Nome |
# |
An Analysis of Features and Tendencies in Mobile Banking Apps, file e2f56ed3-f056-3eaf-e053-3a05fe0a5d97
|
997
|
Identification of critical habitat corridor patches by cut node ranking, file e2f56ed7-3e32-3eaf-e053-3a05fe0a5d97
|
680
|
Graph models of network behavior in environmental planning, file e2f56ed5-4d55-3eaf-e053-3a05fe0a5d97
|
637
|
Recommendation in persuasive eHealth systems: An effective strategy to spot users' losing motivation to exercise, file e2f56ed7-d53d-3eaf-e053-3a05fe0a5d97
|
588
|
A design pattern for multimodal and multidevice user interfaces, file e2f56ed5-8d45-3eaf-e053-3a05fe0a5d97
|
501
|
Modeling and extending ecological networks using land similarity, file e2f56ed6-8e3b-3eaf-e053-3a05fe0a5d97
|
427
|
Fair Voice Biometrics: Impact of Demographic Imbalance on Group Fairness in Speaker Recognition, file e2f56eda-4b9d-3eaf-e053-3a05fe0a5d97
|
345
|
Connectivity analysis of ecological landscape networks by cut node ranking, file e2f56ed7-e831-3eaf-e053-3a05fe0a5d97
|
341
|
Topological and conceptual complex network models for environmental planning, file e2f56ed5-0d51-3eaf-e053-3a05fe0a5d97
|
291
|
Learning analytics tool for usability assessment in Moodle environments, file e2f56ed6-db2a-3eaf-e053-3a05fe0a5d97
|
267
|
Preface, file e2f56ed6-b873-3eaf-e053-3a05fe0a5d97
|
264
|
A model of assessment of collateral damage on power grids based on complex network theory, file e2f56ed6-b2d5-3eaf-e053-3a05fe0a5d97
|
247
|
Design criteria to model groups in big data scenarios: algorithms and best practices, file e2f56ed4-d516-3eaf-e053-3a05fe0a5d97
|
234
|
Modelli funzionali delle reti ecologiche: dal particolare al generale, file e2f56ed6-25bc-3eaf-e053-3a05fe0a5d97
|
213
|
Internet of entities (IoE): A blockchain-based distributed paradigm for data exchange between wireless-based devices, file e2f56ed8-0e43-3eaf-e053-3a05fe0a5d97
|
160
|
Enriching Data Lakes with Knowledge Graphs, file 209414ed-ffe4-41bd-adc8-03335623ebc9
|
153
|
Functional models and extending strategies for ecological networks, file e2f56ed6-9d6b-3eaf-e053-3a05fe0a5d97
|
146
|
Il progetto DISCENTIA: UniCa per la didattica universitaria, file e2f56ed9-d713-3eaf-e053-3a05fe0a5d97
|
95
|
AveroBot: An audio-visual dataset for people re-identification and verification in human-robot interaction, file e2f56eda-5061-3eaf-e053-3a05fe0a5d97
|
82
|
Equality of Learning Opportunity via Individual Fairness in Personalized Recommendations, file e2f56eda-694c-3eaf-e053-3a05fe0a5d97
|
57
|
Interplay between upsampling and regularization for provider fairness in recommender systems, file e2f56eda-2e1e-3eaf-e053-3a05fe0a5d97
|
49
|
Deep attention-based model for helpfulness prediction of healthcare online reviews, file e2f56ed9-7ac9-3eaf-e053-3a05fe0a5d97
|
43
|
Recommendation centre: inspecting and controlling recommendations with radial layouts, file e2f56ed6-b39a-3eaf-e053-3a05fe0a5d97
|
41
|
Recency, Popularity, and Diversity of Explanations in Knowledge-based Recommendation, file 6f34e771-fdfe-4ac9-a058-6489ee9f6cd2
|
36
|
Influencing brain waves by evoked potentials as biometric approach: taking stock of the last six years of research, file 8bb93c3a-55ba-4a00-881c-566a061c6116
|
24
|
Evaluation framework for context-aware speaker recognition in noisy smart living environments, file e2f56eda-30b7-3eaf-e053-3a05fe0a5d97
|
23
|
XRecSys: A framework for path reasoning quality in explainable recommendation, file a022e527-2552-4aa9-833a-41c1d875267f
|
22
|
A blockchain-based distributed paradigm to secure localization services, file e2f56eda-8477-3eaf-e053-3a05fe0a5d97
|
21
|
Reinforcement recommendation reasoning through knowledge graphs for explanation path quality, file b158d409-9b09-45e2-96f5-a970d6984c1c
|
17
|
Towards Explainable Educational Recommendation through Path Reasoning Methods, file e1fb390e-b998-4372-9cce-cb9e76ff3d36
|
16
|
Guest Editorial of the FGCS Special Issue on Advances in Intelligent Systems for Online Education, file f387d337-cb17-4911-9bb9-46dab1ab001c
|
13
|
Experts’ View on Challenges and Needs for Fairness in Artificial Intelligence for Education, file 3edbdab4-95eb-4283-838b-0aea06058193
|
9
|
A Region-based Training Data Segmentation Strategy to Credit Scoring, file 438dcd96-ab64-4561-ae54-bfde73127a02
|
7
|
Regulating Group Exposure for Item Providers in Recommendation, file 54c01b6f-4713-416a-a980-28aa98f2012c
|
7
|
Semantics-aware content-based recommender systems: Design and architecture guidelines, file e2f56ed6-af5a-3eaf-e053-3a05fe0a5d97
|
7
|
Bridging learning analytics and Cognitive Computing for Big Data classification in micro-learning video collections, file e2f56ed7-3567-3eaf-e053-3a05fe0a5d97
|
7
|
Fraud detection for E-commerce transactions by employing a prudential Multiple Consensus model, file e2f56ed7-f38a-3eaf-e053-3a05fe0a5d97
|
7
|
The effect of algorithmic bias on recommender systems for massive open online courses, file e2f56ed9-5f33-3eaf-e053-3a05fe0a5d97
|
7
|
Leveraging the Training Data Partitioning to Improve Events Characterization in Intrusion Detection Systems, file e91fe897-ef1a-4f6d-9251-12507b2a5f69
|
7
|
The More Secure, the Less Equally Usable: Gender and Ethnicity (Un)fairness of Deep Face Recognition along Security Thresholds, file a28625e2-15c3-407f-967b-3cf289a75211
|
6
|
A search engine to categorize LOs, file e2f56ed6-bb7c-3eaf-e053-3a05fe0a5d97
|
6
|
Leveraging cognitive computing for multi-class classification of e-learning videos, file e2f56ed6-f4a2-3eaf-e053-3a05fe0a5d97
|
6
|
PhysioUnicaDB: a dataset of EEG and ECG simultaneously acquired, file e2f56ed7-4db2-3eaf-e053-3a05fe0a5d97
|
6
|
Post Processing Recommender Systems with Knowledge Graphs for Recency, Popularity, and Diversity of Explanations, file 76a90ddd-3547-4f19-9a02-a48b0e64819d
|
5
|
Reconstructing user's attention on the web through mouse movements and perception-based content identification, file e2f56ed5-9047-3eaf-e053-3a05fe0a5d97
|
5
|
null, file e2f56ed6-ae3a-3eaf-e053-3a05fe0a5d97
|
5
|
Evaluating complex network indices for vulnerability analysis of a territorial power grid, file e2f56ed6-b26c-3eaf-e053-3a05fe0a5d97
|
5
|
A multi-biometric system for continuous student authentication in e-learning platforms, file e2f56ed6-b907-3eaf-e053-3a05fe0a5d97
|
5
|
Leveraging continuous multi-modal authentication for access control in mobile cloud environments, file e2f56ed7-35f5-3eaf-e053-3a05fe0a5d97
|
5
|
Combining mitigation treatments against biases in personalized rankings: use case on item popularity, file e2f56eda-69c8-3eaf-e053-3a05fe0a5d97
|
5
|
Fully-automated deep learning pipeline for segmentation and classification of breast ultrasound images, file faf558df-c685-4b47-a58c-fd2abf29f76c
|
5
|
Demographic Fairness in Multimodal Biometrics: A Comparative Analysis on Audio-Visual Speaker Recognition Systems, file 73c61c34-f469-458d-8ea3-cc34ae31e25a
|
4
|
Consumer Fairness in Recommender Systems: Contextualizing Definitions and Mitigations, file 9905f204-d86a-4815-91b4-182d7a183e36
|
4
|
Modeling user interactions for conversion rate prediction in M-Commerce, file e2f56ed4-cc8e-3eaf-e053-3a05fe0a5d97
|
4
|
A mobile application for leaf detection in complex background using saliency maps, file e2f56ed5-7799-3eaf-e053-3a05fe0a5d97
|
4
|
A land similarity approach to modeling complex ecological networks, file e2f56ed6-192a-3eaf-e053-3a05fe0a5d97
|
4
|
Discovery and representation of the preferences of automatically detected groups: Exploiting the link between group modeling and clustering, file e2f56ed6-b486-3eaf-e053-3a05fe0a5d97
|
4
|
The urinary metabolomics profile of an Italian autistic children population and their unaffected siblings, file e2f56ed6-b570-3eaf-e053-3a05fe0a5d97
|
4
|
Using neural word embeddings to model user behavior and detect user segments, file e2f56ed6-b8ad-3eaf-e053-3a05fe0a5d97
|
4
|
null, file e2f56ed6-bf4a-3eaf-e053-3a05fe0a5d97
|
4
|
COCO: Semantic-enriched collection of online courses at scale with experimental use cases, file e2f56ed7-b772-3eaf-e053-3a05fe0a5d97
|
4
|
A discretized extended feature space (DEFS) model to improve the anomaly detection performance in network intrusion detection systems, file e2f56ed8-d4ca-3eaf-e053-3a05fe0a5d97
|
4
|
Connecting user and item perspectives in popularity debiasing for collaborative recommendation, file e2f56ed9-a3a0-3eaf-e053-3a05fe0a5d97
|
4
|
Adversarial optimization for dictionary attacks on speaker verification, file e2f56eda-694d-3eaf-e053-3a05fe0a5d97
|
4
|
Hands on Explainable Recommender Systems with Knowledge Graphs, file 1d877280-c83c-45a8-87ab-e524e93c532d
|
3
|
Practical perspectives of consumer fairness in recommendation, file 68aa5c27-4196-45ab-a4ba-668e856d5eaa
|
3
|
Consumer Fairness Benchmark in Recommendation, file 8566f79a-a6b9-4427-bc88-9a557b4675cc
|
3
|
Guest Editorial of the FGCS Special Issue on Advances in Intelligent Systems for Online Education, file e0f667a9-ade5-4d84-9096-b04ff76c719e
|
3
|
Experiences from a long run with a virtual personal trainer, file e2f56ed4-20e9-3eaf-e053-3a05fe0a5d97
|
3
|
GestIT: a declarative and compositional framework for multiplatform gesture definition, file e2f56ed4-20f5-3eaf-e053-3a05fe0a5d97
|
3
|
Complex network based approaches to enable software-aided management and planning, file e2f56ed5-66a0-3eaf-e053-3a05fe0a5d97
|
3
|
Influence of rating prediction on group recommendation's accuracy, file e2f56ed6-ae39-3eaf-e053-3a05fe0a5d97
|
3
|
Binary sieves: Toward a semantic approach to user segmentation for behavioral targeting, file e2f56ed6-b260-3eaf-e053-3a05fe0a5d97
|
3
|
Network-adaptive management of computation energy in wireless sensor networks, file e2f56ed6-bcd9-3eaf-e053-3a05fe0a5d97
|
3
|
Graph representations of site and species relations in ecological complex networks, file e2f56ed6-be0c-3eaf-e053-3a05fe0a5d97
|
3
|
Identification of the variables in an e-Learning platform using a cost-benefit analysis and an automatic decision-making tool, file e2f56ed6-c64f-3eaf-e053-3a05fe0a5d97
|
3
|
Exploiting cognitive computing and frame semantic features for biomedical document clustering, file e2f56ed6-f2ee-3eaf-e053-3a05fe0a5d97
|
3
|
Smart furniture and technologies for supporting distributed learning groups, file e2f56ed7-7285-3eaf-e053-3a05fe0a5d97
|
3
|
null, file e2f56ed7-b21b-3eaf-e053-3a05fe0a5d97
|
3
|
A wavelet-based data analysis to credit scoring, file e2f56ed8-13d6-3eaf-e053-3a05fe0a5d97
|
3
|
Iris Quality Assessment: A Statistical Approach for Biometric Security Applications, file e2f56ed8-957b-3eaf-e053-3a05fe0a5d97
|
3
|
A discretized enriched technique to enhance machine learning performance in credit scoring, file e2f56ed8-b686-3eaf-e053-3a05fe0a5d97
|
3
|
ILEARNTV: un ecosistema di conoscenza condivisa e produzione collaborativa per innovare la formazione = [ILEARNTV: an ecosystem of knowledge sharing and collaborative production to innovate training], file ff01e14a-5c18-4fb1-833d-e390473bbe01
|
3
|
Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach, file 92a6379d-cd69-469c-8d50-e84d881c2e6e
|
2
|
Reinforcement recommendation reasoning through knowledge graphs for explanation path quality, file b0abc42d-0c15-41bf-9b06-d2f0da397daa
|
2
|
Metodiche progettuali per Personal Learning Environments in ambiente Grid e Cloud Computing, file e2f56ed3-acca-3eaf-e053-3a05fe0a5d97
|
2
|
XESS, Sistema di Supporto alle Decisioni per la valutazione di soluzioni e-Learning, file e2f56ed3-ad39-3eaf-e053-3a05fe0a5d97
|
2
|
A wireless-based system for an interactive approach to medical parameters exchange, file e2f56ed3-b07c-3eaf-e053-3a05fe0a5d97
|
2
|
An analysis of native apps for mobile banking, file e2f56ed4-cd27-3eaf-e053-3a05fe0a5d97
|
2
|
The role of social interaction on users motivation to exercise: A persuasive web framework to enhance the self-management of a healthy lifestyle, file e2f56ed6-b39b-3eaf-e053-3a05fe0a5d97
|
2
|
UP SCHOOL: Introduction of pervasive learning technologies to enhance classic educational models, file e2f56ed6-b435-3eaf-e053-3a05fe0a5d97
|
2
|
Computer forensics investigation an approach to evidence in cyberspace, file e2f56ed6-b7d0-3eaf-e053-3a05fe0a5d97
|
2
|
Keep the beat: Audio guidance for runner training, file e2f56ed6-b912-3eaf-e053-3a05fe0a5d97
|
2
|
Performance analysis and grid computing on wide area, file e2f56ed6-bf48-3eaf-e053-3a05fe0a5d97
|
2
|
An optimized cost-benefit analysis for the evaluation in e-learning services, file e2f56ed6-c135-3eaf-e053-3a05fe0a5d97
|
2
|
Local vs global: intelligent local face recognition, file e2f56ed6-c208-3eaf-e053-3a05fe0a5d97
|
2
|
A Lightweight Mamdani Fuzzy Controller for Noise Removal on Iris Images, file e2f56ed7-ae73-3eaf-e053-3a05fe0a5d97
|
2
|
The ICO phenomenon and its relationships with Ethereum Smart Contract environment, file e2f56ed7-be66-3eaf-e053-3a05fe0a5d97
|
2
|
Continuous authentication on smartphone by means of periocular and virtual keystroke, file e2f56ed8-28c0-3eaf-e053-3a05fe0a5d97
|
2
|
Exploring Algorithmic Fairness in Deep Speaker Verification, file e2f56eda-6bef-3eaf-e053-3a05fe0a5d97
|
2
|
Totale |
7.295 |