:"Demo: Implementing iptables using a programmable stateful data plane abstraction";s:9:"metadata6";s:61:"Petrucci, L; Bonola, M; Pontarelli, S; Bianchi, G; Bifulco, R";s:9:"metadata7";s:23:"10.1145/3050220.3063773";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:14;a:14:{s:9:"citazione";s:326:"Pisa, C., Dargahi, T., Caponi, A., Bianchi, G., & Blefari-Melazzi, N. (2017). On the Feasibility of Attribute-Based Encryption for WLAN Access Control. In 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp.783-790). 345 E 47TH ST, NEW YORK, NY 10017 USA : IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_332572";s:6:"handle";s:11:"2108/199627";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";s:112:"WLAN Access Control; Attribute-Based Access Control; Multi-Authority Attribute-Based Encryption; Embedded Device";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:72:"On the Feasibility of Attribute-Based Encryption for WLAN Access Control";s:9:"metadata6";s:62:"Pisa, C; Dargahi, T; Caponi, A; Bianchi, G; Blefari-Melazzi, N";s:9:"metadata7";s:26:"10.1109/WiMOB.2017.8115806";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:15;a:14:{s:9:"citazione";s:215:"Pontarelli, S., Bonola, M., & Bianchi, G. (2017). Smashing SDN "built-in" actions: Programmable data plane packet manipulation in hardware. In 2017 IEEE Conference on Network Softwarization (NetSoft) (pp.1-9). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333704";s:6:"handle";s:11:"2108/200565";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:88:"Smashing SDN "built-in" actions: Programmable data plane packet manipulation in hardware";s:9:"metadata6";s:36:"Pontarelli, S; Bonola, M; Bianchi, G";s:9:"metadata7";s:28:"10.1109/NETSOFT.2017.8004106";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:16;a:14:{s:9:"citazione";s:246:"Pontarelli, S., Bruschi, V., Bonola, M., & Bianchi, G. (2017). On offloading programmable SDN controller tasks to the embedded microcontroller of stateful SDN dataplanes. In 2017 IEEE Conference on Network Softwarization (NetSoft) (pp.1-4). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333706";s:6:"handle";s:11:"2108/200567";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:106:"On offloading programmable SDN controller tasks to the embedded microcontroller of stateful SDN dataplanes";s:9:"metadata6";s:48:"Pontarelli, S; Bruschi, V; Bonola, M; Bianchi, G";s:9:"metadata7";s:28:"10.1109/NETSOFT.2017.8004225";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:17;a:14:{s:9:"citazione";s:197:"Sciancalepore, S., Piro, G., Boggia, G., & Bianchi, G. (2017). Public Key Authentication and Key Agreement in IoT Devices with Minimal Airtime Consumption. IEEE EMBEDDED SYSTEMS LETTERS, 9(1), 1-4.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333456";s:6:"handle";s:11:"2108/200391";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";s:156:"Elliptic curve cryptography (ECC); elliptic curve; Diffie-Hellman (ECDH); elliptic curve Qu-Vanstone (ECQV); industrial IoT; key management; security; X.509";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:91:"Public Key Authentication and Key Agreement in IoT Devices with Minimal Airtime Consumption";s:9:"metadata6";s:48:"Sciancalepore, S; Piro, G; Boggia, G; Bianchi, G";s:9:"metadata7";s:24:"10.1109/LES.2016.2630729";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:18;a:14:{s:9:"citazione";s:250:"Sciancalepore, S., Piro, G., Caldarola, D., Boggia, G., & Bianchi, G. (2017). OAuth-IoT: An access control framework for the Internet of Things based on open standards. In 2017 IEEE Symposium on Computers and Communications (ISCC) (pp.676-681). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333700";s:6:"handle";s:11:"2108/200561";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:89:"OAuth-IoT: An access control framework for the Internet of Things based on open standards";s:9:"metadata6";s:62:"Sciancalepore, S; Piro, G; Caldarola, D; Boggia, G; Bianchi, G";s:9:"metadata7";s:25:"10.1109/ISCC.2017.8024606";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:19;a:14:{s:9:"citazione";s:278:"Ventre, P.l., Caponi, A., Siracusano, G., Palmisano, D., Salsano, S., Bonola, M., et al. (2017). D-StreaMon: From middlebox to distributed NFV framework for network monitoring. In 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN) (pp.1-2). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333610";s:6:"handle";s:11:"2108/200506";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:78:"D-StreaMon: From middlebox to distributed NFV framework for network monitoring";s:9:"metadata6";s:85:"Ventre, Pl; Caponi, A; Siracusano, G; Palmisano, D; Salsano, S; Bonola, M; Bianchi, G";s:9:"metadata7";s:27:"10.1109/LANMAN.2017.7972149";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:20;a:14:{s:9:"citazione";s:244:"Zarko, I.p., Soursos, S., Gojmerac, I., Ostermann, E.g., Insolvibile, G., Plociennik, M., et al. (2017). Towards an IoT framework for semantic and organizational interoperability. In 2017 Global Internet of Things Summit (GIoTS) (pp.1-6). IEEE.";s:4:"data";s:4:"2017";s:2:"id";s:20:"PUBBLICAZIONE_333656";s:6:"handle";s:11:"2108/200547";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:73:"Towards an IoT framework for semantic and organizational interoperability";s:9:"metadata6";s:103:"Zarko, Ip; Soursos, S; Gojmerac, I; Ostermann, Eg; Insolvibile, G; Plociennik, M; Reichl, P; Bianchi, G";s:9:"metadata7";s:26:"10.1109/GIOTS.2017.8016253";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:21;a:14:{s:9:"citazione";s:254:"Bianchi, G., Biton, E., Blefari Melazzi, N., Borges, I., Chiaraviglio, L., de la Cruz Ramos, P., et al. (2016). Superfluidity: A Flexible Functional Architecture for 5G Networks. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 27(9), 1178-1186.";s:4:"data";s:10:"2016-07-27";s:2:"id";s:20:"PUBBLICAZIONE_314130";s:6:"handle";s:11:"2108/183214";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:65:"Superfluidity: A Flexible Functional Architecture for 5G Networks";s:9:"metadata6";s:251:"Bianchi, G; Biton, E; Blefari Melazzi, N; Borges, I; Chiaraviglio, L; de la Cruz Ramos, P; Eardley, P; Fontes, F; McGrath, MJ; Natarianni, L; Niculescu, D; Parada, C; Popovici, M; Riccobene, V; Salsano, S; Sayadi, B; Thomson, J; Tselios, C; Tsolis G;";s:9:"metadata7";s:16:"10.1002/ett.3082";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:22;a:14:{s:9:"citazione";s:223:"Bonola, M., Bracciale, L., Loreti, P., Amici, R., Rabuffi, A., & Bianchi, G. (2016). Opportunistic communication in smart city: Experimental insight with small-scale taxi fleets as data carriers. AD HOC NETWORKS, 43, 43-55.";s:4:"data";s:4:"2016";s:2:"id";s:20:"PUBBLICAZIONE_333710";s:6:"handle";s:11:"2108/200569";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";s:69:"Smart city; Data mules; Delay tolerant network; VANET; Sensor network";s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:109:"Opportunistic communication in smart city: Experimental insight with small-scale taxi fleets as data carriers";s:9:"metadata6";s:68:"Bonola, M; Bracciale, L; Loreti, P; Amici, R; Rabuffi, A; Bianchi, G";s:9:"metadata7";s:27:"10.1016/j.adhoc.2016.02.002";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:23;a:14:{s:9:"citazione";s:323:"Pisa, C., Caponi, A., Dargahi, T., Bianchi, G., & Blefari Melazzi, N. (2016). WI-FAB: Attribute-Based WLAN Access Control, Without Pre-shared Keys and Backend Infrastructures. In HotPOST '16 Proceedings of the 8th ACM International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking. IEEE.";s:4:"data";s:4:"2016";s:2:"id";s:20:"PUBBLICAZIONE_314552";s:6:"handle";s:11:"2108/183550";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:96:"WI-FAB: Attribute-Based WLAN Access Control, Without Pre-shared Keys and Backend Infrastructures";s:9:"metadata6";s:62:"Pisa, C; Caponi, A; Dargahi, T; Bianchi, G; Blefari Melazzi, N";s:9:"metadata7";s:23:"10.1145/2944789.2949546";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:24;a:14:{s:9:"citazione";s:309:"Bianchi, G., Bracciale, L., Censor-Hillel, K., Lincoln, A., & Médard, M. (2015). The One-Out-of-k Retrieval Problem and Linear Network Coding. In Coding Theory and Applications: 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014 (pp. 61-75). Springer International Publishing.";s:4:"data";s:4:"2015";s:2:"id";s:20:"PUBBLICAZIONE_234387";s:6:"handle";s:11:"2108/115657";s:9:"metadata1";s:19:"Contributo in libro";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:60:"The One-Out-of-k Retrieval Problem and Linear Network Coding";s:9:"metadata6";s:67:"Bianchi, G; Bracciale, L; Censor-Hillel, K; Lincoln, A; Médard, M";s:9:"metadata7";s:27:"10.1007/978-3-319-17296-5_6";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:25;a:14:{s:9:"citazione";s:171:"Bracciale, L., Loreti, P., & Bianchi, G. (2015). The sleepy bird catches more worms: revisiting energy efficient neighbor discovery. IEEE TRANSACTIONS ON MOBILE COMPUTING.";s:4:"data";s:4:"2015";s:2:"id";s:20:"PUBBLICAZIONE_234385";s:6:"handle";s:11:"2108/115654";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:82:"The sleepy bird catches more worms: revisiting energy efficient neighbor discovery";s:9:"metadata6";s:35:"Bracciale, L; Loreti, P; Bianchi, G";s:9:"metadata7";s:24:"10.1109/TMC.2015.2471299";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:26;a:14:{s:9:"citazione";s:310:"Amici, R., Bonola, M., Bracciale, L., Loreti, P., Rabuffi, A., & Bianchi, G. (2014). Performance assessment of an epidemic protocol in VANET using real traces. In Procedia Computer Science: Fourth International Conference on Selected Topics in Mobile & Wireless Networking (MoWNet’2014) (pp.92-99). Elsevier.";s:4:"data";s:4:"2014";s:2:"id";s:20:"PUBBLICAZIONE_200867";s:6:"handle";s:11:"2108/115660";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:73:"Performance assessment of an epidemic protocol in VANET using real traces";s:9:"metadata6";s:68:"Amici, R; Bonola, M; Bracciale, L; Loreti, P; Rabuffi, A; Bianchi, G";s:9:"metadata7";s:27:"10.1016/j.procs.2014.10.035";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:27;a:14:{s:9:"citazione";s:190:"Bianchi, G., Bonola, M., Picierro, G., Pontarelli, S., & Monaci, M. (2014). StreaMon: A software-defined monitoring platform. In 2014 26th International Teletraffic Congress, ITC 2014. IEEE.";s:4:"data";s:4:"2014";s:2:"id";s:20:"PUBBLICAZIONE_216805";s:6:"handle";s:11:"2108/104649";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:48:"StreaMon: A software-defined monitoring platform";s:9:"metadata6";s:60:"Bianchi, G; Bonola, M; Picierro, G; Pontarelli, S; Monaci, M";s:9:"metadata7";s:24:"10.1109/ITC.2014.6932956";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:28;a:14:{s:9:"citazione";s:179:"Blefari Melazzi, N., Bianchi, G., Caponi, A., & Detti, A. (2014). A general, tractable and accurate model for a cascade of LRU caches. IEEE COMMUNICATIONS LETTERS, 18(5), 877-880.";s:4:"data";s:4:"2014";s:2:"id";s:20:"PUBBLICAZIONE_189626";s:6:"handle";s:10:"2108/94554";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:67:"A general, tractable and accurate model for a cascade of LRU caches";s:9:"metadata6";s:51:"Blefari Melazzi, N; Bianchi, G; Caponi, A; Detti, A";s:9:"metadata7";s:32:"10.1109/LCOMM.2014.031414.132727";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:29;a:14:{s:9:"citazione";s:255:"Bracciale, L., Loreti, P., & Bianchi, G. (2014). Simulating the statistics of the first meetings using dynamic 'open environments'. In Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE (pp.229-234).";s:4:"data";s:4:"2014";s:2:"id";s:20:"PUBBLICAZIONE_216804";s:6:"handle";s:11:"2108/104594";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:81:"Simulating the statistics of the first meetings using dynamic 'open environments'";s:9:"metadata6";s:35:"Bracciale, L; Loreti, P; Bianchi, G";s:9:"metadata7";s:22:"10.1109/WETICE.2014.64";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:30;a:14:{s:9:"citazione";s:208:"Serrano, P., Garcia-Saavedra, A., Bianchi, G., Banchs, A., & Azcorra, A. (2014). Per-Frame energy consumption in 802.11 devices and its implication on modeling and design. IEEE-ACM TRANSACTIONS ON NETWORKING.";s:4:"data";s:4:"2014";s:2:"id";s:20:"PUBBLICAZIONE_216802";s:6:"handle";s:11:"2108/104588";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:89:"Per-Frame energy consumption in 802.11 devices and its implication on modeling and design";s:9:"metadata6";s:65:"Serrano, P; Garcia-Saavedra, A; Bianchi, G; Banchs, A; Azcorra, A";s:9:"metadata7";s:25:"10.1109/TNET.2014.2322262";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:31;a:14:{s:9:"citazione";s:196:"Spalvieri, A., Mandelli, S., Magarini, M., & Bianchi, G. (2014). Weighting peer reviewers. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on (pp.414-419). IEEE.";s:4:"data";s:4:"2014";s:2:"id";s:20:"PUBBLICAZIONE_216806";s:6:"handle";s:11:"2108/104605";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:24:"Weighting peer reviewers";s:9:"metadata6";s:50:"Spalvieri, A; Mandelli, S; Magarini, M; Bianchi, G";s:9:"metadata7";s:24:"10.1109/PST.2014.6890969";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:32;a:14:{s:9:"citazione";s:344:"Tropea, G., Bianchi, G., Blefari Melazzi, N., Castro, H., Chiariglione, L., Difino, A., et al. (2014). The Adoption of Rights Expression Language in CONVERGENCE. In F. Almeida, M.T. Andrade, N. Blefari Melazzi, R. Walker, H. Hussmann, & I.S. Venieris (a cura di), Enhancing the Internet with the CONVERGENCE System. Springer-Verlag London.";s:4:"data";s:4:"2014";s:2:"id";s:20:"PUBBLICAZIONE_314603";s:6:"handle";s:11:"2108/183599";s:9:"metadata1";s:19:"Contributo in libro";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:57:"The Adoption of Rights Expression Language in CONVERGENCE";s:9:"metadata6";s:118:"Tropea, G; Bianchi, G; Blefari Melazzi, N; Castro, H; Chiariglione, L; Difino, A; Huebner, T; Anadiotis, AC; Mousas, A";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:33;a:14:{s:9:"citazione";s:230:"Ateniese, G., Bianchi, G., Capossele, A., & Petrioli, C. (2013). Low-cost standard signatures in wireless sensor networks: a case for reviving pre-computation techniques?. In Network and distributed system security symposium 2013.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216847";s:6:"handle";s:11:"2108/104372";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:105:"Low-cost standard signatures in wireless sensor networks: a case for reviving pre-computation techniques?";s:9:"metadata6";s:50:"Ateniese, G; Bianchi, G; Capossele, A; Petrioli, C";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:34;a:14:{s:9:"citazione";s:259:"Bianchi, G., & Tinnirello, I. (2013). One size hardly fits all: towards context-specific wireless MAC protocol deployment. In Proceedings of the 8th ACM international workshop on Wireless network testbeds, experimental evaluation \& characterization (pp.1-8).";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216831";s:6:"handle";s:11:"2108/104311";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:83:"One size hardly fits all: towards context-specific wireless MAC protocol deployment";s:9:"metadata6";s:25:"Bianchi, G; Tinnirello, I";s:9:"metadata7";s:23:"10.1145/2505469.2505482";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:35;a:14:{s:9:"citazione";s:213:"Bianchi, G., Caponi, A., Detti, A., & Blefari Melazzi, N. (2013). Check before storing: what is the performance price of content integrity verification in LRU caching?. COMPUTER COMMUNICATION REVIEW, 43(3), 59-67.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_189922";s:6:"handle";s:10:"2108/94609";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:101:"Check before storing: what is the performance price of content integrity verification in LRU caching?";s:9:"metadata6";s:51:"Bianchi, G; Caponi, A; Detti, A; Blefari Melazzi, N";s:9:"metadata7";s:23:"10.1145/2500098.2500106";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:36;a:14:{s:9:"citazione";s:181:"Bianchi, G., Capossele, A., Petrioli, C., & Spenza, D. (2013). AGREE: exploiting energy harvesting to support data-centric access control in WSNs. AD HOC NETWORKS, 11(8), 2625-2636.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216755";s:6:"handle";s:11:"2108/104294";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:63:"Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni";s:9:"metadata4";N;s:9:"metadata5";s:82:"AGREE: exploiting energy harvesting to support data-centric access control in WSNs";s:9:"metadata6";s:48:"Bianchi, G; Capossele, A; Petrioli, C; Spenza, D";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:37;a:14:{s:9:"citazione";s:263:"Bianchi, G., Gallo, P., Garlisi, D., Giuliano, F., Gringoli, F., & Tinnirello, I. (2013). Deploying virtual MAC protocols over a shared access infrastructure using MAClets. In Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on (pp.17-18).";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216849";s:6:"handle";s:11:"2108/104371";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:81:"Deploying virtual MAC protocols over a shared access infrastructure using MAClets";s:9:"metadata6";s:73:"Bianchi, G; Gallo, P; Garlisi, D; Giuliano, F; Gringoli, F; Tinnirello, I";s:9:"metadata7";s:28:"10.1109/INFCOMW.2013.6970703";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:38;a:14:{s:9:"citazione";s:199:"Bianchi, G., Rajabi, H., Caponi, A., & Picierro, G. (2013). Conditional disclosure of encrypted whitelists for DDoS attack mitigation. In Globecom Workshops (GC Wkshps), 2013 IEEE (pp.200-206). IEEE.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216832";s:6:"handle";s:11:"2108/104310";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:73:"Conditional disclosure of encrypted whitelists for DDoS attack mitigation";s:9:"metadata6";s:45:"Bianchi, G; Rajabi, H; Caponi, A; Picierro, G";s:9:"metadata7";s:28:"10.1109/GLOCOMW.2013.6824986";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:39;a:14:{s:9:"citazione";s:230:"Bracciale, L., Loreti, P., & Bianchi, G. (2013). Human time-scale duty cycle for opportunistic WiFi based mobile networks. In Digital Communications-Green ICT (TIWDC), 2013 24th Tyrrhenian International Workshop on (pp.1-6). IEEE.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216850";s:6:"handle";s:11:"2108/104370";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:72:"Human time-scale duty cycle for opportunistic WiFi based mobile networks";s:9:"metadata6";s:35:"Bracciale, L; Loreti, P; Bianchi, G";s:9:"metadata7";s:26:"10.1109/TIWDC.2013.6664205";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:40;a:14:{s:9:"citazione";s:224:"Gallo, P., Garlisi, D., Giuliano, F., Gringoli, F., Tinnirello, I., & Bianchi, G. (2013). A control architecture for wireless MAC processor networking. In Future Network and MobileSummit 2013 Conference Proceedings (pp.3-9).";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216855";s:6:"handle";s:11:"2108/104373";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:60:"A control architecture for wireless MAC processor networking";s:9:"metadata6";s:73:"Gallo, P; Garlisi, D; Giuliano, F; Gringoli, F; Tinnirello, I; Bianchi, G";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:41;a:14:{s:9:"citazione";s:269:"Gallo, P., Garlisi, D., Giuliano, F., Gringoli, F., Tinnirello, I., & Bianchi, G. (2013). Wireless MAC processor networking: a control architecture for expressing and implementing high-level adaptation policies in WLANs. IEEE VEHICULAR TECHNOLOGY MAGAZINE, 8(4), 81-89.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216754";s:6:"handle";s:11:"2108/104307";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:129:"Wireless MAC processor networking: a control architecture for expressing and implementing high-level adaptation policies in WLANs";s:9:"metadata6";s:73:"Gallo, P; Garlisi, D; Giuliano, F; Gringoli, F; Tinnirello, I; Bianchi, G";s:9:"metadata7";s:24:"10.1109/MVT.2013.2281652";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:42;a:14:{s:9:"citazione";s:303:"Gringoli, F., Facchi, N., Gallo, P., Garlisi, D., Giuliano, F., & Bianchi, G. (2013). Enabling cognitive-radio paradigm on commercial off-the-shelf 802.11 hardware. In Proceedings of the 8th ACM international workshop on Wireless network testbeds, experimental evaluation \& characterization (pp.95-96).";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216830";s:6:"handle";s:11:"2108/104328";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:77:"Enabling cognitive-radio paradigm on commercial off-the-shelf 802.11 hardware";s:9:"metadata6";s:69:"Gringoli, F; Facchi, N; Gallo, P; Garlisi, D; Giuliano, F; Bianchi, G";s:9:"metadata7";s:23:"10.1145/2505469.2506493";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:43;a:14:{s:9:"citazione";s:238:"Loreti, P., Paolillo, R., Orru, M., Pisa, C., & Bianchi, G. (2013). Intermodule data sharing for flexible wireless MAC. In Software, Telecommunications and Computer Networks (SoftCOM), 2013 21st International Conference on (pp.1-6). IEEE.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216851";s:6:"handle";s:11:"2108/104369";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:50:"Intermodule data sharing for flexible wireless MAC";s:9:"metadata6";s:52:"Loreti, P; Paolillo, R; Orru, M; Pisa, C; Bianchi, G";s:9:"metadata7";s:28:"10.1109/SoftCOM.2013.6671883";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:44;a:14:{s:9:"citazione";s:195:"Natkaniec, M., Kosek-Szott, K., Szott, S., & Bianchi, G. (2013). A survey of medium access mechanisms for providing QoS in Ad-Hoc networks. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 15, 592-620.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216752";s:6:"handle";s:11:"2108/104288";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:73:"A survey of medium access mechanisms for providing QoS in Ad-Hoc networks";s:9:"metadata6";s:50:"Natkaniec, M; Kosek-Szott, K; Szott, S; Bianchi, G";s:9:"metadata7";s:30:"10.1109/SURV.2012.060912.00004";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:45;a:14:{s:9:"citazione";s:179:"Pontarelli, S., Bianchi, G., & Teofili, S. (2013). Traffic-aware Design of a High Speed FPGA Network Intrusion Detection System. IEEE TRANSACTIONS ON COMPUTERS, 62(11), 2322-2334.";s:4:"data";s:4:"2013";s:2:"id";s:20:"PUBBLICAZIONE_216753";s:6:"handle";s:11:"2108/104309";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:32:"Settore ING-INF/01 - Elettronica";s:9:"metadata4";N;s:9:"metadata5";s:76:"Traffic-aware Design of a High Speed FPGA Network Intrusion Detection System";s:9:"metadata6";s:37:"Pontarelli, S; Bianchi, G; Teofili, S";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:46;a:14:{s:9:"citazione";s:287:"Bianchi, G., Bracciale, L., & Loreti, P. (2012). ”Better than nothing” privacy with bloom filters: to what extent?. In Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2012, Palermo, Italy, September 26-28, 2012. Proceedings (pp.348-363).";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216154";s:6:"handle";s:11:"2108/104167";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:69:"”Better than nothing” privacy with bloom filters: to what extent?";s:9:"metadata6";s:35:"Bianchi, G; Bracciale, L; Loreti, P";s:9:"metadata7";s:28:"10.1007/978-3-642-33627-0_27";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:47;a:14:{s:9:"citazione";s:195:"Bianchi, G., Duffy, K., Leith, D., & Shneer, V. (2012). Modeling conservative updates in multi-hash approximate count sketches. In Teletraffic Congress (ITC 24), 2012 24th International (pp.1-8).";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216857";s:6:"handle";s:11:"2108/104392";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:70:"Modeling conservative updates in multi-hash approximate count sketches";s:9:"metadata6";s:41:"Bianchi, G; Duffy, K; Leith, D; Shneer, V";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:48;a:14:{s:9:"citazione";s:266:"Bianchi, G., Gallo, P., Garlisi, D., Giuliano, F., Gringoli, F., & Tinnirello, I. (2012). MAClets: active MAC protocols over hard-coded devices. In Proceedings of the 8th international conference on Emerging networking experiments and technologies (pp.229-240). ACM.";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216858";s:6:"handle";s:11:"2108/104391";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:53:"MAClets: active MAC protocols over hard-coded devices";s:9:"metadata6";s:73:"Bianchi, G; Gallo, P; Garlisi, D; Giuliano, F; Gringoli, F; Tinnirello, I";s:9:"metadata7";s:23:"10.1145/2413176.2413203";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:49;a:14:{s:9:"citazione";s:222:"Bianchi, G., Loreti, P., & Trkulja, A. (2012). Let me grab your App: Preliminary proof-of-concept design of opportunistic content augmentation. In Communications (ICC), 2012 IEEE International Conference on (pp.7034-7039).";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216174";s:6:"handle";s:11:"2108/104168";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:95:"Let me grab your App: Preliminary proof-of-concept design of opportunistic content augmentation";s:9:"metadata6";s:33:"Bianchi, G; Loreti, P; Trkulja, A";s:9:"metadata7";s:24:"10.1109/ICC.2012.6364952";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:50;a:14:{s:9:"citazione";s:223:"Dusi, M., d Hereuse, N., Huici, F., Di Pietro, A., Bonelli, N., Bianchi, G., et al. (2012). Blockmon: Flexible and high-performance big data stream analytics platform and its use cases. NEC TECHNICAL JOURNAL, 7(2), 102-106.";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216756";s:6:"handle";s:11:"2108/104329";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:92:"Blockmon: Flexible and high-performance big data stream analytics platform and its use cases";s:9:"metadata6";s:96:"Dusi, M; d Hereuse, N; Huici, F; Di Pietro, A; Bonelli, N; Bianchi, G; Trammell, B; Niccolini, S";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:51;a:14:{s:9:"citazione";s:230:"Gallo, P., Krasilov, A., Lyakhov, A., Tinnirello, I., & Bianchi, G. (2012). Breaking layer 2: A new architecture for programmable wireless interfaces. In ICT Convergence (ICTC), 2012 International Conference on (pp.342-347). IEEE.";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216861";s:6:"handle";s:11:"2108/104388";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:73:"Breaking layer 2: A new architecture for programmable wireless interfaces";s:9:"metadata6";s:60:"Gallo, P; Krasilov, A; Lyakhov, A; Tinnirello, I; Bianchi, G";s:9:"metadata7";s:25:"10.1109/ICTC.2012.6386856";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:52;a:14:{s:9:"citazione";s:278:"Garcia-Saavedra, A., Serrano, P., Banchs, A., & Bianchi, G. (2012). Energy consumption anatomy of 802.11 devices and its implication on modeling and design. In Proceedings of the 8th international conference on Emerging networking experiments and technologies (pp.169-180). ACM.";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216859";s:6:"handle";s:11:"2108/104390";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:87:"Energy consumption anatomy of 802.11 devices and its implication on modeling and design";s:9:"metadata6";s:53:"Garcia-Saavedra, A; Serrano, P; Banchs, A; Bianchi, G";s:9:"metadata7";s:23:"10.1145/2413176.2413197";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:53;a:14:{s:9:"citazione";s:213:"Grunenberger, Y., Tinnirello, I., Gallo, P., Goma, E., & Bianchi, G. (2012). Wireless card virtualization: from virtual NICs to virtual MAC machines. In Future Network & Mobile Summit (FutureNetw), 2012 (pp.1-10).";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216856";s:6:"handle";s:11:"2108/104387";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:71:"Wireless card virtualization: from virtual NICs to virtual MAC machines";s:9:"metadata6";s:61:"Grunenberger, Y; Tinnirello, I; Gallo, P; Goma, E; Bianchi, G";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:54;a:14:{s:9:"citazione";s:219:"Tinnirello, I., Bianchi, G., Gallo, P., Garlisi, D., Giuliano, F., & Gringoli, F. (2012). Wireless MAC processors: programming MAC protocols on commodity hardware. In INFOCOM, 2012 Proceedings IEEE (pp.1269-1277). IEEE.";s:4:"data";s:4:"2012";s:2:"id";s:20:"PUBBLICAZIONE_216860";s:6:"handle";s:11:"2108/104389";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:72:"Wireless MAC processors: programming MAC protocols on commodity hardware";s:9:"metadata6";s:73:"Tinnirello, I; Bianchi, G; Gallo, P; Garlisi, D; Giuliano, F; Gringoli, F";s:9:"metadata7";s:27:"10.1109/INFCOM.2012.6195488";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:55;a:14:{s:9:"citazione";s:395:"Battaglino, D., Bracciale, L., Detti, A., Bianchi, G., Bragagnini, A., Turolla, M.S., et al. (2011). Design, implementation and performance evaluation of a publish-subscribe architecture for intermittently connected 802.15.4 networks. In Proceeding PE-WASUN '11 Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (pp.105-112). ACM.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_221986";s:6:"handle";s:11:"2108/105288";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:132:"Design, implementation and performance evaluation of a publish-subscribe architecture for intermittently connected 802.15.4 networks";s:9:"metadata6";s:98:"Battaglino, D; Bracciale, L; Detti, A; Bianchi, G; Bragagnini, A; Turolla, MS; Blefari Melazzi, N";s:9:"metadata7";s:23:"10.1145/2069063.2069081";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:56;a:14:{s:9:"citazione";s:134:"Bianchi, G. (2011). Revisiting an identification-free RFID batch authentication approach. IEEE COMMUNICATIONS LETTERS, 15(6), 632-634.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_216758";s:6:"handle";s:11:"2108/104349";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:68:"Revisiting an identification-free RFID batch authentication approach";s:9:"metadata6";s:10:"Bianchi, G";s:9:"metadata7";s:32:"10.1109/LCOMM.2011.041411.110283";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:57;a:14:{s:9:"citazione";s:205:"Bianchi, G., & Giordano, S. (2011). Challenge: network-aware human traffic adaptation. In Eighth International Conference on Wireless On-Demand Network Systems and Services (WONS), 2011 (pp.132-133). IEEE.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_216766";s:6:"handle";s:11:"2108/104393";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:49:"Challenge: network-aware human traffic adaptation";s:9:"metadata6";s:23:"Bianchi, G; Giordano, S";s:9:"metadata7";s:25:"10.1109/WONS.2011.5720181";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:58;a:14:{s:9:"citazione";s:162:"Bianchi, G., D'Heureuse, N., & Nuccolini, S. (2011). On-demand time-decaying bloom filters for telemarketer detection. COMPUTER COMMUNICATION REVIEW, 41(5), 5-12.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_216759";s:6:"handle";s:11:"2108/104348";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:64:"On-demand time-decaying bloom filters for telemarketer detection";s:9:"metadata6";s:39:"Bianchi, G; D'Heureuse, N; Nuccolini, S";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:59;a:14:{s:9:"citazione";s:269:"Bianchi, G., Rajabi, H., & Sgorlon, M. (2011). Enabling conditional cross-domain data sharing via a cryptographic approach. In 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA 2011 - Conference Proceedings. IEEE.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_217185";s:6:"handle";s:11:"2108/104432";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:75:"Enabling conditional cross-domain data sharing via a cryptographic approach";s:9:"metadata6";s:33:"Bianchi, G; Rajabi, H; Sgorlon, M";s:9:"metadata7";s:26:"10.1109/IMSAA.2011.6156365";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:60;a:14:{s:9:"citazione";s:306:"Bracciale, L., Battaglino, D., Detti, A., Bianchi, G., Blefari Melazzi, N., Bragagnini, A., et al. (2011). Delay performance of a publish subscribe system deployed over a memory-constrained, delay tolerant network. In Ad Hoc Networking Workshop (Med-Hoc-Net), 2011 The 10th IFIP Annual Mediterranean. IEEE.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_221979";s:6:"handle";s:11:"2108/105247";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:106:"Delay performance of a publish subscribe system deployed over a memory-constrained, delay tolerant network";s:9:"metadata6";s:96:"Bracciale, L; Battaglino, D; Detti, A; Bianchi, G; Blefari Melazzi, N; Bragagnini, A; Turolla, M";s:9:"metadata7";s:50:"http://dx.doi.org/10.1109/Med-Hoc-Net.2011.5970489";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:61;a:14:{s:9:"citazione";s:264:"Niccolini, S., Huici, F., Trammell, B., Bianchi, G., & Ricciato, F. (2011). Building a decentralized, cooperative, and privacy-preserving monitoring system for trustworthiness: the approach of the EU FP7 DEMONS project. IEEE COMMUNICATIONS MAGAZINE, 49(11), 16-18.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_216757";s:6:"handle";s:11:"2108/104367";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:142:"Building a decentralized, cooperative, and privacy-preserving monitoring system for trustworthiness: the approach of the EU FP7 DEMONS project";s:9:"metadata6";s:60:"Niccolini, S; Huici, F; Trammell, B; Bianchi, G; Ricciato, F";s:9:"metadata7";s:25:"10.1109/MCOM.2011.6069700";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:62;a:14:{s:9:"citazione";s:190:"Pileggi, P., & Bianchi, G. (2011). Traffic-centric modeling of future wireless internet access technologies. In Proceedings of the 23rd International Teletraffic Congress (pp.302-303). IEEE.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_217147";s:6:"handle";s:11:"2108/104429";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:72:"Traffic-centric modeling of future wireless internet access technologies";s:9:"metadata6";s:22:"Pileggi, P; Bianchi, G";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:63;a:14:{s:9:"citazione";s:331:"Pontarelli, S., Teofili, S., & Bianchi G (2011). Hardware-Based on-the-fly Per-flow Scan Detector Pre-filter. In Hardware-Based “on-the-fly” Per-flow Scan Detector Pre-filter (Poster): Traffic Monitoring and Analysis: Third International Workshop, TMA 2011, Vienna, Austria, April 27, 2011. Proceedings (pp.181-184). Springer.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_217262";s:6:"handle";s:11:"2108/104470";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:59:"Hardware-Based on-the-fly Per-flow Scan Detector Pre-filter";s:9:"metadata6";s:36:"Pontarelli, S; Teofili, S; Bianchi G";s:9:"metadata7";s:28:"10.1007/978-3-642-20305-3_17";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:64;a:14:{s:9:"citazione";s:212:"Proto, F., Detti, A., Pisa, C., & Bianchi, G. (2011). A Framework for Packet-Droppers Mitigation in OLSR Wireless Community Networks. In IEEE International Conference on Communications (ICC), 2011 (pp.1-6). IEEE.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_194707";s:6:"handle";s:10:"2108/94897";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:78:"A Framework for Packet-Droppers Mitigation in OLSR Wireless Community Networks";s:9:"metadata6";s:39:"Proto, F; Detti, A; Pisa, C; Bianchi, G";s:9:"metadata7";s:24:"10.1109/icc.2011.5963001";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:65;a:14:{s:9:"citazione";s:266:"Trammell, B., Seedorf, J., & Bianchi, G. (2011). An architectural solution for data exchange in cooperative network security research. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (pp.103-104). ACM.";s:4:"data";s:4:"2011";s:2:"id";s:20:"PUBBLICAZIONE_217148";s:6:"handle";s:11:"2108/104428";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:84:"An architectural solution for data exchange in cooperative network security research";s:9:"metadata6";s:35:"Trammell, B; Seedorf, J; Bianchi, G";s:9:"metadata7";s:23:"10.1145/1978672.1978685";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:66;a:14:{s:9:"citazione";s:276:"Pontarelli, S., Greco, C., Nobile, E., Teofili, S., & Bianchi, G. (2010). Exploiting dynamic reconfiguration for fpga based network intrusion detection systems. In Field Programmable Logic and Applications (FPL), 2010 International Conference on. IEEE, 2010. (pp.10-14). IEEE.";s:4:"data";s:7:"2010-08";s:2:"id";s:20:"PUBBLICAZIONE_217264";s:6:"handle";s:11:"2108/104471";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:85:"Exploiting dynamic reconfiguration for fpga based network intrusion detection systems";s:9:"metadata6";s:58:"Pontarelli, S; Greco, C; Nobile, E; Teofili, S; Bianchi, G";s:9:"metadata7";s:19:"10.1109/FPL.2010.13";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:67;a:14:{s:9:"citazione";s:261:"Bianchi, G., Detti, A., Loreti, P., Pisa, C., Thakolsri, S., Kellerer, W., et al. (2010). Cross-layer H.264 scalable video downstream delivery over WLANs. In International symposium on a world of wireless mobile and multimedia networks (WoWMoM), 2010 (pp.1-9).";s:4:"data";s:10:"2010-06-14";s:2:"id";s:19:"PUBBLICAZIONE_54618";s:6:"handle";s:10:"2108/13672";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:63:"Cross-layer H.264 scalable video downstream delivery over WLANs";s:9:"metadata6";s:78:"Bianchi, G; Detti, A; Loreti, P; Pisa, C; Thakolsri, S; Kellerer, W; Widmer, J";s:9:"metadata7";s:27:"10.1109/WOWMOM.2010.5534890";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:68;a:14:{s:9:"citazione";s:163:"Bianchi, G., Boschi, E., Teofili, S., & Trammell, B. (2010). Measurement data reduction through variation rate metering. In Proceedings of IEEE Infocom 2010. IEEE.";s:4:"data";s:10:"2010-05-06";s:2:"id";s:19:"PUBBLICAZIONE_63974";s:6:"handle";s:10:"2108/23781";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:58:"Measurement data reduction through variation rate metering";s:9:"metadata6";s:46:"Bianchi, G; Boschi, E; Teofili, S; Trammell, B";s:9:"metadata7";s:27:"10.1109/INFCOM.2010.5462043";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:69;a:14:{s:9:"citazione";s:158:"Tinnirello, I., & Bianchi, G. (2010). Rethinking the IEEE 802.11e EDCA performance modelling methodology. IEEE-ACM TRANSACTIONS ON NETWORKING, 18(2), 540-553.";s:4:"data";s:10:"2010-04-12";s:2:"id";s:19:"PUBBLICAZIONE_63924";s:6:"handle";s:10:"2108/26097";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:66:"Rethinking the IEEE 802.11e EDCA performance modelling methodology";s:9:"metadata6";s:25:"Tinnirello, I; Bianchi, G";s:9:"metadata7";s:25:"10.1109/TNET.2009.2029101";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:70;a:14:{s:9:"citazione";s:181:"Detti, A., Caricato A, & Bianchi G (2010). Fairness-oriented overlay VPN topology construction. In IEEE International conference on telecommunications 2010 (ICT2010) (pp.658-665).";s:4:"data";s:10:"2010-04-04";s:2:"id";s:19:"PUBBLICAZIONE_54619";s:6:"handle";s:10:"2108/13664";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:51:"Fairness-oriented overlay VPN topology construction";s:9:"metadata6";s:31:"Detti, A; Caricato A; Bianchi G";s:9:"metadata7";s:26:"10.1109/ICTEL.2010.5478786";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:71;a:14:{s:9:"citazione";s:194:"Tinnirello, I., & Bianchi, G. (2010). Interference estimation in IEEE 802.11networks: a kalman filter approach for evaluating congestion in error-prone links. IEEE CONTROL SYSTEMS, 30(2), 30-43.";s:4:"data";s:10:"2010-03-25";s:2:"id";s:19:"PUBBLICAZIONE_63929";s:6:"handle";s:10:"2108/26090";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:119:"Interference estimation in IEEE 802.11networks: a kalman filter approach for evaluating congestion in error-prone links";s:9:"metadata6";s:25:"Tinnirello, I; Bianchi, G";s:9:"metadata7";s:23:"10.1109/MCS.2009.935570";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:72;a:14:{s:9:"citazione";s:191:"Tinnirello, I., Bianchi, G., & Xiao, Y. (2010). Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches. Vehicular Technology, IEEE Transactions on, 59(3), 1055-1067.";s:4:"data";s:10:"2010-03-15";s:2:"id";s:19:"PUBBLICAZIONE_63872";s:6:"handle";s:10:"2108/22999";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:80:"Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches";s:9:"metadata6";s:34:"Tinnirello, I; Bianchi, G; Xiao, Y";s:9:"metadata7";s:24:"10.1109/TVT.2009.2029118";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:73;a:14:{s:9:"citazione";s:241:"Bianchi, G., Blefari Melazzi, N., Bracciale, L., Lo Piccolo, F., & Salsano, S. (2010). Streamline: an optimal distribution algorithm for peer-to-peer real-time streaming. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 21(6), 857-871.";s:4:"data";s:4:"2010";s:2:"id";s:19:"PUBBLICAZIONE_30859";s:6:"handle";s:9:"2108/8796";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:63:"Settore ING-INF/05 - Sistemi di Elaborazione delle Informazioni";s:9:"metadata4";N;s:9:"metadata5";s:82:"Streamline: an optimal distribution algorithm for peer-to-peer real-time streaming";s:9:"metadata6";s:71:"Bianchi, G; Blefari Melazzi, N; Bracciale, L; Lo Piccolo, F; Salsano, S";s:9:"metadata7";s:21:"10.1109/TPDS.2009.114";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:74;a:14:{s:9:"citazione";s:270:"Bianchi, G., Capossele, A., Mei, A., & Petrioli, C. (2010). Flexible key exchange negotiation for wireless sensor networks. In Proceedings of the fifth ACM international workshop on Wireless network testbeds, experimental evaluation and characterization (pp.55-62). ACM.";s:4:"data";s:4:"2010";s:2:"id";s:20:"PUBBLICAZIONE_217266";s:6:"handle";s:11:"2108/104472";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:62:"Flexible key exchange negotiation for wireless sensor networks";s:9:"metadata6";s:45:"Bianchi, G; Capossele, A; Mei, A; Petrioli, C";s:9:"metadata7";s:23:"10.1145/1860079.1860090";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:75;a:14:{s:9:"citazione";s:181:"Bianchi, G., Teofili, S., Boschi, E., Trammell, B., & Greco, C. (2010). Scalable and fast approximate excess rate detection. In 2010 Future Network and Mobile Summit (pp.1-9). IEEE.";s:4:"data";s:4:"2010";s:2:"id";s:20:"PUBBLICAZIONE_217186";s:6:"handle";s:11:"2108/104431";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:51:"Scalable and fast approximate excess rate detection";s:9:"metadata6";s:56:"Bianchi, G; Teofili, S; Boschi, E; Trammell, B; Greco, C";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:76;a:14:{s:9:"citazione";s:253:"Bianchi, G., Wolkerstorfer, J., Teofili, S., Gojmerac, I., & Jung, O. (2010). Feasibility of Wire-Speed Hardware-based Conditional Per-flow Encryption for On-the-Fly Protection of Monitored Traffic. In Future Network & Mobile Summit 2010 (pp.1-9). IEEE.";s:4:"data";s:4:"2010";s:2:"id";s:20:"PUBBLICAZIONE_216769";s:6:"handle";s:11:"2108/104430";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:119:"Feasibility of Wire-Speed Hardware-based Conditional Per-flow Encryption for On-the-Fly Protection of Monitored Traffic";s:9:"metadata6";s:62:"Bianchi, G; Wolkerstorfer, J; Teofili, S; Gojmerac, I; Jung, O";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:77;a:14:{s:9:"citazione";s:276:"Bianchi, G., Detti, A., Loreti, P., Pisa, C., Proto, F.S., Kellerer, W., et al. (2009). Application-aware H. 264 scalable video coding delivery over wireless LAN: experimental assessment. In Cross Layer Design, 2009. IWCLD '09. Second International Workshop on (pp.1-6). IEEE.";s:4:"data";s:7:"2009-06";s:2:"id";s:20:"PUBBLICAZIONE_216141";s:6:"handle";s:11:"2108/104072";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:98:"Application-aware H. 264 scalable video coding delivery over wireless LAN: experimental assessment";s:9:"metadata6";s:89:"Bianchi, G; Detti, A; Loreti, P; Pisa, C; Proto, FS; Kellerer, W; Thakolsri, S; Widmer, J";s:9:"metadata7";s:26:"10.1109/IWCLD.2009.5156512";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:78;a:14:{s:9:"citazione";s:219:"Giustiniano, D., Tinnirello, I., Scalia, L., & Bianchi, G. (2009). On the side-effects of proprietary solutions for fading and interference mitigations in IEEE 802.11b/g outdoor links. COMPUTER NETWORKS, 53(2), 141-152.";s:4:"data";s:7:"2009-02";s:2:"id";s:19:"PUBBLICAZIONE_81868";s:6:"handle";s:10:"2108/26157";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:116:"On the side-effects of proprietary solutions for fading and interference mitigations in IEEE 802.11b/g outdoor links";s:9:"metadata6";s:52:"Giustiniano, D; Tinnirello, I; Scalia, L; Bianchi, G";s:9:"metadata7";s:28:"10.1016/j.comnet.2008.10.006";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:79;a:14:{s:9:"citazione";s:307:"Bianchi, G., Blefari Melazzi, N., Bracciale, L., Lo Piccolo, & Salsano S (2009). Fundamental delay bounds in peer-to-peer chunk-based real-time streaming systems. In 21st International Teletraffic Congress, ITC 21: Traffic and Performance Issues in Networks of the Future - Final Programme (pp.1-8). IEEE.";s:4:"data";s:4:"2009";s:2:"id";s:20:"PUBBLICAZIONE_189660";s:6:"handle";s:10:"2108/94460";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:80:"Fundamental delay bounds in peer-to-peer chunk-based real-time streaming systems";s:9:"metadata6";s:67:"Bianchi, G; Blefari Melazzi, N; Bracciale, L; Lo Piccolo; Salsano S";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:80;a:14:{s:9:"citazione";s:255:"Detti, A., Bianchi, G., Pisa, C., Proto, F., Loreti, P., Kellerer, W., et al. (2009). SVEF: an open-source experimental evaluation framework for H.264 scalable video streaming. In IEEE Symposium on computers and communications, 2009. ISCC 2009 (pp.36-41).";s:4:"data";s:4:"2009";s:2:"id";s:20:"PUBBLICAZIONE_100967";s:6:"handle";s:10:"2108/38450";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:89:"SVEF: an open-source experimental evaluation framework for H.264 scalable video streaming";s:9:"metadata6";s:88:"Detti, A; Bianchi, G; Pisa, C; Proto, F; Loreti, P; Kellerer, W; Thakolsri, S; Widmer, J";s:9:"metadata7";s:25:"10.1109/ISCC.2009.5202390";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:81;a:14:{s:9:"citazione";s:195:"Rao, S., Khavtasi, S., Bianchi, G., Teofili, S., Procissi, G., Di Pietro, A., et al. (2009). Privacy-Preserving Network Monitoring Architecture for the Future Internet. In ICT Mobile Summit 2009.";s:4:"data";s:4:"2009";s:2:"id";s:20:"PUBBLICAZIONE_217282";s:6:"handle";s:11:"2108/104473";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:74:"Privacy-Preserving Network Monitoring Architecture for the Future Internet";s:9:"metadata6";s:160:"Rao, S; Khavtasi, S; Bianchi, G; Teofili, S; Procissi, G; Di Pietro, A; Gojmerac, I; Hyytia, E; Borschi, E; Trammell, B; Lioudakis, G; Strohmeyer, F; Schmoll, C";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:82;a:14:{s:9:"citazione";s:166:"Bianchi, G., Bonola, M., Falletta, V., Proto, F., & Teofili, S. (2008). The SPARTA pseudonym and authorization system. SCIENCE OF COMPUTER PROGRAMMING, 197(2), 57-71.";s:4:"data";s:10:"2008-02-22";s:2:"id";s:19:"PUBBLICAZIONE_21287";s:6:"handle";s:10:"2108/26087";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:45:"The SPARTA pseudonym and authorization system";s:9:"metadata6";s:56:"Bianchi, G; Bonola, M; Falletta, V; Proto, F; Teofili, S";s:9:"metadata7";s:27:"10.1016/j.scico.2008.09.010";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:83;a:14:{s:9:"citazione";s:186:"Bianchi, G., Boschi, E., Gaudino, F., Koutsoloukas, L., Lioudakis, G., Rao, S., et al. (2008). Privacy-Preserving Network Monitoring: Challenges and Solutions. In ICT Mobile Summit 2008.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216776";s:6:"handle";s:11:"2108/104468";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:63:"Privacy-Preserving Network Monitoring: Challenges and Solutions";s:9:"metadata6";s:112:"Bianchi, G; Boschi, E; Gaudino, F; Koutsoloukas, L; Lioudakis, G; Rao, S; Ricciato, F; Schmoll, C; Strohmeier, F";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:84;a:14:{s:9:"citazione";s:214:"Bianchi, G., Giustiniano, D., Scalia L, & Tinnirello, I. (2008). Vendor-affected, WLAN experimental results: a Pandora's box?. In International workshop on Multiple Access Communication, MACOM 2008 (pp.1-6). IEEE.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216775";s:6:"handle";s:11:"2108/104427";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:60:"Vendor-affected, WLAN experimental results: a Pandora's box?";s:9:"metadata6";s:51:"Bianchi, G; Giustiniano, D; Scalia L; Tinnirello, I";s:9:"metadata7";s:26:"10.1109/ICTEL.2008.4652713";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:85;a:14:{s:9:"citazione";s:264:"Bianchi, G., Teofili, S., & Pomposini, M. (2008). New directions in privacy-preserving anomaly detection for network traffic. In Conference on Computer and Communications Security - Proceedings of the 1st ACM workshop on Network data anonymization (pp.11-18). ACM.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216778";s:6:"handle";s:11:"2108/104407";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:74:"New directions in privacy-preserving anomaly detection for network traffic";s:9:"metadata6";s:36:"Bianchi, G; Teofili, S; Pomposini, M";s:9:"metadata7";s:23:"10.1145/1456441.1456446";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:86;a:14:{s:9:"citazione";s:292:"Bracciale, L., Lo Piccolo, F., Luzzi, D., Salsano, S., Bianchi, G., & Blefari Melazzi, N. (2008). A push-based scheduling algorithm for large scale P2P live streaming. In 4th International telecommunication networking workshop on QoS in multiservice IP networks, 2008. IT-NEWS 2008. (pp.1-7).";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_101255";s:6:"handle";s:10:"2108/38998";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:68:"A push-based scheduling algorithm for large scale P2P live streaming";s:9:"metadata6";s:81:"Bracciale, L; Lo Piccolo, F; Luzzi, D; Salsano, S; Bianchi, G; Blefari Melazzi, N";s:9:"metadata7";s:45:"http://dx.doi.org/10.1109/ITNEWS.2008.4488121";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:87;a:14:{s:9:"citazione";s:256:"Bracciale, L., Luzzi, D., Lo Piccolo, F., Blefari Melazzi, N., Bianchi, G., & Salsano, S. (2008). A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming. In IEEE global telecommunications conference, 2008. IEEE GLOBECOM 2008. (pp.1-6).";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_101254";s:6:"handle";s:10:"2108/39004";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:75:"A Theory-Driven Distribution Algorithm for Peer-to-Peer Real Time Streaming";s:9:"metadata6";s:81:"Bracciale, L; Luzzi, D; Lo Piccolo, F; Blefari Melazzi, N; Bianchi, G; Salsano, S";s:9:"metadata7";s:45:"http://dx.doi.org/10.1109/GLOCOM.2008.ECP.441";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:88;a:14:{s:9:"citazione";s:124:"Falletta, V., Proto, S., Teofili, S., & Bianchi, G. (2008). Privacy-Aware Accounting and Billing. In ICT Mobile Summit 2008.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216777";s:6:"handle";s:11:"2108/104469";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:36:"Privacy-Aware Accounting and Billing";s:9:"metadata6";s:45:"Falletta, V; Proto, S; Teofili, S; Bianchi, G";s:9:"metadata7";N;s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:89;a:14:{s:9:"citazione";s:230:"Giustiniano, D., Bianchi, G., Scalia, L., & Tinnirello, I. (2008). An explanation for unexpected 802.11 outdoor link-level measurement results. In 27th Conference on Computer Communications. IEEE INFOCOM 2008 (pp.2432-2440). IEEE.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216774";s:6:"handle";s:11:"2108/104467";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:75:"An explanation for unexpected 802.11 outdoor link-level measurement results";s:9:"metadata6";s:52:"Giustiniano, D; Bianchi, G; Scalia, L; Tinnirello, I";s:9:"metadata7";s:24:"10.1109/INFOCOM.2008.313";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:90;a:14:{s:9:"citazione";s:423:"Kiraly, C., Teofili, S., Bianchi, G., Lo Cigno, R., Nardelli, M., & Delzeri, E. (2008). Traffic Flow Confidentiality in IPsec: Protocol and Implementation. In The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4–10, 2007 (pp.311-324). Springer.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216772";s:6:"handle";s:11:"2108/104447";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:66:"Traffic Flow Confidentiality in IPsec: Protocol and Implementation";s:9:"metadata6";s:71:"Kiraly, C; Teofili, S; Bianchi, G; Lo Cigno, R; Nardelli, M; Delzeri, E";s:9:"metadata7";s:28:"10.1007/978-0-387-79026-8_22";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:91;a:14:{s:9:"citazione";s:234:"TEOFILI, S., M, D., BASILE, C., BIANCHI, G., SALSANO, S., & ZUGENMAIER, A. (2008). User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS). SECURITY AND COMMUNICATION NETWORKS, 1(6), 473-485.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216592";s:6:"handle";s:11:"2108/104208";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:98:"User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)";s:9:"metadata6";s:66:"TEOFILI, S; M, D; BASILE, C; BIANCHI, G; SALSANO, S; ZUGENMAIER, A";s:9:"metadata7";s:14:"10.1002/sec.73";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:92;a:14:{s:9:"citazione";s:311:"Teofili, S., Di Mascolo, M., Basile, C., Bianchi, G., Salsano, S., & Zugenmaier, A. (2008). User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS). In Communications and Networking in China, 2008. ChinaCom 2008. Third International Conference on (pp.1264-1269). IEEE.";s:4:"data";s:4:"2008";s:2:"id";s:20:"PUBBLICAZIONE_216594";s:6:"handle";s:11:"2108/104227";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:98:"User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)";s:9:"metadata6";s:75:"Teofili, S; Di Mascolo, M; Basile, C; Bianchi, G; Salsano, S; Zugenmaier, A";s:9:"metadata7";s:29:"10.1109/CHINACOM.2008.4685257";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:93;a:14:{s:9:"citazione";s:303:"Bianchi, G., Di Stefano, A., Giaconia, C., Scalia, L., Terrazzino, G., & Tinnirello, I. (2007). Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE (pp.1181-1189). NEW YORK : IEEE.";s:4:"data";s:4:"2007";s:2:"id";s:19:"PUBBLICAZIONE_20203";s:6:"handle";s:10:"2108/26154";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:88:"Experimental assessment of the backoff behavior of commercial IEEE 802.11b network cards";s:9:"metadata6";s:79:"Bianchi, G; Di Stefano, A; Giaconia, C; Scalia, L; Terrazzino, G; Tinnirello, I";s:9:"metadata7";s:23:"10.1109/INFCOM.2007.141";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:94;a:14:{s:9:"citazione";s:184:"Tantra, J.W., Foh, C.H., Tinnirello, I., & Bianchi, G. (2007). Out-of-band signaling scheme for high speed wireless LANs. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 6(9), 3256-3267.";s:4:"data";s:4:"2007";s:2:"id";s:19:"PUBBLICAZIONE_14097";s:6:"handle";s:10:"2108/26151";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:57:"Out-of-band signaling scheme for high speed wireless LANs";s:9:"metadata6";s:47:"Tantra, J W; Foh, CH; Tinnirello, I; Bianchi, G";s:9:"metadata7";s:22:"10.1109/TWC.2007.06029";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:95;a:14:{s:9:"citazione";s:215:"Lo Piccolo, F., Blefari Melazzi, N., & Bianchi G (2006). RELAX: REaL time transmission of flight information and blAck boXes data. In International workshop on satellite and space communications, 2006 (pp.217-221).";s:4:"data";s:4:"2006";s:2:"id";s:20:"PUBBLICAZIONE_101253";s:6:"handle";s:10:"2108/39007";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:72:"RELAX: REaL time transmission of flight information and blAck boXes data";s:9:"metadata6";s:44:"Lo Piccolo, F; Blefari Melazzi, N; Bianchi G";s:9:"metadata7";s:43:"http://dx.doi.org/10.1109/IWSSC.2006.256028";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:96;a:14:{s:9:"citazione";s:130:"Bianchi, G., & Tinnirello, I. (2005). Remarks on IEEE 802.11 DCF performance analysis. IEEE COMMUNICATIONS LETTERS, 9(8), 765-767.";s:4:"data";s:4:"2005";s:2:"id";s:18:"PUBBLICAZIONE_3099";s:6:"handle";s:10:"2108/26149";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:47:"Remarks on IEEE 802.11 DCF performance analysis";s:9:"metadata6";s:25:"Bianchi, G; Tinnirello, I";s:9:"metadata7";s:26:"10.1109/LCOMM.2005.1496609";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:97;a:14:{s:9:"citazione";s:193:"Bianchi, G., Tinnirello, I., & Scalia, L. (2005). Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations. IEEE NETWORK, 19(4), 28-34.";s:4:"data";s:4:"2005";s:2:"id";s:17:"PUBBLICAZIONE_418";s:6:"handle";s:10:"2108/26110";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:114:"Understanding 802.11e contention-based prioritization mechanisms and their coexistence with legacy 802.11 stations";s:9:"metadata6";s:36:"Bianchi, G; Tinnirello, I; Scalia, L";s:9:"metadata7";s:25:"10.1109/MNET.2005.1470680";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:98;a:14:{s:9:"citazione";s:245:"Di Stefano, A., Scaglione, A., Terrazzino, G., Tinnirello, I., Ammirata, V., Scalia, L., et al. (2005). On the Fidelity of IEEE 802.11 commercial cards. In Proceedings - First International Conference on Wireless Internet, WICON 2005 (pp.10-17).";s:4:"data";s:4:"2005";s:2:"id";s:18:"PUBBLICAZIONE_1091";s:6:"handle";s:10:"2108/26104";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:47:"On the Fidelity of IEEE 802.11 commercial cards";s:9:"metadata6";s:106:"Di Stefano, A; Scaglione, A; Terrazzino, G; Tinnirello, I; Ammirata, V; Scalia, L; Bianchi, G; Giaconia, C";s:9:"metadata7";s:21:"10.1109/WICON.2005.23";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:99;a:14:{s:9:"citazione";s:206:"Mancuso, V., Bianchi, G., Blefari Melazzi, N., & Birnbacher, U. (2005). Switched ethernet networking over LEO satellite. In 2nd International symposium on wireless communication systems, 2005. (pp.883-887).";s:4:"data";s:4:"2005";s:2:"id";s:20:"PUBBLICAZIONE_101256";s:6:"handle";s:10:"2108/38996";s:9:"metadata1";s:21:"Intervento a convegno";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:47:"Switched ethernet networking over LEO satellite";s:9:"metadata6";s:57:"Mancuso, V; Bianchi, G; Blefari Melazzi, N; Birnbacher, U";s:9:"metadata7";s:44:"http://dx.doi.org/10.1109/ISWCS.2005.1547838";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:100;a:14:{s:9:"citazione";s:148:"Mancuso, V., & Bianchi, G. (2004). Streaming for vehicular users via elastic proxy buffer management. IEEE COMMUNICATIONS MAGAZINE, 42(11), 144-152.";s:4:"data";s:4:"2004";s:2:"id";s:19:"PUBBLICAZIONE_19300";s:6:"handle";s:10:"2108/26160";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:65:"Streaming for vehicular users via elastic proxy buffer management";s:9:"metadata6";s:22:"Mancuso, V; Bianchi, G";s:9:"metadata7";s:25:"10.1109/MCOM.2004.1362558";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:101;a:14:{s:9:"citazione";s:185:"Bianchi, G., Blefari Melazzi, N., Bonafede, G., & Tintinelli, E. (2003). QUASIMODO: quality of service-aware multicasting over DiffServ and overlay networks. IEEE NETWORK, 17(1), 38-45.";s:4:"data";s:4:"2003";s:2:"id";s:19:"PUBBLICAZIONE_76602";s:6:"handle";s:10:"2108/50965";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:83:"QUASIMODO: quality of service-aware multicasting over DiffServ and overlay networks";s:9:"metadata6";s:58:"Bianchi, G; Blefari Melazzi, N; Bonafede, G; Tintinelli, E";s:9:"metadata7";s:25:"10.1109/MNET.2003.1174176";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:102;a:14:{s:9:"citazione";s:234:"Bianchi, G., Blefari Melazzi, N., Chan, P., Holzbock, M., Hu, Y., Jahn, A., et al. (2003). Design and Validation of QoS Aware Mobile Internet Access Procedures for Heterogeneous Networks. MOBILE NETWORKS AND APPLICATIONS, 8(1), 11-25.";s:4:"data";s:4:"2003";s:2:"id";s:19:"PUBBLICAZIONE_76604";s:6:"handle";s:10:"2108/50966";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:95:"Design and Validation of QoS Aware Mobile Internet Access Procedures for Heterogeneous Networks";s:9:"metadata6";s:80:"Bianchi, G; Blefari Melazzi, N; Chan, P; Holzbock, M; Hu, Y; Jahn, A; Sheriff, R";s:9:"metadata7";s:23:"10.1023/A:1021163526385";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:103;a:14:{s:9:"citazione";s:164:"Bianchi, G., Blefari Melazzi, N., & Femminella M. (2002). Per-flow QoS support over a stateless Differentiated Services IP domain. COMPUTER NETWORKS, 40(1), 73-87.";s:4:"data";s:4:"2002";s:2:"id";s:19:"PUBBLICAZIONE_76599";s:6:"handle";s:10:"2108/50963";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:71:"Per-flow QoS support over a stateless Differentiated Services IP domain";s:9:"metadata6";s:45:"Bianchi, G; Blefari Melazzi, N; Femminella M.";s:9:"metadata7";s:29:"10.1016/S1389-1286(02)00267-0";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}i:104;a:14:{s:9:"citazione";s:160:"Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 18(3), 535-547.";s:4:"data";s:4:"2000";s:2:"id";s:20:"PUBBLICAZIONE_216844";s:6:"handle";s:11:"2108/104368";s:9:"metadata1";s:19:"Articolo su rivista";s:9:"metadata2";N;s:9:"metadata3";s:38:"Settore ING-INF/03 - Telecomunicazioni";s:9:"metadata4";N;s:9:"metadata5";s:73:"Performance analysis of the IEEE 802.11 distributed coordination function";s:9:"metadata6";s:10:"Bianchi, G";s:9:"metadata7";s:17:"10.1109/49.840210";s:9:"metadata8";N;s:9:"metadata9";N;s:10:"metadata10";N;}}" } ["meta_keywords"]=> array(1) { [0]=> string(1) "," } ["reserved"]=> array(1) { [0]=> string(1) "0" } ["auth_ip"]=> array(1) { [0]=> string(1) "0" } } ["_fieldBoosts":protected]=> array(6) { ["content_id"]=> bool(false) ["content_title"]=> bool(false) ["description"]=> bool(false) ["meta_keywords"]=> bool(false) ["reserved"]=> bool(false) ["auth_ip"]=> bool(false) } } }