Filtry
wszystkich: 292
-
Katalog
Wyniki wyszukiwania dla: SECURE ITALIAN DOMINATION
-
G|A|M|E: The Italian Journal of Game Studies
Czasopisma -
Aleksandra Parteka dr hab. inż.
OsobyAbout me: I am an associate professor and head of doctoral studies at the Faculty of Management and Economics, Gdansk University of Technology (GdanskTech, Poland). I got my MSc degree in Economics from Gdansk University of Technology (2003) and Universita’ Politecnica delle Marche (2005), as well as MA degree in Contemporary European Studies from Sussex University (2006, with distinction). I received my PhD in Economics...
-
International Conference on Algorithms and Complexity (was Italian Conference )
Konferencje -
ACM Workshop on Secure Web Services
Konferencje -
Italian Political Science Review-Rivista Italiana di Scienza Politica
Czasopisma -
Italy, an Extraordinary Commonplace? Stereotypes and Imaginaries of Italianness in Online Communication by Fashion Brands
PublikacjaThe paper explores the use of country-related stereotypes associated with Italian identity in the social media communication of 21 Italian fashion brands on Instagram. Focusing on the concept of “made in Italy”, the research employs image content analysis to identify how the selected sample of brands communicates Italian identity globally. The theoretical framework emphasizes the importance of the Country of Origin (COO) concept,...
-
On proper (1,2)‐dominating sets in graphs
PublikacjaIn 2008, Hedetniemi et al. introduced the concept of (1,)-domination and obtained some interesting results for (1,2) -domination. Obviously every (1,1) -dominating set of a graph (known as 2-dominating set) is (1,2) -dominating; to distinguish these concepts, we define a proper (1,2) -dominating set of a graph as follows: a subset is a proper (1,2) -dominating set of a graph if is (1,2) -dominating and it is not a (1,1) -dominating...
-
International Conference on Dependable, Autonomic and Secure Computing
Konferencje -
Paweł Lubomski dr inż.
OsobyAbsolwent Politechniki Gdańskiej. Po zebraniu doświadczeń jako analityk systemowy i biznesowy w dużych korporacjach IT wrócił na uczelnię, gdzie aktualnie pracuje na stanowisku Dyrektora Centrum Usług Informatycznych. Naukowo specjalizuje się w zagadnieniach bezpieczeństwa i niezawodności dużych rozproszonych systemów usługowych oraz budową bezpiecznych i wydajnych architektur IT, a także projektowania architektur chmurowych oraz...
-
Kacper Wereszko mgr inż.
OsobyKacper Wereszko uzyskał tytuł zawodowy magistra inżyniera w 2016 roku (kierunek: informatyka, specjalność: algorytmy i technologie internetowe), a od 2017 roku jest uczestnikiem studiów doktoranckich z dyscypliny Informatyka. Obecnie pracuje jako asystent w Katedrze Algorytmów i Modelowania Systemów. Jego zainteresowania badawcze obejmują badanie własności bezpieczeństwa w grafach, problemy dominowania w grafach oraz ich praktyczne...
-
À la recherche de l’industrie perdue. La désindustrialisation en Italie entre débat public, réalité économique et fragilités structurelles du pays
PublikacjaThe paper outilines the main aspects of the public debate about Italian deindustrialization in the last 30 years
-
L'Italie. Gagner à tout prix. L'industrie de l'armenent italien pendant la Grande Guerre
PublikacjaThe chapter outlines the economic and technological transformations of the Italian armament industry during the First World War
-
angielski
PublikacjaA subset D of V (G) is a dominating set of a graph G if every vertex of V (G) − D has at least one neighbour in D; let the domination number γ(G) be the minimum cardinality among all dominating sets in G. We say that a graph G is γ-q-critical if subdividing any q edges results in a graph with domination number greater than γ(G) and there exists a set of q − 1 edges such that subdividing these edges results in a graph with domination...
-
Unités phraséologiques au pays de la traduction: transfert des collocations nomino-adjectivales avec le lexème «femme» dans la traduction de la littérature houellebecquienne du français vers l’italien et le polonais
PublikacjaThe present paper examines the transfer of nomino-adjectival collocations based on the word ‘femme’ (‘woman’) in the literary translation from French into Italian and Polish. The lexical connection analysed in the article can be defined as the habitual juxtaposition of a word with another word (or words) that has a significant frequency in a given language. The research corpus comprises seven Michel Houellebecq’s novels written...
-
Bondage number of grid graphs
PublikacjaThe bondage number b(G) of a nonempty graph G is the cardinality of a smallest set of edges whose removal from G results in a graph with domination number greater than the domination number of G. Here we study the bondage number of some grid-like graphs. In this sense, we obtain some bounds or exact values of the bondage number of some strong product and direct product of two paths.
-
Le reti della terza Italia.Imprese, calcio, sponsirzzazioni e territorio in Serie B 81982-2006)
PublikacjaIl capitolo si occupa dei rapporti tra imprese e sponsirzzazioni dei club calcistici italiani della serie B tra il 1982 e il 2006
-
Wiktor Sieklicki dr inż.
OsobyTytuł magistra oraz inżyniera uzyskał w specjalności Automatyka i Robotyka w Katedrze Mechaniki i Wytrzymałości Materiałów Wydziału Mechanicznego Politechniki Gdańskiej (2006). Tytuł doktora nauk technicznych w dyscyplinie Budowa Maszyn uzyskał w 2010 roku na Wydziale Mechanicznym PG (2010). Od 2010 roku zatrudniony na stanowisku Adiunkta w Katedrze Mechaniki i Mechatroniki Wydziału Mechanicznego PG. W latach 2011-2013 zatrudniony...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
UN’IPERTROFIA INEVITABILE? LA MOBILITAZIONE INDUSTRIALE E LA TRASFORMAZIONE DELL’APPARATO AMMINISTRATIVO PER LO SFORZO BELLICO
PublikacjaIl capitolo esamina le trasformazioni dell'apparato amministrativo in relazione alle esigenze dello sforzo bellico
-
Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
Konferencje -
L'industria e la Storia. La lezione di Giorgio Mori
PublikacjaThe wide contribution of Giorgio Mori for a better understanding of the long-term historical relationships between history and industry is the focus of this chapter. By analysing the long list of books and articles written all along his scientific and academic life it is possible to trace a sort of fil rouge that permits to appreciate the huge effort made by this scholar in offering a fresh and never banal interpretation of the...
-
Sésame, ouvre-toi: internationalisme phraséologique à contenu universel
PublikacjaPhraseological units, characterised by their opaque meaning, are the subject of multiple theoretical works. The following article adds to this discussion by providing another interesting example. It analyses the case of the Arabic phraseological unit ‘open sesame’ from the “Ali Baba and the Forty Thievesˮ folk tale, permeating into French, Italian, Polish, Turkish and Japanese – languages distant both linguistically and culturally....
-
Influence of the local building tradition on Renaissance architecture in Royal Prussia
PublikacjaContrary to the southern Europe the first signs of Renaissance in northern parts of the Holy Roman Empire as well as in Poland and Lithuania might be observed only at the beginning of the 16th century. Initially, they were created by Italian teams which came from Florence, Rome and the region of Como. One of the most recognizable marks of that process was the transfer of the Italian craftsmen and architectural solutions, e.g....
-
Influence of milk, milk fractions and milk proteins on the growth and viability of mastitis-causing Staphylococcus aureus strain
Publikacja -
Impact of the Spirulina maxima extract addition to semen extender on bovine sperm quality
Publikacja -
Super Dominating Sets in Graphs
PublikacjaIn this paper some results on the super domination number are obtained. We prove that if T is a tree with at least three vertices, then n2≤γsp(T)≤n−s, where s is the number of support vertices in T and we characterize the extremal trees.
-
Valence state of Manganium in a MnCoO ceramics
Dane BadawczeManganium -cobalt based ceramics materials were produced by solid state reaction and sintred in a furnance in air atmosphere for 20h. Annealing temperature was 600 Celsius degree. For investigations a series of samples, with a various composition was chosen: MnCoO, Mn, Co2O and Mn2CoO. In order to determine valence states of the Mn, X-Ray photoemission...
-
Innovazioni fraseologiche nei titoli della stampa italiana: una classificazione dei motivi delle innovazioni fraseologiche
PublikacjaThe purpose of this study is to investigate the phenomenon of phraseological innovations in the titles of the articles in one of the Italian newspapers La Stampa. In the first part of the article, key terms such as the phraseological norm and the phraseological innovation have been defined, taking into account various terms related to this process. Then, some innovation classifications have been presented. Finally, the analytical...
-
The International Mercury Cartel, 1928–1954: Controlling Global Supply
PublikacjaThis article describes the features of the international mercury marketduringthe firsthalfofthetwentiethcentury.Itanalyzes the various market agreements made, their effectiveness, and their consequences. The period studied is little understood, although it was one in which mercury production greatly increased. It was also one that saw persistent efforts at market manipulation, owing to a series of agreements between Spanish and...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Karolina Lademann mgr
OsobyCurriculum vitae
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublikacjaThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as a...
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublikacjaThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
EVALUATION OF THE EFFICIENCY OF FLEXICURITY IMPLEMENTATION IN OECD COUNTRIES
PublikacjaFlexicurity is a policy of flexible and secure labour market. It has been the subject of many analyses, however, a coherent evaluation methodology is difficult to specify. The purpose of this paper is to propose a Data Envelopment Analysis based model for the evaluation of the efficiency of flexicurity implementation in OECD countries. The results will be used to create the ranking of countries, to determine changes in time, and...
-
Nadzeya Sabatini dr
OsobyNadzeya Sabatini is Assistant Professor in Digital Transformation at Gdańsk University of Technology (Gdansk, Poland), its Department of Informatics in Management (Faculty of Management and Economics). Nadzeya is lecturer at USI – Università della Svizzera italiana (Lugano, Switzerland), a research fellow at the Institute of Digital Technologies for Communication of the same university, and coordinator of MSc in Digital Fashion...
-
L’indistricabile intreccio. Imprese, imprenditori e regime fascista. (An Inextricable Intertwining. Companies, Entrepreneurs, and the Fascist Regime)
PublikacjaThe papers of this section analyse the relationships between the economic and business community and the fascist regime. Their aim is to refresh the interpretations that were established in the 1960s-1970s and remained undisputed in the decades thereafter, becoming a sort of mantra among Italian contemporary historians. The article presents the most relevant contributions of that historiographical season, explaining the reasons...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Restrained differential of a graph
PublikacjaGiven a graph $G=(V(G), E(G))$ and a vertex $v\in V(G)$, the {open neighbourhood} of $v$ is defined to be $N(v)=\{u\in V(G) :\, uv\in E(G)\}$. The {external neighbourhood} of a set $S\subseteq V(G)$ is defined as $S_e=\left(\cup_{v\in S}N(v)\right)\setminus S$, while the \emph{restrained external neighbourhood} of $S$ is defined as $S_r=\{v\in S_e : N(v)\cap S_e\neq \varnothing\}$. The restrained differential of a graph $G$ is...
-
Infedeltà nel trasferimento delle collocazioni nella traduzione dei romanzi di Michel Houellebecq dal francese all’italiano
PublikacjaBuilding on my PhD project, this paper explores fidelity challenges in the transfer of verb-nominal collocations (VNC) in the Italian translations of seven of Michel Houellebecq’s novels. I examine various kinds of infidelity, such as omissions, errors, incongruence in constituent transmission, incoherence in recurrent VNC transmission, and infidelity at the level of phraseological coverage. The accurate transfer...
-
Preface of guest editors
PublikacjaA special issue of Discussiones Mathematice Graph Theory (DMGT) is dedicated to selected papers presented at the 12th Workshop on Graph Theory: Colourings, Independence and Domination (CID) held on 16-21 September 2007 in Karpacz, Poland. It continues a series of international workshops: 1993-1997 in Lubiatów, 1998-2001 in Gronów, 2003 and 2005 in Karpacz. About 70 participants formed the audience of six invited lectures and 68...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublikacjaIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Critical Remarks on Landauer’s principle of erasure– dissipation: Including notes on Maxwell demons and Szilard engines
PublikacjaWe briefly address Landauer’s Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer’s derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation–dissipation...
-
Daniele Cerrato
OsobyResearcher in Italian and women studies
-
Assessment of TFP in European and American higher education institutions – application of Malmquist indices
PublikacjaIn this study we apply Malmquist methodology, based on the estimation of distance measures through Data Envelopment Analysis (DEA), to a sample of 500 universities (in 10 European countries and the U.S.) over the period 2000 to 2010 in order to assess and compare their productivity. On average, a rise in TFP is registered for the whole European sample (strongest for Dutch and Italian HEIs), while the productivity of American HEIs...
-
Ancillary services to grids provided with distributed generation
PublikacjaThe paper introduces system for utilization of the customer-side generated energy. Additionally system can secure some ancillary services to grids. Those services include: current active filtering, load voltage stabilization and in case of grid voltage faults - uninterruptible load supplying (possible with energy storage device). Presented experimental results confirm flexibility of this arrangement in processes of power delivery...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublikacjaBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Some variations of perfect graphs
PublikacjaWe consider (ψk−γk−1)-perfect graphs, i.e., graphs G for which ψk(H) =γk−1(H) for any induced subgraph H of G, where ψk and γk−1 are the k -path vertex cover number and the distance (k−1)-domination number, respectively. We study (ψk−γk−1)-perfect paths, cycles and complete graphs for k≥2. Moreover, we provide a complete characterisation of (ψ2−γ1)-perfect graphs describing the set of its forbidden induced subgraphs and providing...
-
REVITALIZATION PROJECT OF SLUM TRANSFORMATION: A CASE STUDY HAY-AL TANAK,BEIRUT,LEBANON
PublikacjaSlums are global phenomena that exist as a solution for those who couldn’t afford a house. This phenomenon is growing accompanying the rapid urbanization and the growth of the urban population, three-quarter of the world population anticipated to live in an urban environment by 2050 (Avis, 2016, p. 57). This paper reviews slum's evaluation of the revitalization project for one of the poorest slums in Beirut called Hay-Al Tanak....
-
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study.
PublikacjaThis paper presents the results of an exploratory study whose main aim is to verify if the Pattern-Based (PB) inspection technique enables end users to perform reliable evaluation of e-learning systems in real work-related settings. The study involved 13 Polish and Italian participants, who did not have an HCI background, but used e-learning platforms for didactic and/or administrative purposes. The study revealed that the participants...