Device Accelerated solvers with PETSc: current status, future perspectives, and applications
Scalable Gaussian Processes
Robust Sensor-based Recognition of Human Behavior
Machine Learning: Capabilities, Limitations and Misconceptions
Summer University 2022 on Effective High-Performance Computing and Data Analytics
ACM Conference on International Computing Education Research (ICER 2022)
International Multigrid Conference 2022 (IMG 2022)
USI Welcome 2022
Eventi correnti
CSCS-USI Summer School 2018
Analysis and Optimization of Task Granularity on the Java Virtual Machine
Towards Anticipatory Mobile Computing: Sensing and Modelling Mobile Data for Understanding and Predicting Human Behaviour
Differentiating conscious and formalized information needs
Path planning for mobile robots in the real world: handling multiple objectives, hierarchical structures and partial information
Time Aware Location Recommendations in Location Based Social Networks
Effective Diameter Estimation for Very Large Graphs
"Who is the secret hand behind Elena Ferrante?"
An Object Is Worth a Thousand Words - Reification as the Key to Augmenting Software Development
SLA-Driven Governance for RESTful Systems
The grand four - affine invariant globalizations of Netwon's method
Reconstructing Cancer Progression Models
Advancements in Bayesian network structure learning
Spring Semester Project Presentations 2018
Attuazione del GDPR in Europa... e in Svizzera?
Reusing Constraint Proofs in Symbolic Analysis
A Tribute to the founding dean of the Faculty of Informatics
A fictitious domain approach for fluid structure interactions
Introducing NEM Blockchain + Safekee.io decentralized cryptoassets protection solution
Keyword Search in Relational Databases: an open challenge.