01249nam0 22003131i 450 UON0026653920231205103736.96588-8420-230-220050908d2004 |0itac50 baitaIT|||| |||||ˆIl ‰mito greco nell'opera di Pasolinia cura di Elena FabbroUdine : Forum2004207 p.24 cmAtti del Convegno "Il mito greco nell'opera di Pasolini" (Udine - Casarsa della Delizia, 24-26 Ottobre 2002)MITI NELLA LETTERATURAUONC042646FIMITO NELLE PELLICOLE CINEMATOGRAFICHEUONC057010FIPASOLINI, Pier PaoloOpereCongressiUONC057156FIITUdineUONL000548801.95Critica letteraria21FABBROElenaUONV155246ForumUONV260239650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00266539SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI R 0142 SI MC 29580 7 Mito greco nell'opera di Pasolini780994UNIOR04594nam 22005415 450 991049103080332120251225175035.03-030-73671-710.1007/978-3-030-73671-2(CKB)4100000011979008(MiAaPQ)EBC6675895(Au-PeEL)EBL6675895(OCoLC)1260344216(PPN)257358021(BIP)80809704(BIP)79431503(DE-He213)978-3-030-73671-2(EXLCZ)99410000001197900820210706d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierCyberspace Safety and Security 12th International Symposium, CSS 2020, Haikou, China, December 1–3, 2020, Proceedings /edited by Jieren Cheng, Xiangyan Tang, Xiaozhang Liu1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (342 pages)Security and Cryptology,2946-1863 ;126533-030-73670-9 Camdar-adv: Method for generating adversarial patches on 3D object -- Universal Adversarial Perturbations of Malware -- A Semi-Supervised Learning Approach for High Dimensional Android Malware Classification -- Kernel Optimization in SVM for Defense Against Adversarial Attacks -- An Empirical Study on the Status Quo of Higher Vocational Teachers' Informatization Teaching Ability -- A Case Study of Hainan Province -- Reliability Optimization of Composite Wing based on Sparse PC Method -- Malware Variants Detection Based on Feature Fusion -- Robust GAN Based on Attention Mechanism -- Training Aggregation in Federated Learning -- A robust digital watermarking for medical images based on PHTs-DCT -- A Robust Zero Watermarking Algorithm for Medical Images Based on Tetrolet-DCT -- HOUGH-DCT Based Robust Watermarking for Medical Image -- The Blind Separation of Cockpit Mixed Signals Based On Fast Independent Component Analysis -- A Zero-Watermarking Algorithm for Medical Images Based on Gabor-DCT -- Analysis on the influencing factors of electricity sales -- "Analysis on the Strategies of Information Technology to Improve Autonomous Learning in Higher Vocational English Teaching".-A Regularization-Based Positive and Unlabeled Learning -- Algorithm for One-Class Classification of Remote Sensing Data -- SDSBT: A Secure Multi-Party Data Sharing Platform Based on Blockchain and TEE* -- BID-HCP: Blockchain Identifier based Health Certificate Passport System.-Research on global map construction and location of intelligent vehicles based on lidar* -- On the strengthening effect of problem-driven discussion teaching method on the learning of “data structure” -- The Detection and segmentation of pulmonary nodules based on U-net* -- Research on Trajectory Shaping Guidance Law of Homing Missile with High Maneuver and Low Overload -- Analysis on the training willingness of new vocational farmers based on structural equation model -- a case study of Hainan Province -- The application of bibliometric and graphanalysis in document data mining: A case study on the cultivation of new type professional farmers Movie scoring algorithm based on deep neural network -- Research on a Malicious Code Detection -- Method Based on Convolutional Neural Network in a Domestic Sandbox Environment -- Electricity Sales Forecasting Based on Model Fusion and Prophet Model -- Research on Electricity Sales Forecast Model Based on Big Data.The LNCS 12653 constitute the proceedings of the 12th International Symposium on Cyberspace Safety and Security, CSS 2020, held in Haikou, China, in December 2020. The 37 regular papers presented in this book were carefully reviewed and selected from 82 submissions. The papers focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.Security and Cryptology,2946-1863 ;12653Data protectionData and Information SecurityData protection.Data and Information Security.005.8Cheng JierenTang XiangyanLiu XiaozhangMiAaPQMiAaPQMiAaPQBOOK9910491030803321Cyberspace Safety and Security2174991UNINA01363nam0 22003251i 450 UON0022959320240704090712.70420030730d1975 |0itac50 baitaIT|||| |||||ˆIl ‰ bambino e gli altriMaurice Merleau-Pontyintrod. di Paolo Filiasi carcano2. edRomaA. Armando Editore1975148 p.22 cm001UON001767852001 Serie di Psicologia210 RomaArmando Editore18UON00371556ˆLes ‰ relations avec autrui chez l'enfant4396780FanciulliPsicologia infantileUONC073649FIPsicologia infantileStudiUONC035692FIITRomaUONL000004155.4Psicologia infantile21Merleau-PoncyMauriceUONV1392181828374FILIASI CARCANOPaoloUONV139219ArmandoUONV246723650ITSOL20260220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEO E ARCHIVIO STORICOUONSIUON00229593SIBA - SISTEMA BIBLIOTECARIO DI ATENEO E ARCHIVIO STORICOSI FS 00921 SI LO 1447 5 Relations avec autrui chez l'enfant4396780UNIOR