Research Interests:
Research Interests:
Research Interests:
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteeing watermark persistence despite aggressive attacks. Nevertheless, attackers cannot compromise watermark detection to their will since they... more
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteeing watermark persistence despite aggressive attacks. Nevertheless, attackers cannot compromise watermark detection to their will since they must ensure the usability of the stolen data. Attacks that constitute a potential master-key for false ownership claims focus on leaking or compromising values used for watermark synchronization. For instance, brute-force attacks attempt to guess the values of parameters used for watermark embedding. The chances for brute-force attacks of successfully performing illegal watermark detection increases in untrusted environments where the leaks of parameters are common. In this paper, (i) we show how brute-force attacks succeed even if not all watermark detection parameters’ values are correctly guessed, (ii) we define the role played by each parameter in robustness, and (iii) we formalize a method for improving the resilience of existing watermarking techniques in scenarios lacking trust. According to the experimental results, watermarking approaches to which our proposal has been applied benefit in terms of robustness and security requirements, extending the deployment opportunities for other techniques.
Research Interests:
Research Interests:
Purpose The European H2020 Families_Share project aims at offering a grass-root approach and a co-designed platform supporting families for sharing time and tasks related to childcare, parenting, after-school and leisure activities and... more
Purpose The European H2020 Families_Share project aims at offering a grass-root approach and a co-designed platform supporting families for sharing time and tasks related to childcare, parenting, after-school and leisure activities and other household tasks. To achieve this objective, the Families_Share project has been built on current practices which are already leveraging on mutual help and support among families, such as Time Banks, Social Streets and self-organizing networks of parents active at the neighbourhood level and seek to harness the potential of ICT networks and mobile technologies to increase the effectiveness of participatory innovation. The aim of this paper is to present and discuss the Families_Share methodology and platform, as well as the results obtained by several partecipating communities in different European countries. Design/methodology/approach This paper discusses how the Families Share approach (CAPS project, Horizon 2020) is bringing the sharing econo...
Research Interests:
Research Interests:
RPL or Routing Protocol for Low power and Lossy Networks (LLNs) is considered the most suited routing technology for IPV6. However, with the rapid advancements in networking and the paradigm shift towards IoT, RPL is facing some... more
RPL or Routing Protocol for Low power and Lossy Networks (LLNs) is considered the most suited routing technology for IPV6. However, with the rapid advancements in networking and the paradigm shift towards IoT, RPL is facing some performance issues due to scalability, resource constraints and mobility. We propose a Geographic location-based Dynamic Opportunistic routing protocol (GDO-RPL) for point-to-point communication, whose algorithm has been extensively simulated within the Contiki Cooja environment. As a testbed for the proposed solution, we evaluated the scenario of an innovative 3D printing system that uses IIoT (Industrial Internet of Things) technologies, such as sensors installed within artifacts collecting data during the lifetime of the object in the environmental context for which it is intended.
Research Interests:
We present Legodroid, a Java library for Android that allows cross-programming LEGO Mindstorms through an Android device to exploit its extra computational capabilities in a seamless way. From a programmer’s perspective, the paradigm it... more
We present Legodroid, a Java library for Android that allows cross-programming LEGO Mindstorms through an Android device to exploit its extra computational capabilities in a seamless way. From a programmer’s perspective, the paradigm it suggests for programming the EV3 is straightforward and resembles a standard main function in the likes of leJOS, which natively runs on the EV3 side though. Moreover, the library imposes type-driven coding patterns for interacting with motors and sensors, which guide developers in writing correct code with less runtime errors thanks to a rigid discipline over types. This is particularly effective in Android, whose component-based pattern complicates coding of traditional long-running algorithms for robots. Compared to leJOS, Legodroid users reported shorter bugfixing times and a more accessible paradigm for programming the robot, which had a positive impact on how much resources could be put in writing smarter algorithms and sophisticate interactions.
Research Interests:
Research Interests:
Research Interests:
Cloud federation is an aggregation of services from different providers in a single pool supporting interoperability and resource migration. In federation, Services are assigned to the consumer’s service access pool as per their specific... more
Cloud federation is an aggregation of services from different providers in a single pool supporting interoperability and resource migration. In federation, Services are assigned to the consumer’s service access pool as per their specific functional and associated Quality level requirements. The said assignment is based on the advertised features of services. Sometimes, the selected provider fails to provide the committed service or, it fails to fulfill the expected QoS level. As a result, the consumer is being deprived of getting the services at required quality levels, in spite of subscribing and paying. Re-federation i.e. the inclusion of new services from different providers in the resource pool is a solution. This costly and time consuming re-federation process harms the overall harmony, reputation and performance of the existing federation. In this paper, the necessary strategies to make a federation autonomic is proposed. It helps federation to work in a self-adaptive manner b...
Research Interests:
Robust relational database watermarking techniques aim to preserve the watermark in the protected assets despite daily updates and malicious attacks. Nevertheless, most techniques do not analyze the root of operations that can degrade the... more
Robust relational database watermarking techniques aim to preserve the watermark in the protected assets despite daily updates and malicious attacks. Nevertheless, most techniques do not analyze the root of operations that can degrade the embedded watermark signal, being that the case of Structured Query Language (SQL) queries for relational data. In this paper, we perform an empirical analysis of the role played by different types of SQL queries in the persistence and degradation of a watermark signal in a relational data set. According to the type of operation, we present a set of alternatives for the watermark detection process, contributing to the extraction of an ownership copyright signals threshold. Moreover, our proposal allows data owners to consider variations for the selected watermarking technique, according to the suspected malicious operation performed in the copy of available data. Finally, we give evidence of the importance of some features to be considered when selecting a watermark source, making possible the resilience against update operations that affect a high amount of protected data and the enhancement of a partially detected watermark.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
... G. Kahn (ed.), pp.322-327, Amsterdam 1991. Cortesi, A., Pil~, G. and Winsborough W., "Comparison of Abstract Interpretations." Tech.Rep. 14/91 Dip. ... Workshop on Logic Programming for Intelligent Systems. Los Angeles, 1981.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Property Driven Program Slicing Sukriti Bhattacharya, Agostino Cortesi Dipartimento di Informatica Università Ca'Foscari di Venezia Program ... Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, pages 238-252,... more
Property Driven Program Slicing Sukriti Bhattacharya, Agostino Cortesi Dipartimento di Informatica Università Ca'Foscari di Venezia Program ... Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, California, 1977. ...
Research Interests: NWPT()
()
Research Interests:
... The groundness and equivalence properties are closed under instantiation in the following sense. It is ob-vious that if a grounds x then any a' E A, grounds x. Similarly, if two sets of variables S1 and S2 are equivalent with... more
... The groundness and equivalence properties are closed under instantiation in the following sense. It is ob-vious that if a grounds x then any a' E A, grounds x. Similarly, if two sets of variables S1 and S2 are equivalent with respect to a (see Introduction), then SI and S2 are ...
Research Interests:
One of the most popular abstract domains used for the analysis of logic programs is the domain Sharing which expresses the fact that computed substitutions bind variables to terms containing common variables. Despite the fact that this... more
One of the most popular abstract domains used for the analysis of logic programs is the domain Sharing which expresses the fact that computed substitutions bind variables to terms containing common variables. Despite the fact that this domain is widely used and studied, it is not yet known whether its abstract operations are complete or at least optimal. We solve
Research Interests:
Research Interests:
The amount and variety of data available electronically have dramatically increased in the last decade; however, data and documents are stored in different ways and do not usually show their internal structure. In order to take full... more
The amount and variety of data available electronically have dramatically increased in the last decade; however, data and documents are stored in different ways and do not usually show their internal structure. In order to take full advantage of the topological structure of digital documents, and particularly web sites, their hierarchical organization should be exploited by introducing a notion of query similar to the one used in database systems. A good approach, in that respect, is the one provided by graphical query languages, ...
Research Interests:
... at ±45° have been added, along a transverse band which includes the fin connections, the chain plate and the mast partners ... Techniques and Design in Composite Materials 3 doi:10.4028/www. scientific.net/KEM.144 1£ Structural... more
... at ±45° have been added, along a transverse band which includes the fin connections, the chain plate and the mast partners ... Techniques and Design in Composite Materials 3 doi:10.4028/www. scientific.net/KEM.144 1£ Structural Analysis and Design of Sailboats Built of ...
Research Interests:
Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è stata data ai singoli Atenei nella specifica dei percorsi di studio espone alla responsabilità di proporre e gestire itinerari formativi... more
Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è stata data ai singoli Atenei nella specifica dei percorsi di studio espone alla responsabilità di proporre e gestire itinerari formativi di qualità, che sappiano confrontarsi sia con le attese culturali degli studenti, che con le esigenze di un mercato del lavoro sempre più attento ai contenuti e alla solidità delle competenze acquisite dai laureati.
Research Interests: Art()
()
The paper describes the certification mark promoted by the Italian Association of Computer Science University Professors (GRIN) for undergraduate and graduate degree programs in Computer Science. The certification process yields a system... more
The paper describes the certification mark promoted by the Italian Association of Computer Science University Professors (GRIN) for undergraduate and graduate degree programs in Computer Science. The certification process yields a system of comparable and transparent curricula that enables the comparison of different sites and supports student mobility across different Universities. It can be seen as a first step towards a European Certification of Computer Science University Curricula.
Research Interests:
Research Interests: Computer Science, Relational Database, Digital Watermarking, FingerPrinting, Key words, and 3 moreH, E, and D
Reduced product of abstract domains is a rather well-known operation for domain composition in abstract interpretation. In this article, we study its inverse operation, introducing a notion of domain complementation in abstract... more
Reduced product of abstract domains is a rather well-known operation for domain composition in abstract interpretation. In this article, we study its inverse operation, introducing a notion of domain complementation in abstract interpretation. Complementation provides as systematic way to design new abstract domains, and it allows to systematically decompose domains. Also, such an operation allows to simplify domain verification problems, and it yields space-saving representations for complex domains. We show that the complement exists in most coses, and we apply complementation to three well-know abstract domains, notably to Cousot and Cousot's interval domain for integer variable analysis, to Cousot and Cousot's domain for comportment analysis of functional languages, and to the domain Sharing for aliasing analysis of logic languages.
Research Interests:
The new rules recently introduced in the Italian University organization force the academic community to face the issue of quality assessment and certification of undergraduate and graduate degree programs. The autonomy that has been... more
The new rules recently introduced in the Italian University organization force the academic community to face the issue of quality assessment and certification of undergraduate and graduate degree programs. The autonomy that has been granted to each University in the specification of the curricula allow the faculties to design their products both with respect to the requirements of the work market, and with respect to the cultural expectations of their potential students. Unfortunately, the quality of Computer ...
Research Interests:
In the design of autonomous systems, it is important to consider the preferences of the interested parties to improve the user experience. These preferences are often associated with the contexts in which each system is likely to operate.... more
In the design of autonomous systems, it is important to consider the preferences of the interested parties to improve the user experience. These preferences are often associated with the contexts in which each system is likely to operate. The operational behavior of a system must also meet various non-functional requirements (NFRs), which can present different levels of conflict depending on the operational context. This work aims to model correlations between the individual contexts and the consequent conflicts between NFRs. The proposed approach is based on analyzing the system event logs, tracing them back to the leaf elements at the specification level and providing a contextual explanation of the system’s behavior. The traced contexts and NFR conflicts are then mined to produce Context-Context and Context-NFR conflict sequential rules. The proposed Contextual Explainability (ConE) framework uses BERT-based pre-trained language models and sequential rule mining libraries for der...
Research Interests:
Research Interests:
Non‐functional requirements (NFRs) play a significant role in the software development process. However, the classical requirement prioritization methods for incremental software development, typically, consider the attributes of... more
Non‐functional requirements (NFRs) play a significant role in the software development process. However, the classical requirement prioritization methods for incremental software development, typically, consider the attributes of functional features only, often neglecting the non‐functional constraints. This might lead to catastrophic defects in the system design, as the conflicts among the NFRs are ignored. In this paper, a novel prioritization approach for functional requirements (FRs) is introduced within the incremental software development process. The proposed approach considers the conflicts among NFRs, in the prioritization process, to minimize the incon sistencies of software development. The devised NFR‐aware prioritization algorithm can be tuned according to the weights that the analyst assigns to NFR conflicts and FR‐NFR dependencies. We have assessed our prioritization approach using available requirements data sets and have compared the results in different scenarios.
Research Interests:
Requirements keep changing within an evolving business environment. In incremental software development, where functionalities are identified and delivered incrementally, a need is felt toward capturing and analyzing the impact of the... more
Requirements keep changing within an evolving business environment. In incremental software development, where functionalities are identified and delivered incrementally, a need is felt toward capturing and analyzing the impact of the changes in the system development process. This may require refactoring the order of the development of the system components based on newly added dependencies and conflicts among functional and non-functional requirements. In this paper, we propose a dynamic framework that re-prioritizes the requirements based on newly added (and updated) requirement dependencies and conflicts. We also provide an effective tool for our framework that supports software developers during incremental delivery within a changing business environment.
Research Interests:
Research Interests:
This article presents the design and experimental evaluation of a non-invasive wearable sensor system that can be used to acquire crucial information about athletes’ performance during inline figure skating training. By combining distance... more
This article presents the design and experimental evaluation of a non-invasive wearable sensor system that can be used to acquire crucial information about athletes’ performance during inline figure skating training. By combining distance and time-of-flight sensors and gyroscopes, the system is able to detect when jumps are performed and provides a live view of the data (e.g., the number and height of jumps) through a graphical user interface. The main novelty of our approach lies in the way in which the optical sensors are orientated. Typically, the sensors are orientated horizontally and positioned in pairs on the ground, where they measure the time interval between the moment the athlete leaves the ground and the moment they land. In our system, an optical sensor is placed under each foot and is vertically orientated so as to constantly measure the distance from the ground. In addition, a gyroscope sensor is placed on the athlete’s back, which provides information on the directio...
Research Interests:
Gender balance in research organizations is considered as a key step for ensuring research excellence and quality and inclusive-sustainable innovation. Still, in spite of an increasing number of HE and research institutions committed to... more
Gender balance in research organizations is considered as a key step for ensuring research excellence and quality and inclusive-sustainable innovation. Still, in spite of an increasing number of HE and research institutions committed to make science more equal and some positive trends in figures on Gender equality in STEM research, it still appears to be difficult to prioritize gender equality. This is particularly true for disciplines such as ICT/IST where female representation at all levels is among the lowest ones among STEM topics and where a gender sensitive approach to ICT design and programming is far from being understood in its implications among computer and information systems scientist. H2020 (PGERI and SWAFS programmes in particular), promoted the concept of institutional change for gender equality, insisting on the need for merging change management and gender policies. The volume is focusing on a presentation and reflexive review of results and tools from the H2020 EQ...
Research Interests:
Research Interests:
Many business applications today still rely on COBOL programs written decades ago that are difficult to maintain and upgrade due to technological limitations and lack of experts in the language. Several companies have been trying to... more
Many business applications today still rely on COBOL programs written decades ago that are difficult to maintain and upgrade due to technological limitations and lack of experts in the language. Several companies have been trying to migrate their software base to modern platforms, but code translation is problematic because most business processes implemented are often no longer documented or even known. Applying existing Program Understanding techniques to COBOL could be a way for aiding IT specialists in charge of a porting but useful raw information must be extracted from the source code in order to get these techniques yield to meaningful results. We believe that the types of variables used in programs are an important part of such raw information and we present an approach based on static analysis of types rather than data. Our system is capable of reconstructing the type-flow of a COBOL program throughout branches, jumps and loops in finite time and to track type information o...
Research Interests:
Research Interests:
Research Interests: Qualità()
()