


default search action
Giancarlo Bongiovanni
Person information
- affiliation: Sapienza University of Rome, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c9]Alá F. Khalifeh
, Novella Bartolini, Simone Silvestri, Giancarlo Bongiovanni, Anwar Al-Assaf, Radi Alwardat, Samer Alhaj-Ali:
Hybrid Wireless Sensor Networks: A Prototype. INTERACT (4) 2019: 549-553 - 2014
- [j24]Novella Bartolini
, Giancarlo Bongiovanni, Thomas F. La Porta, Simone Silvestri:
On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment. IEEE Trans. Mob. Comput. 13(11): 2592-2605 (2014) - [c8]Novella Bartolini
, Giancarlo Bongiovanni, Thomas La Porta, Simone Silvestri, F. Vincenti:
Voronoi-based deployment of mobile sensors in the face of adversaries. ICC 2014: 532-537 - 2013
- [c7]Novella Bartolini
, Giancarlo Bongiovanni, Thomas La Porta, Simone Silvestri:
On the security vulnerabilities of the virtual force approach to mobile sensor deployment. INFOCOM 2013: 2418-2426
2000 – 2009
- 2009
- [j23]Novella Bartolini
, Gian Carlo Bongiovanni, Simone Silvestri:
Self-* through self-learning: Overload control for distributed web systems. Comput. Networks 53(5): 727-743 (2009) - 2008
- [c6]Novella Bartolini
, Gian Carlo Bongiovanni, Simone Silvestri:
Self-* Overload Control for Distributed Web Systems. IWQoS 2008: 50-59 - [i1]Novella Bartolini, Gian Carlo Bongiovanni, Simone Silvestri:
Self-* overload control for distributed web systems. CoRR abs/0802.2543 (2008) - 2007
- [c5]Novella Bartolini, Gian Carlo Bongiovanni, Simone Silvestri:
An adaptive admission control policy for geographically distributed web systems. Infoscale 2007: 22 - [c4]Novella Bartolini
, Gian Carlo Bongiovanni, Simone Silvestri:
Distributed Server Selection and Admission Control in Replicated Web Systems. ISPDC 2007: 221-228 - [c3]Novella Bartolini
, Gian Carlo Bongiovanni, Simone Silvestri:
An Autonomic Admission Control Policy for Distributed Web Systems. MASCOTS 2007: 138-144 - 2005
- [j22]Gian Carlo Bongiovanni, Paolo Penna:
XOR-Based Schemes for Fast Parallel IP Lookups. Theory Comput. Syst. 38(4): 481-501 (2005) - 2003
- [c2]Gian Carlo Bongiovanni, Paolo Penna:
XOR-Based Schemes for Fast Parallel IP Lookups. CIAC 2003: 238-250 - 2002
- [j21]Gian Carlo Bongiovanni, Giorgio Gambosi, Rossella Petreschi:
Foreword. Theor. Comput. Sci. 285(1): 1 (2002) - 2000
- [c1]Gian Carlo Bongiovanni, Andrea E. F. Clementi, Paolo Penna:
A Note on Parallel Read Operations on Large Public Databases. ICALP Satellite Workshops 2000: 123-134 - [e2]Gian Carlo Bongiovanni, Giorgio Gambosi, Rossella Petreschi:
Algorithms and Complexity, 4th Italian Conference, CIAC 2000, Rome, Italy, March 2000, Proceedings. Lecture Notes in Computer Science 1767, Springer 2000, ISBN 3-540-67159-5 [contents]
1990 – 1999
- 1997
- [e1]Gian Carlo Bongiovanni, Daniel P. Bovet, Giuseppe Di Battista:
Algorithms and Complexity, Third Italian Conference, CIAC '97, Rome, Italy, March 12-14, 1997, Proceedings. Lecture Notes in Computer Science 1203, Springer 1997, ISBN 3-540-62592-5 [contents] - 1995
- [j20]Gian Carlo Bongiovanni, Pierluigi Crescenzi
, Concettina Guerra:
Parallel Simulated Annealing for Shape Detection. Comput. Vis. Image Underst. 61(1): 60-69 (1995) - [j19]Gian Carlo Bongiovanni, Pierluigi Crescenzi
, Sergio De Agostino:
Max Sat and Min Set Cover Approximation Algorithms are P-Complete. Parallel Process. Lett. 5: 293-298 (1995) - [j18]Luigi Cinque, Gian Carlo Bongiovanni:
Parallel prefix computation on a pyramid computer. Pattern Recognit. Lett. 16(1): 19-22 (1995) - 1993
- [j17]Gian Carlo Bongiovanni, Luigi Cinque, Stefano Levialdi, Azriel Rosenfeld:
Image segmentation by a multiresolution approach. Pattern Recognit. 26(12): 1845-1854 (1993) - 1990
- [j16]Gian Carlo Bongiovanni, Concettina Guerra, Stefano Levialdi:
Computing the Hough transform on a pyramid architecture. Mach. Vis. Appl. 3(2): 117-123 (1990)
1980 – 1989
- 1989
- [j15]Gian Carlo Bongiovanni, Rossella Petreschi:
Parallel-Depth Search for Acyclic Digraphs. J. Parallel Distributed Comput. 7(2): 383-390 (1989) - 1987
- [j14]Gian Carlo Bongiovanni, Daniel P. Bovet:
Minimal deadlock-free store-and-forward communication networks. Networks 17(2): 187-200 (1987) - [j13]Giancarlo Bongiovanni, Daniel P. Bovet:
On the Number of Switching Modes Generated by Time-Optimal Algorithms for SS/TDMA Systems. IEEE Trans. Commun. 35(3): 359-362 (1987) - [j12]Alan A. Bertossi, Giancarlo Bongiovanni, Maurizio A. Bonuccelli:
Time Slot Assignment in SS/TDMA Systems with Intersatellite Links. IEEE Trans. Commun. 35(6): 602-608 (1987) - 1985
- [j11]Paola Bertolazzi, Gian Carlo Bongiovanni:
A VLSI structure for the deadlock avoidance problem. J. Parallel Distributed Comput. 2(4): 352-361 (1985) - 1983
- [j10]Gian Carlo Bongiovanni:
Two VLSI Structures for the Discrete Fourier Transform. IEEE Trans. Computers 32(8): 750-754 (1983) - 1982
- [j9]Inder S. Gopal, Giancarlo Bongiovanni, Maurizio A. Bonuccelli, Donald T. Tang, C. K. Wong:
An Optimal Switching Algorithm for Multibeam Satellite Systems with Variable Bandwidth Beams. IEEE Trans. Commun. 30(11): 2475-2481 (1982) - 1981
- [j8]Gian Carlo Bongiovanni, Chak-Kuen Wong:
Communication: A Number Representation Convertor for Magnetic Bubble String Comparators. IBM J. Res. Dev. 25(1): 83-87 (1981) - [j7]Gian Carlo Bongiovanni, C. K. Wong:
Tree Search in Major/Minor Loop Magnetic Bubble Memories. IEEE Trans. Computers 30(8): 537-545 (1981) - [j6]Giancarlo Bongiovanni, Don Coppersmith, C. K. Wong:
An Optimum Time Slot Assignment Algorithm for an SS/TDMA System with Variable Number of Transponders. IEEE Trans. Commun. 29(5): 721-726 (1981) - [j5]Giancarlo Bongiovanni, Donald T. Tang, C. K. Wong:
A General Multibeam Satellite Switching Algorithm. IEEE Trans. Commun. 29(7): 1025-1036 (1981) - 1980
- [j4]Gian Carlo Bongiovanni, Fabrizio Luccio:
Maintaining Sorted Files in a Magnetic Bubble Memory. IEEE Trans. Computers 29(10): 855-863 (1980)
1970 – 1979
- 1979
- [j3]Gian Carlo Bongiovanni, Fabrizio Luccio:
Permutation of Data Blocks in a Bubble Memory. Commun. ACM 22(1): 21-25 (1979) - 1978
- [j2]Gian Carlo Bongiovanni, Fabrizio Luccio:
On Cahit's Result on Graceful Permutations. Inf. Process. Lett. 7(4): 183-184 (1978) - 1975
- [j1]Gian Carlo Bongiovanni, Fabrizio Luccio, Alessandro Zorat:
The Discrete Equation of the Straight Line. IEEE Trans. Computers 24(3): 310-313 (1975)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint