0000000000159285

AUTHOR

Laura Giarre

showing 98 related works from this author

Consensus in inventory games

2008

This paper studies design, convergence, stability and optimality of a distributed consensus protocol for n-player repeated non cooperative games under incomplete information. Information available to each player concerning the other players' strategies evolves in time. At each stage (time period), the players select myopically their best binary strategy on the basis of a payoff, defined on a single stage, monotonically decreasing with the number of active players. The game is specialized to an inventory application, where fixed costs are shared among all retailers, interested in reordering or not from a common warehouse. As information evolves in time, the number of active players changes t…

TheoryofComputation_MISCELLANEOUSComputer Science::Computer Science and Game TheoryInventoryMulti-agent systemsStochastic gameComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERALConsensus protocols; Game theory; Inventory; Multi-agent systemsOutcome (game theory)Consensus protocolssymbols.namesakeBayesian gameNash equilibriumBest responsesymbolsRepeated gameEconomicsCoordination gameMathematical economicsGame theoryGame theoryProceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
researchProduct

Learning Research Methods and Processes via Sharing Experience in a BLOG

2006

The goal is to increase knowledge about different research methods that have been employed in the information technology field by supporting the information exchange, collaboration, and cooperation between researchers. Well-designed, well-told stories can help others learn from past situations to respond more effectively in future situation. A blog is presented where PhD students and researchers are invited to collaborate by providing their stories, reading and commenting existing stories. This infrastructure allows researchers and PhD students to write the contents posing questions and finding answers on the relationship between research process and research results.

Computer sciencebusiness.industrymedia_common.quotation_subjectInformation technologyE-learningResearch processField (computer science)mobile learningWorld Wide WebReading (process)Mobile devicesInformation systemThe InternetbusinessPhd studentsInformation exchangeExperience sharing; PhD research courses; Research methods; Storytelling;media_common
researchProduct

Distributed Consensus in Noncooperative Inventory Games

2009

This paper deals with repeated nonsymmetric congestion games in which the players cannot observe their payoffs at each stage. Examples of applications come from sharing facilities by multiple users. We show that these games present a unique Pareto optimal Nash equilibrium that dominates all other Nash equilibria and consequently it is also the social optimum among all equilibria, as it minimizes the sum of all the players’ costs. We assume that the players adopt a best response strategy. At each stage, they construct their belief concerning others probable behavior, and then, simultaneously make a decision by optimizing their payoff based on their beliefs. Within this context, we provide a …

TheoryofComputation_MISCELLANEOUSComputer Science::Computer Science and Game TheoryInformation Systems and ManagementGeneral Computer ScienceManagement Science and Operations ResearchIndustrial and Manufacturing Engineeringsymbols.namesakeSettore ING-INF/04 - AutomaticaGame theory; Multi-agent systems; Inventory; Consensus protocolsEconomicsRisk dominanceGame theoryMulti-agent systemsStochastic gameInventoryComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERALRationalizabilityConsensus protocols; Game theory; Inventory; Multi-agent systemsConsensus protocolsMulti-agent systemNash equilibriumEquilibrium selectionModeling and SimulationBest responsesymbolsRepeated gameEpsilon-equilibriumSettore MAT/09 - Ricerca OperativaMathematical economics
researchProduct

AQM Stability in Multiple Bottleneck Networks

2004

In this paper, we highlight that multiple bottlenecks can affect the performance of active queue management controllers, which are usually configured on a single bottleneck basis, as if each controller were the only element regulating the TCP traffic along its path. To see this, we consider a network scenario where RED is configured at each router, according to previously developed control theoretic techniques. These configuration rules assure stability in a single bottleneck scenario. Yet, we show that instability may arise when two link become congested. We justify this result through a multiple bottleneck model and give guidelines for new cooperative AQM controllers.

RouterQueueing theorybusiness.industryComputer scienceDistributed computingPropagation delayActive queue managementBottleneckActive Queue Management bottlenecksIntelligent NetworkSettore ING-INF/04 - AutomaticaControl theoryPath (graph theory)Settore MAT/09 - Ricerca OperativabusinessComputer network
researchProduct

Reduced Complexity Models in the Identifi cation of Dynamical Networks: links with sparsi cation problems.

2009

In many applicative scenarios it is important to derive information about the topology and the internal connections of more dynamical systems interacting together. Examples can be found in fields as diverse as Economics, Neuroscience and Biochemistry. The paper deals with the problem of deriving a descriptive model of a network, collecting the node outputs as time series with no use of a priori insight on the topology. We cast the problem as the optimization of a cost function operating a trade-off between accuracy and complexity in the final model. We address the problem of reducing the complexity by fixing a certain degree of sparsity, and trying to find the solution that ``better'' satis…

Settore ING-INF/04 - AutomaticaIdentification Sparsification Reduced Models Networks
researchProduct

Achieving Fair Bandwidth Distribution in WiFi Networks: A Game Theoretical Approach

2011

International audience; Achieving fair bandwidth distribution among uplink and downlink ows in IEEE 802.11 infrastructure networks is a complex issue, due to the well-known features of the Distributed Coordination Function (DCF) which regulates the access to the shared medium. Indeed, the dynamic adaptation of the contention windows causes phenomena of short-term unfairness, while the use of homogeneous contention parameters among the contending nodes makes the aggregated downlink bandwidth equal to the uplink bandwidth of a single node. We propose a dynamic tuning of the contention parameters used by the nodes, based on simple network monitoring functionalities and rational strategies. Spe…

WiFi; game theorygame theoryDynamic bandwidth allocationbusiness.industryComputer scienceDistributed computingWiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork monitoringShared mediumDistributed coordination functionNash equilibriumShared resource[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Telecommunications linkComputer Science::Networking and Internet ArchitectureBandwidth (computing)NetworksbusinessGame theoryGame theoryComputer network
researchProduct

Enabling independent navigation for visually impaired people through a wearable vision-based feedback system

2017

This work introduces a wearable system to provide situational awareness for blind and visually impaired people. The system includes a camera, an embedded computer and a haptic device to provide feedback when an obstacle is detected. The system uses techniques from computer vision and motion planning to (1) identify walkable space; (2) plan step-by-step a safe motion trajectory in the space, and (3) recognize and locate certain types of objects, for example the location of an empty chair. These descriptions are communicated to the person wearing the device through vibrations. We present results from user studies with low- and high-level tasks, including walking through a maze without collisi…

EngineeringSituation awarenessbusiness.industry05 social sciencesWearable computer02 engineering and technologyPlan (drawing)Motion (physics)Obstacle0202 electrical engineering electronic engineering information engineeringTrajectory020201 artificial intelligence & image processing0501 psychology and cognitive sciencesComputer visionArtificial intelligenceMotion planningbusiness050107 human factorsHaptic technology2017 IEEE International Conference on Robotics and Automation (ICRA)
researchProduct

Robust control of uncertain multi-inventory systems via linear matrix inequality

2008

We consider a continuous time linear multi inventory system with unknown demands bounded within ellipsoids and controls bounded within ellipsoids or polytopes. We address the problem of "-stabilizing the inventory since this implies some reduction of the inventory costs. The main results are certain conditions under which "-stabilizability is possible through a saturated linear state feedback control. All the results are based on a Linear Matrix Inequalities (LMIs) approach and on some recent techniques for the modeling and analysis of polytopic systems with saturations.

Mathematical optimizationLinear Matrix InequalitiesPolytopeDynamical Systems (math.DS)stock control93xxcontinuous systems linear matrix inequalities linear systems manufacturing systems robust control state feedback stock control uncertain systemsimpulse control inventory control hybrid systemsSettore ING-INF/04 - AutomaticaControl theoryFOS: Mathematicsmanufacturing systemsMathematics - Dynamical Systemslinear matrix inequalitiesstate feedbackTime complexityMathematics - Optimization and ControlInventory systemsMathematicsInventory controlLinear Matrix Inequalities; Inventory systemsLinear systemlinear systemsLinear matrix inequality93Cxx;93xxLinearity93Cxxhybrid systemsEllipsoidComputer Science Applicationsimpulse control; inventory control; hybrid systemsuncertain systemsControl and Systems EngineeringOptimization and Control (math.OC)Control systemBounded functioncontinuous systemsPerpetual inventorycontinuous systems; linear matrix inequalities; linear systems; manufacturing systems; robust control; state feedback; stock control; uncertain systemsinventory controlRobust controlSettore MAT/09 - Ricerca Operativarobust controlimpulse control
researchProduct

Quantized Dissensus in switching networks with nodes death and duplication* *Research supported by MURST-PRIN “Robust Techniques for uncertain system…

2009

Abstract In this paper we discuss agents exchanging quantized flows to diverge one from the others according to a dissensus protocol. A Quantized Gossip algorithm is considered. Evolutions of the states during switching intervals and at switching instants and their property are described and analyzed. The modeling of switching systems describing networks where death and duplication processes occur is described. Some properties of the topology reached by the network when different rules of duplication and inheritance are implemented.

Property (philosophy)Gossip algorithmsDistributed computingHybrid systemGene duplicationInheritance (genetic algorithm)Topology (electrical circuits)TopologyProtocol (object-oriented programming)MathematicsIFAC Proceedings Volumes
researchProduct

Identification for a general class of LPV Models

2000

Abstract In this paper we consider the problem of identifying discrete-time Linear Parameter Varying (LPV) models of non-linear or time-varying systems. LPV models are considered for their connection with the industrial practice of gain-scheduling. We assume that inputs, outputs and the scheduling parameters are measured, and a form of the functional dependence of the coefficients on the parameters is known. We show how the identification problem can be reduced to a linear regression so that a Least Mean Square identification algorithm can be reformulated. Conditions on the persistency of excitation in terms of the inputs and parameter trajectories are given to ensure the consistency of the…

Parameter identification problemLeast mean squares filterGain schedulingControl theoryLinear regressionMathematicsScheduling (computing)
researchProduct

Noncooperative dynamic games for inventory applications: A consensus approach

2008

We focus on a finite horizon noncooperative dynamic game where the stage cost of a single player associated to a decision is a monotonically nonincreasing function of the total number of players making the same decision. For the single-stage version of the game, we characterize Nash equilibria and derive a consensus protocol that makes the players converge to the unique Pareto optimal Nash equilibrium. Such an equilibrium guarantees the interests of the players and is also social optimal in the set of Nash equilibria. For the multi-stage version of the game, we present an algorithm that converges to Nash equilibria, unfortunately not necessarily Pareto optimal. The algorithm returns a seque…

TheoryofComputation_MISCELLANEOUSDynamic gamesComputer Science::Computer Science and Game TheoryMathematical optimizationCorrelated equilibriumSequential gameConsensus ProtocolsComputer scienceA-priori; Consensus protocols; Dynamic games; Finite horizons; Inventory; Inventory systems; Joint decisions; Multi stages; Nash equilibrium; Pareto-optimal; Single stages; Unilateral improvementsSymmetric equilibriumOutcome (game theory)Joint decisionsNash equilibriumFinite horizonsMulti stagessymbols.namesakeBayesian gameSettore ING-INF/04 - AutomaticaPareto-optimalA-prioriCoordination gameFolk theoremPrice of stabilityRisk dominanceNon-credible threatConsensus Protocols Dynamic Programming Game Theory InventoryInventory systemsTraveler's dilemmaNormal-form gameStochastic gameInventoryComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERALMinimaxConsensus protocolsEquilibrium selectionNash equilibriumBest responseSingle stagesRepeated gamesymbolsEpsilon-equilibriumSettore MAT/09 - Ricerca OperativaSolution conceptDynamic Programming Game TheoryUnilateral improvementsMathematical economicsGame theoryConsensus Protocols; Dynamic Programming Game Theory; Inventory
researchProduct

Non-linear protocols for optimal distributed consensus in networks of dynamic agents

2006

We consider stationary consensus protocols for networks of dynamic agents with fixed topologies. At each time instant, each agent knows only its and its neighbors'' state, but must reach consensus on a group decision value that is function of all the agents'' initial state. We show that the agents can reach consensus if the value of such a function is time-invariant when computed over the agents'' state trajectories. We use this basic result to introduce a non-linear protocol design rule allowing consensus on a quite general set of values. Such a set includes, e.g., any generalized mean of order p of the agents'' initial states. As a second contribution we show that our protocol design is t…

Lyapunov functionMathematical optimizationDecentralized controlGeneral Computer ScienceConsensus protocols; Decentralized control; Networks; Optimal controlUniform consensussymbols.namesakeConsensusComputer Science::Systems and ControlElectrical and Electronic EngineeringMathematicsMechanism designSupervisorbusiness.industryMechanical EngineeringRational agentDecentralised systemOptimal controlComputer Science::Multiagent SystemsConsensus protocolsControl and Systems EngineeringsymbolsArtificial intelligenceSettore MAT/09 - Ricerca OperativaNetworksbusinessGame theorySystems & Control Letters
researchProduct

Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling

2014

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …

resource allocation; multi hop neworksSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingMulti-frequency time division multiple accessComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessresource allocationComputer Science Applications1707 Computer Vision and Pattern Recognitionmulti hop neworksHop (networking)Carrier-sense multiple accessScheduling (computing)resource allocation multi hop neworksComputer Networks and CommunicationSettore ING-INF/04 - AutomaticaControl and Systems EngineeringChannel access methodbusinessInformation SystemsComputer network
researchProduct

Set Membership (In) Validation of nonlinear positive models for biological systems

2006

The complexity of biology needs quantitative tools in order to support and validate biologists intuition and traditional qualitative descriptions. In this paper, Nonlinear Positive models with constraints for biological systems are validated/invalidated in a worst-case deterministic setting. These models are usefull for the analysis of the DNA and RNA evolution and for the description of the population dynamics of viruses and bacteria. The conditional central estimate and the Uncertainty Intervals are determined in order to validate/invalidate the model. The effectiveness of the proposed procedure has been illustrated by means of simulation experiments.

education.field_of_studyNonlinear systembusiness.industryModels of DNA evolutionPopulationArtificial intelligenceBioinformaticsbusinessMachine learningcomputer.software_genreeducationcomputerIntuition
researchProduct

Reduced complexity models in the identification of dynamical networks: Links with sparsification problems

2009

In many applicative scenarios it is important to derive information about the topology and the internal connections of more dynamical systems interacting together. Examples can be found in fields as diverse as Economics, Neuroscience and Biochemistry. The paper deals with the problem of deriving a descriptive model of a network, collecting the node outputs as time series with no use of a priori insight on the topology. We cast the problem as the optimization of a cost function operating a trade-off between accuracy and complexity in the final model. We address the problem of reducing the complexity by fixing a certain degree of sparsity, and trying to find the solution that “better” satisfi…

Approximation theoryMathematical optimizationSettore ING-INF/04 - AutomaticaDynamical systems theoryComputational complexity theoryNode (networking)A priori and a posteriorisparsification compressing sensing estimation networksNetwork topologyGreedy algorithmTopology (chemistry)MathematicsProceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference
researchProduct

Multiple UAV cooperative path planning via neuro-dynamic programming

2004

In this paper, a team of n unmanned air-vehicles (UAVs) in cooperative path planning is given the task of reaching the assigned target while i) avoiding threat zones ii) synchronizing minimum time arrivals on the target, and iii) ensuring arrivals coming from different directions. We highlight three main contributions. First we develop a novel hybrid model and suit it to the problem at hand. Second, we design consensus protocols for the management of information. Third, we synthesize local predictive controllers through a distributed, scalable and suboptimal neuro-dynamic programming (NDP) algorithm.

Information managementEngineeringbusiness.industryDistributed computingSynchronizingControl engineeringUnmanned air-vehicles (UAV)Task (project management)Dynamic programmingModel predictive controlDistributed algorithmScalabilityNeuro-dynamic programmingMotion planningbusinessNeuro-dynamic programming; Unmanned air-vehicles (UAV)
researchProduct

Complex Dynamics in a Harmonically Excited Lennard-Jones Oscillator: Microcantilever-Sample Interaction in Scanning Probe Microscopes1

1998

In this paper we model the microcantilever-sample interaction in an atomic force microscope (AFM) via a Lennard-Jones potential and consider the dynamical behavior of a harmonically forced system. Using nonlinear analysis techniques on attracting limit sets, we numerically verify the presence of chaotic invariant sets. The chaotic behavior appears to be generated via a cascade of period doubling, whose occurrence has been studied as a function of the system parameters. As expected, the chaotic attractors are obtained for values of parameters predicted by Melnikov theory. Moreover, the numerical analysis can be fruitfully employed to analyze the region of the parameter space where no theoret…

Period-doubling bifurcationMechanical EngineeringChaoticParameter spaceComputer Science ApplicationsNonlinear Sciences::Chaotic DynamicsNonlinear systemComplex dynamicsClassical mechanicsControl and Systems EngineeringAttractorInstrumentationChaotic hysteresisHarmonic oscillatorInformation SystemsMathematicsJournal of Dynamic Systems, Measurement, and Control
researchProduct

Blogging as a research and educational tool: a three years experience

2008

Abstract Blogging can be also used to share knowledge in research and education. We have been using many blogs with the following purposes. One goal has been to raise awareness about research methods in the information technology field by supporting information exchange, collaboration, and cooperation between researchers. We have been using a common blog for 3 years to share inter- and intra disciplinary knowledge among us. We have also collected stories and interviewed colleagues and friends. An other goal is the use of blogs during our teaching experience as an instrument to support the exchange of knowledge with students. A comparison of the use of blogging is presented with positive and…

Cooperative learningSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniE-learning; Education; Research methods; Cooperative learning; Blogbusiness.industryE-learning (theory)Information technologyPublic relationsCooperative learningE-learningEducationSettore ING-INF/04 - AutomaticaPolitical scienceBlogbusinessE-learning Education Research methods Cooperative learning BlogDisciplineInformation exchangeResearch methods
researchProduct

Relations between structure and estimators in networks of dynamical systems

2011

The article main focus is on the identification of a graphical model from time series data associated with different interconnected entities. The time series are modeled as realizations of stochastic processes (representing nodes of a graph) linked together via transfer functions (representing the edges of the graph). Both the cases of non-causal and causal links are considered. By using only the measurements of the node outputs and without assuming any prior knowledge of the network topology, a method is provided to estimate the graph connectivity. In particular, it is proven that the method determines links to be present only between a node and its “kins”, where kins of a node consist of …

Discrete mathematicsTheoretical computer scienceDirected graphStrength of a graphSettore ING-INF/04 - AutomaticaLeast squares approximation Network topology Random variables Stochastic processes TopologyGraph (abstract data type)Graph propertyNull graphRandom geometric graphComplement graphConnectivityMathematicsIEEE Conference on Decision and Control and European Control Conference
researchProduct

Challenging aspects in Consensus protocols for networks

2008

Results on consensus protocols for networks are presented. The basic tools and the main contribution available in the literature are considered, together with some of the related challenging aspects: estimation in networks and how to deal with disturbances is considered. Motivated by applications to sensor, peer-to- peer, and ad hoc networks, many papers have considered the problem of estimation in a consensus fashion. Here, the unknown but bounded (UBB) noise affecting the network is addressed in details. Because of the presence of UBB disturbances convergence to equilibria with all equal components is, in general, not possible. The solution of the epsiv-consensus problem, where the states…

Theoretical computer scienceAutomatic controlConsensus problemsWireless ad hoc networkStochastic processEstimation theoryComputer scienceDistributed computingMulti-agent systemConsensus problems; Consensus protocolsConsensus protocolsBounded functionConvergence (routing)Wireless sensor network
researchProduct

In.Line: A Navigation Game for Visually Impaired People

2017

Part 3: Serious Games; International audience; In.line is a novel game based on a navigation system, called ARIANNA (pAth Recognition for Indoor Assisted NavigatioN with Augmented perception, [1]), primarily designed for visually impaired people permitting to navigate and find some points of interests in an indoor and outdoor environment by following a path painted or stuck on the floor. The aim of the game is twofold: (1) let the users learn and familiarize with the system, (2) improve blind people spatial skills to let them learn and acquire an allocentric spatial representation. The impact stands in the possibility of enhancing the social inclusion of a large part of the society that is …

0301 basic medicineeducation.field_of_studyComputer scienceVisually impairedmedia_common.quotation_subjectPopulationNavigation systemGameNavigation03 medical and health sciences030104 developmental biology0302 clinical medicineAssistive technologyHuman–computer interactionPerceptionLine (geometry)Path (graph theory)Spatial representationGame based[INFO]Computer Science [cs]Visually impaired people10. No inequalityeducation030217 neurology & neurosurgerymedia_common
researchProduct

Identification and validation of quasispecies models for biological systems

2009

An identification procedure for biological systems cast as quasi-species models is proposed. Their identification is a challenging problem because of the bilinear dependence on the parameters and their physical constraints. The proposed solution is within the framework of set-membership identification. %The bilinear dependence on parameters of the model and their physical constraints make the present issue challenging. We determine an estimate of the model parameters together with their interval of variability (Uncertainty Intervals), taking into account all the physical constraints. Invalidation/validation is performed on the basis of the predictive capability of the estimated models. The …

IdentificationGeneral Computer ScienceBasis (linear algebra)Systems Biology; Identification; Validation; Set MembershipComputer scienceSystems BiologyMechanical EngineeringSystems biologySystem identificationBilinear interpolationViral quasispeciesInterval (mathematics)Set MembershipSystems Biology Identification Validation Set MembershipSet (abstract data type)Identification (information)Settore ING-INF/04 - AutomaticaControl and Systems EngineeringValidationElectrical and Electronic EngineeringAlgorithm
researchProduct

Approximate-Dynamic Programming for Multi-Retailers Inventory Control

2004

researchProduct

Approximation of the Feasible Parameter Set in worst-case identification of Hammerstein models

2005

The estimation of the Feasible Parameter Set (FPS) for Hammerstein models in a worst-case setting is considered. A bounding procedure is determined both for polytopic and ellipsoidic uncertainties. It consists in the projection of the FPS of the extended parameter vector onto suitable subspaces and in the solution of convex optimization problems which provide Uncertainties Intervals of the model parameters. The bounds obtained are tighter than in the previous approaches. hes.

Mathematical optimizationEstimation theorySystem identificationIdentification (control systems)PolytopeLinear subspaceInterval arithmeticSettore ING-INF/04 - AutomaticaControl and Systems EngineeringBounding overwatchConvex optimizationNonlinear systemsApplied mathematicsElectrical and Electronic EngineeringProjection (set theory)static nonlinearityMathematics
researchProduct

Distributed consensus protocols for coordinating buyers

2003

In this paper, we introduce a distributed consensus protocol for coordinating orders of a network of buyers also called agents/decision makers. Each buyer chooses a different threshold strategy, defining its intention to place an order only if at least other l buyers will do the same. We prove that consensus is reached asymptotically globally and coordination is the same that if the decision making process would be centralized, namely, any decision maker (DM) has access to the thresholds of all other DMs and chooses to order or not. The proposed distributed protocol has the advantage that buyers do not have to communicate their threshold strategy in advance, and consensus is reached without…

EngineeringConsensusbusiness.industryOrder (business)If and only ifDistributed computingDecision-makingbusinessDecision makerProtocol (object-oriented programming)42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475)
researchProduct

About the Stability of Active Queue Management Mechanism

2004

In this paper, we discuss the influence of multiple bottlenecks on the stability of Active Queue Management (AQM) controllers, usually configured on a single bottleneck basis. To see this, we consider a network scenario where RED is configured at each router according to previously developed control theoretic techniques. These configuration rules assure stability in a single bottleneck scenario. Yet, we show that instability may arise when two links become congested. We justify this result through a multiple bottleneck model.

Stability analysis Communication Networks Control Theory
researchProduct

Modeling Energy Demand Aggregators for Residential Consumers

2013

International audience; Energy demand aggregators are new actors in the energy scenario: they gather a group of energy consumers and implement a demand- response paradigm. When the energy provider needs to reduce the current energy demand on the grid, it can pay the energy demand aggregator to reduce the load by turning off some of its consumers loads or postponing their activation. Currently this operation involves only greedy energy consumers like industrial plants. In this paper we want to study the potential of aggregating a large number of small energy consumers like home users as it may happen in smart grids. In particular we want to address the feasibility of such approach by conside…

0209 industrial biotechnologydemand-response paradigm020209 energyEnergy current02 engineering and technologycomputer.software_genre7. Clean energyNews aggregatorload regulation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]020901 industrial engineering & automationdemand side management; load regulation; queueing theory; smart power grids; demand-response paradigm; energy consumers; energy demand aggregator modeling; greedy energy consumers; home users; industrial plants; power load control; queuing theory; residential consumers; smart grids; Delays; Home appliances; Load modeling; Power demand; Sociology; Statistics; Switchesresidential consumerSociologySettore ING-INF/04 - Automatica0202 electrical engineering electronic engineering information engineeringindustrial plantenergy demand aggregator modelingDemand loadSimulationStatisticQueueing theoryDelayLoad modelingdemand side managementSettore ING-INF/03 - Telecomunicazionigreedy energy consumerpower load controlLoad balancing (electrical power)Poisson processEnvironmental economicsGridenergy consumerHome applianceSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSmart gridQueueing theorymart gridLoad regulationqueuing theoryPower demandEnergy demand aggregatorsmart power gridcomputerSwitcheshome user
researchProduct

AQM Generalized Nyquist stability in multiple bottlenecks networks

2005

The influence of multiple bottlenecks on the stability of Active Queue Management (AQM) controllers, usually configured on a single bottleneck basis is discussed. We consider a network scenario where RED is configured at each router according to previously developed control theoretic techniques. These configuration rules assure stability in a single bottleneck scenario. We show that instability may arise when two links become congested. We justify this result through a multiple bottleneck model using the Generalized Nyquist stability criterion.

Stability analysis Communication Networks Control Theory
researchProduct

Dissensus, death and division

2009

The modeling of switching systems describing networks where death and duplication processes occur is described. A dissensus protocol, complementary to consensus protocol, is introduced and the convergence or divergence of the agents' state evolution is studied. We discuss some properties of the topology reached by the network when different rules of duplication and inheritance are implemented.

Impulsive networksHybrid systemsComputer scienceDistributed computingconsnesus problemsSwitching systemsDivision (mathematics)biological modelDivergence (computer science)Consensus protocolsInheritance (object-oriented programming)Settore ING-INF/04 - Automaticaconsnesus problems biological model networksnetworksConvergence (routing)Settore MAT/09 - Ricerca OperativaProtocol (object-oriented programming)Biological models; Consensus protocols; Hybrid systems; Impul-sive networks; Switching systems;Biological models; Consensus protocols; Hybrid systems; Impulsive networks; Switching systemsBiological models2009 American Control Conference
researchProduct

Demo

2017

We present an innovative smartphone-centric tracking system for indoor and outdoor environments, based on the joint utilization of dead-reckoning and computer vision (CV) techniques. The system is explicitly designed for visually impaired people (although it could be easily generalized to other users) and it is built under the assumption that special reference signals, such as painted lines, colored tapes or tactile pavings are deployed in the environment for guiding visually impaired users along pre-defined paths. Thanks to highly optimized software, we are able to execute the CV and sensor-fusion algorithms in run-time on low power hardware such as a normal smartphone, precisely tracking …

0301 basic medicineSensor FusionComputer scienceVisually impairedbusiness.industry05 social sciencesTracking systemSensor fusionNavigation03 medical and health sciencesComputer Networks and Communication030104 developmental biologySoftwareColoredHardware and ArchitectureLocalization0501 psychology and cognitive sciencesComputer visionArtificial intelligenceVisually ImpairedbusinessJoint (audio engineering)Software050107 human factorsProceedings of the 23rd Annual International Conference on Mobile Computing and Networking
researchProduct

Cooperative Inventory control

2005

In multi-retailer inventory control the possibility of sharing setup costs motivates communication and coordination among the retailers. We solve the problem of finding suboptimal distributed reordering policies that minimize setup, ordering, storage, and shortage costs incurred by the retailers over a finite horizon. Neuro-dynamic programming (NDP) reduces the computational complexity of the solution algorithm from exponential to polynomial on the number of retailers.

Inventory controlConsensus protocol; Inventory level; Nash equilibrium; Setup cost; Supply chain;Inventory levelPolynomialMathematical optimizationComputational complexity theoryComputer scienceSetup costSupply chainEconomic shortageFinite horizonSupply chainConsensus protocolNash equilibriumExponential functionComputingMilieux_GENERALsymbols.namesakeNash equilibriumsymbols
researchProduct

MECHANISM DESIGN FOR OPTIMAL CONSENSUS PROBLEMS

2006

We consider stationary consensus protocols for networks of dynamic agents with fixed and switching topologies. At each time instant, each agent knows only its and its neighbors’ state, but must reach consensus on a group decision value that is function of all the agents’ initial state.We show that our protocol design is the solution of individual optimizations performed by the agents. This notion suggests a game theoretic interpretation of consensus problems as mechanism design problems. Under this perspective a supervisor entails the agents to reach a consensus by imposing individual objectives. We prove that such objectives can be chosen so that rational agents have a unique optimal proto…

Mathematical optimizationMechanism designDynamic agentsComputer sciencemedia_common.quotation_subjectDistributed computingmechanismcontainment controlRational agentStationary consensus protocolsNetwork topologyTopologyUniform consensusComputer Science::Multiagent SystemsSwitching topologiesComputer Science::Systems and ControlDynamic agents; Protocol design; Stationary consensus protocols; Switching topologiesSettore MAT/09 - Ricerca OperativaFunction (engineering)Protocol designProtocol (object-oriented programming)Game theoryMulti agent systemsmedia_common
researchProduct

AQM generalized nyquist stability in multiple bottleneck networks

2005

Abstract The influence of multiple bottlenecks on the stability of Active Queue Management (AQM) controllers, usually configured on a single bottleneck basis is discussed. We consider a network scenario where RED is configured at each router according to previously developed control theoretic techniques. These configuration rules assure stability in a single bottleneck scenario. We show that instability may arise when two links become congested. We justify this result through a multiple bottleneck model using the Generalized Nyquist stability criterion.

RouterBasis (linear algebra)Communication networks; Control theory; Stability analysis;Control theoryNyquist stability criterionStability (learning theory)Active queue managementTelecommunications networkBottleneckMathematics
researchProduct

PARAMETER BOUNDED ESTIMATION FOR QUASISPECIES MODELS OF MOLECULAR EVOLUTION

2006

Abstract The Quasispecies models identification for Evolutionary Dynamics is considered in a worst-case deterministic setting. These models analyze the DNA and RNA evolution or describe the population dynamics of viruses and bacteria. In this paper we identify the Fitness and the Replication Probability parameters of a genetic sequences, subject to a set of stringent constraints to have physical meaning and to guarantee positiveness. The conditional central estimate and the Uncertainty Intervals are determined. The effectiveness of the proposed procedure has been illustrated by means of simulation experiments while tests on real data are under concern.

Set (abstract data type)education.field_of_studyMathematical optimizationIdentification (information)Molecular evolutionBounded functionPopulationReplication (statistics)Viral quasispeciesBiologyeducationEvolutionary dynamicsIFAC Proceedings Volumes
researchProduct

The role of the Access Point in Wi-Fi networks with selfish nodes

2009

In Wi-Fi networks, mobile nodes compete for accessing the shared channel by means of a random access protocol called Distributed Coordination Function (DCF), which is long term fair. But recent drivers allow users to configure protocol parameters differently from their standard values in order to break the protocol fairness and obtain a larger share of the available bandwidth at the expense of other users. This motivates a game theoretical analysis of DCF. Previous studies have already modeled access to a shared wireless channel in terms of non-cooperative games among the nodes, but they have mainly considered ad hoc mode operation. In this paper we consider the role of the Access Point (AP…

Computer scienceWireless ad hoc networkBidirectional trafficDistributed computingmedia_common.quotation_subjectMechanism designThroughputDistributed coordination functionNash equilibriumWi-fi networks[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE 802.11Settore ING-INF/04 - Automaticaselfish nodesSelfishnessmedia_commonIEEE 802.11business.industrySettore ING-INF/03 - TelecomunicazioniNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWLAN; selfish nodesWLANbusinessRandom accessComputer network
researchProduct

HLPV Identication in wireless ad hoc networks

2013

Hybrid systems are dynamical systems consisting of components with con- tinuous and discrete behavior and thus they have required a new hybrid systems and control theory that has been developed in the past years and is still an active research topic. Motivated by a practical example, the tra c ow in wireless ad hoc network model, we derive Hybrid LPV modeling and identi cation techniques. Finally we show simulation results of o line identi cation and possible future algorithms.

Hybrid systems identi cation LPV wireless ad-hoc networkSettore ING-INF/04 - Automatica
researchProduct

A Navigation and Augmented Reality System for Visually Impaired People

2021

In recent years, we have assisted with an impressive advance in augmented reality systems and computer vision algorithms, based on image processing and artificial intelligence. Thanks to these technologies, mainstream smartphones are able to estimate their own motion in 3D space with high accuracy. In this paper, we exploit such technologies to support the autonomous mobility of people with visual disabilities, identifying pre-defined virtual paths and providing context information, reducing the distance between the digital and real worlds. In particular, we present ARIANNA+, an extension of ARIANNA, a system explicitly designed for visually impaired people for indoor and outdoor localizati…

navigation; visually impaired; computer vision; augmented reality; cultural context; convolutional neural network; machine learning; hapticExploitComputer scienceconvolutional neural networkImage processingContext (language use)02 engineering and technologyTP1-1185BiochemistryConvolutional neural networkArticleMotion (physics)computer visionAnalytical ChemistrySettore ING-INF/04 - AutomaticaArtificial IntelligenceHuman–computer interactioncultural context0202 electrical engineering electronic engineering information engineeringHumansElectrical and Electronic EngineeringnavigationInstrumentationHaptic technologySettore ING-INF/03 - TelecomunicazioniChemical technology020206 networking & telecommunicationsAtomic and Molecular Physics and Opticsaugmented realitymachine learning020201 artificial intelligence & image processingAugmented realityvisually impairedNeural Networks ComputerhapticAlgorithmsVisually Impaired PersonsPATH (variable)augmented reality computer vision convolutional neural network cultural context haptic machine learning navigation visually impaired Algorithms Artificial Intelligence Humans Neural Networks Computer Augmented Reality Visually Impaired PersonsSensors
researchProduct

Sensor Fusion Localization and Navigation for Visually Impaired People

2018

In this paper, we present an innovative cyber physical system for indoor and outdoor localization and navigation, based on the joint utilization of dead-reckoning and computer vision techniques on a smartphone-centric tracking system. The system is explicitly designed for visually impaired people, but it can be easily generalized to other users, and it is built under the assumption that special reference signals, such as colored tapes, painted lines, or tactile paving, are deployed in the environment for guiding visually impaired users along pre-defined paths. Differently from previous works on localization, which are focused only on the utilization of inertial sensors integrated into the s…

Control and OptimizationExploitSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industry05 social sciencesCyber-physical system020206 networking & telecommunicationsTracking system02 engineering and technologySensor fusionColoredControl and Systems EngineeringInertial measurement unit0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesComputer visionArtificial intelligencebusinessJoint (audio engineering)Image resolution050107 human factors2018 European Control Conference (ECC)
researchProduct

Identification of linear parameter varying models

2002

We consider identification of a certain class of discrete-time nonlinear systems known as linear parameter varying system. We assume that inputs, outputs and the scheduling parameters are directly measured, and a form of the functional dependence of the system coefficients on the parameters is known. We show how this identification problem can be reduced to a linear regression, and provide compact formulae for the corresponding least mean square and recursive least-squares algorithms. We derive conditions on persistency of excitation in terms of the inputs and scheduling parameter trajectories when the functional dependence is of polynomial type. These conditions have a natural polynomial i…

Mechanical EngineeringGeneral Chemical EngineeringBiomedical EngineeringAerospace EngineeringIndustrial and Manufacturing EngineeringPolynomial interpolationScheduling (computing)Parameter identification problemLeast mean squares filterNonlinear systemControl and Systems EngineeringControl theoryLinear regressionApplied mathematicsElectrical and Electronic EngineeringMathematicsInternational Journal of Robust and Nonlinear Control
researchProduct

Adaptive quadratic regularization for baseline wandering removal in wearable ECG devices

2016

The electrocardiogram (ECG) is one of the most important physiological signals to monitor the health status of a patient. Technological advances allow the size and weight of ECG acquisition devices to be strongly reduced so that wearable systems are now available, even though the computational power and memory capacity is generally limited. An ECG signal is affected by several artifacts, among which the baseline wandering (BW), i.e., a slowly varying variation of its trend, represents a major disturbance. Several algorithms for BW removal have been proposed in the literature. In this paper, we propose new methods to face the problem that require low computational and memory resources and th…

Signal processingmedicine.diagnostic_testComputer scienceReal-time computingWearable computerRegularization (mathematics)030218 nuclear medicine & medical imagingPower (physics)03 medical and health sciences0302 clinical medicineQuadratic equationmedicineBaseline (configuration management)Electrocardiography030217 neurology & neurosurgerySimulation
researchProduct

LPV Model Identification For The Stall And Surge Control of a Jet Engine

2001

Abstract The problem of identifying discrete-time Linear Parameter Varying (LPV) models of non-linear or time-varying systems for gain scheduling control is considered assuming that inputs, outputs and the scheduling parameters are measured, and a form of the functional dependence of the coefficients on the parameters is known. The identification procedure is applied to the controlled model of compressors for jet engines. The model is controlled in order to avoid rotating stall and surge. Aim of the present paper is to identify the LPV model based on the nonlinear model of compressors in order to design a robust gain scheduling predictive controller.

Engineeringbusiness.industrySystem identificationStall (fluid mechanics)Control engineeringJet enginelaw.inventionScheduling (computing)Gain schedulinglawControl theorySurgebusinessGas compressorSurge controlIFAC Proceedings Volumes
researchProduct

OLS Identification of network topologies

2011

Abstract In many applications, it is important to derive information about the topology and the internal connections of more dynamical systems interacting together. Examples can be found in fields as diverse as Economics, Neuroscience and Biochemistry. The paper deals with the problem of deriving a descriptive model of a network, collecting the node outputs as time series with no use of a priori insight on the topology. We cast the problem as the optimization of a cost function where a set of parameters are used to operate a trade-off between accuracy and complexity in the final model. The problem of reducing the complexity is addressed by fixing a certain degree of sparsity and finding the…

Mathematical optimizationtopologyDynamical systems theoryNode (networking)Topology (electrical circuits)topology networks identificationFunction (mathematics)Network topologySet (abstract data type)Identification (information)Settore ING-INF/04 - Automaticatopology; networks; identificationnetworksidentificationA priori and a posterioriMathematicsIFAC Proceedings Volumes
researchProduct

Dealing with uncertainty in consensus protocol

2009

Recent results on Consensus protocols for networks are presented. The basic tools and the main contribution available in the literature are considered, together with some of the related challenging aspects: estimation in networks and how to deal with disturbances is considered. Motivated by applications to sensor, peer-to-peer, and ad hoc networks, many papers have considered the problem of estimation in a consensus fashion. Here, the Unknown But Bounded (UBB) noise affecting the network is addressed in details. Because of the presence of UBB disturbances convergence to equilibria with all equal components is, in general, not possible. The solution of the $\epsilon$-consensus problem, where…

Settore ING-INF/04 - AutomaticaConsensus protocol optimizazion disturbancesSettore MAT/09 - Ricerca Operativa
researchProduct

Dealing with uncertainty in consensus protocols

2009

Recent results on consensus protocols for networks are presented. The basic tools and the main contribution available in the literature are considered, together with some of the related challenging aspects: estimation in networks and how to deal with disturbances is considered. Motivated by applications to sensor, peer-to-peer, and ad hoc networks, many papers have considered the problem of estimation in a consensus fashion. Here, the Unknown But Bounded (UBB) noise affecting the network is addressed in details. Because of the presence of UBB disturbances convergence to equilibria with all equal components is, in general, not possible. The solution of the e-consensus problem, where the stat…

Mathematical optimizationConsensusWireless ad hoc networkComputer scienceDistributed computingBounded functionConvergence (routing)Consensus protocol; optimizazion; disturbancesNoise (video)Laplacian matrixFocus (optics)Uniform consensus
researchProduct

Enhancing tracking performance in a smartphone-based navigation system for visually impaired people

2016

In this paper we show how to enhance the tracking performance of Arianna, a low-cost augmented reality system designed to meet the needs of people with problems of orientation, people with sight impairment and blind people. For augmented reality system we mean the design of: i) a set of paths and tags to be deployed in the environment, realized in various ways depending on the context (decorative elements easily identifiable, colorful stripes, QR code, RFID, etc.); ii) an instrument of mediation between the reality and the user (typically a smartphone) to access the information disseminated in the environment by means of a camera and provide a vibration feedback signal to the users for foll…

0209 industrial biotechnologyEngineeringControl and OptimizationOptical flowContext (language use)02 engineering and technologycyber-physical systemscyber-physical systemoptical flow020901 industrial engineering & automationassistive technology0202 electrical engineering electronic engineering information engineeringComputer visionSet (psychology)Settore ING-INF/03 - Telecomunicazionibusiness.industryOrientation (computer vision)Cyber-physical systemNavigation systemfilteringSightassistive technology; cyber-physical systems; filtering; navigation system; optical flow; vibration; Control and Systems Engineering; Control and Optimization; Modeling and SimulationAssistive technologyControl and Systems EngineeringModeling and Simulationnavigation system020201 artificial intelligence & image processingAugmented realityArtificial intelligencevibrationbusiness2016 24th Mediterranean Conference on Control and Automation (MED)
researchProduct

HL7v3 CDA Rel.2 Patient Summary and Chronic Care Model: Localization experience and GP/HS Integration Project

2010

The localization experience for the Patient Summary, based on the Health Level Seven Version 3 (HL7v3) Clinical Document Architecture, Release 2 (CDA Rel.2), is presented. An overview of the Chronic Care Model (CCM) is introduced with particular attention to the clinical information systems, in order to organize patient and population clinical data by sharing information among healthcare providers in management of chronic diseases. We propose, as case study, a project for the integration of various services for General Practitioners (GP) and Hospital Specialists (HS), accessing the Electronic Health Record (EHR), implementing the Patient Summary and managing the exchange of Chronic Care med…

Chronic careSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studybusiness.industryMedical recordPopulationInteroperabilityCommunities Hospitals Standards developmentContext (language use)computer.file_formatClinical Document Architecturemedicine.diseaseSettore ING-INF/04 - AutomaticaHealth caremedicineNormativeMedical emergencyeducationbusinesscomputer
researchProduct

LPV models: Identification for gain scheduling control

2001

In this paper the use of discrete-time Linear Parameter Varying (LPV) models for the gain scheduling control and identification methods for non-linear or time-varying system is considered. We report an overview on the existing literature on LPV systems for gain scheduling control and identification. Moreover, assuming that inputs, outputs and the scheduling parameters are measured, and a form of the functional dependence of the coefficients on the parameters is known, we show how the identification problem can be reduced to a linear regression so that a Least Mean Square and Recursive Least Square identification algorithm can be reformulated. Our methodology is applied for the identificatio…

EngineeringMathematical optimizationbusiness.industryGain scheduling control; identification for nonlinear systems; LPV models;Jet enginelaw.inventionScheduling (computing)Least mean squares filterParameter identification problemGain schedulingControl theoryRobustness (computer science)lawLinear regressionbusinessSurge control2001 European Control Conference (ECC)
researchProduct

Distributed Consensus in Networks of Dynamic Agents

2006

Stationary and distributed consensus protocols for a network of n dynamic agents under local information is considered. Consensus must be reached on a group decision value returned by a function of the agents' initial state values. As a main contribution we show that the agents can reach consensus if the value of such a function computed over the agents' state trajectories is time invariant. We use this basic result to introduce a protocol design rule allowing consensus on a quite general set of values. Such a set includes, e.g., any generalized mean of order p of the agents' initial states. We demonstrate that the asymptotical consensus is reached via a Lyapunov approach. Finally we perfor…

Asymptotic stability; Distributed consensus protocolsEngineeringMathematical optimizationAsymptotic stabilitybusiness.industryFunction (mathematics)Network topologyUniform consensusComputer Science::Multiagent SystemsLTI system theorySet (abstract data type)Distributed consensus protocolsConsensusExponential stabilityComputer Science::Systems and ControlControl theoryexperimental mechanics Fourier transform load stepping photoelasticityGeneralized meanbusinessProceedings of the 44th IEEE Conference on Decision and Control
researchProduct

Privacy-Preserving Overgrid: Secure Data Collection for the Smart Grid

2020

In this paper, we present a privacy-preserving scheme for Overgrid, a fully distributed peer-to-peer (P2P) architecture designed to automatically control and implement distributed Demand Response (DR) schemes in a community of smart buildings with energy generation and storage capabilities. To monitor the power consumption of the buildings, while respecting the privacy of the users, we extend our previous Overgrid algorithms to provide privacy preserving data aggregation (PP-Overgrid). This new technique combines a distributed data aggregation scheme with the Secure Multi-Party Computation paradigm. First, we use the energy profiles of hundreds of buildings, classifying the amount of &ldquo

Overlay networksComputer scienceDistributed computingOverlay networkSmart grid02 engineering and technologylcsh:Chemical technologyBiochemistryArticlePeer to peerAnalytical ChemistryDemand response0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringSecret sharingInstrumentationOvergridBuilding automationP2P020203 distributed computingbusiness.industryDistributed; Gossiping; Overgrid; Overlay networks; P2P; Peer to peer; Privacy; Secret sharing; Smart grid020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsRenewable energyDistributedElectricity generationSmart gridPrivacyGossipingbusinessSensors
researchProduct

Lazy consensus for network with unknown but bounded noise

2007

researchProduct

Existence and Optimality of Nash Equilibria in Inventory Games

2005

Abstract This paper studies the stability and optimality of a distributed consensus protocol for n -player repeated non cooperative games under incomplete information. At each stage, the players choose binary strategies and incur in a payoff monotonically decreasing with the number of active players. The game is specialized to an inventory application, where fixed costs are shared among all retailers, interested in whether reordering or not from a common warehouse. The authors focus on Pareto optimality as a measure of coordination of reordering strategies, proving that there exists a unique Pareto optimal Nash equilibrium that verifies certain stability conditions.

TheoryofComputation_MISCELLANEOUSComputer Science::Computer Science and Game TheoryNon-cooperative gameMathematical optimizationStochastic gameTheoryofComputation_GENERALInventory control Stability Optimality Nash equilibriumInventory control; Nash equilibrium; Optimality; Stability;symbols.namesakeNash equilibriumBest responseRepeated gamesymbolsEconomicsCoordination gameEpsilon-equilibriumRisk dominanceMathematical economics
researchProduct

Enabling Primary and Specialist Care Interoperability Through HL7 CDA Release 2 and the Chronic Care Model: An Italian Case Study

2012

Interoperability is the key to enable clinical information systems for General Practitioners (GP) and Hospital Specialists (HS) in order to exchange and manage the Chronic Care Models (CCM) medical records, Patient Summary (PS), and Electronic Prescription (e-Prescription) documents while accessing the electronic health record. We present a localization experience for PS and e-prescription, based on the Health Level Seven Version 3 Clinical Document Architecture Release 2, developed for Italian healthcare. We describe also an experience on the implementation of CCM for sharing patient clinical data among healthcare providers in the management of diagnostic and therapeutic pathways for chron…

InteroperabilityContext (language use)Clinical Document ArchitectureHealth careDiabetes; Electronic medical prescriptions; Electronic medical records; Health information managementmedicineDiabetes Electronic medical prescriptions Electronic medical records Health information managementElectrical and Electronic EngineeringMedical prescriptionElectronic medical recordsChronic careElectronic medical prescriptionsbusiness.industryMedical recordDiabetescomputer.file_formatmedicine.diseaseComputer Science ApplicationsHuman-Computer InteractionHealth information managementControl and Systems EngineeringNormativeMedical emergencybusinesscomputerSoftwareIEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
researchProduct

Smart plugs: A low cost solution for programmable control of domestic loads

2014

International audience; Balancing energy demand and production is becoming a more and more challenging task for energy utilities. This is due to a number of different reasons among which the larger penetration of renewable energies which are more difficult to predict and the meagre availability of financial resources to upgrade the existing power grid. While the traditional solution is to dynamically adapt energy production to follow the time-varying demand, a new trend is to drive the demand itself by means of Direct Load Control (DLC). In this paper we consider a scenario where DLC functionalities are deployed at a large set of small deferrable energy loads, like appliances of residential…

EngineeringEnergy demandbusiness.industry[SPI.NRJ]Engineering Sciences [physics]/Electric powerComputer Science (all)direct load controlEnergy Engineering and Power TechnologySettore ING-INF/01 - ElettronicaRenewable energy[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]UpgradeEngineering (all)smart plugsLogic gateEmbedded systemServerThe InternetPower gridM2MbusinessActuatorInstrumentation
researchProduct

About the stability of active queue management mechanisms

2004

In this paper, we discuss the influence of multiple bottlenecks on the stability of active queue management (AQM) controllers, usually configured on a single bottleneck basis. To see this, we consider a network scenario where RED is configured at each router according to previously developed control theoretic techniques. These configuration rules assure stability in a single bottleneck scenario. Yet, we show that instability may arise when two links become congested. We justify this result through a multiple bottleneck model.

RouterEngineeringQueueing theorybusiness.industryControl (management)Stability (learning theory)Active queue managementbusinessBottleneckComputer networkProceedings of the 2004 American Control Conference
researchProduct

Identification of Replicator Mutator models

2006

The complexity of biology literally calls for quantitative tools in order to support and validate biologists intuition and traditional qualitative descriptions. In this paper, the Replicator-Mutator models for Evolutionary Dynamics are validated/invalidated in a worst-case deterministic setting. These models analyze the DNA and RNA evolution or describe the population dynamics of viruses and bacteria. We identify the Fitness and the Replication Probability parameters of a genetic sequences, subject to a set of stringent constraints to have physical meaning and to guarantee positiveness. The conditional central estimate is determined in order to validate/invalidate the model. The effectivene…

education.field_of_studyTheoretical computer sciencePopulationGenomicsPositive systemsBioinformaticsSet (abstract data type)Identification (information)virus populationsModels of DNA evolutionReplication (statistics)VirusesRNA VirusesEvolutionary dynamicseducationBiomedical systems; Evolutionary dynamics; Nonlinear systems; Positive systems; Uncertain dynamical systems;
researchProduct

Decentralized Synchronization for Zigbee wireless sensor networks in Multi-Hop Topology

2010

Abstract The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. We analyze the Zigbee MAC performance in sensor networks deployed in multi-hop topologies. For this networks, critical inefficiencies can arise due to transmissions performed by hidden nodes. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network capacity and in terms of energy consumption. We show how the synchronization function can be opportunistica…

Engineeringsensor networks; synchronization; zigbeeWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniGeneral MedicineEnergy consumptionsensor networks synchronization zigbeeNetwork topologyzigbeeKey distribution in wireless sensor networksSettore ING-INF/04 - Automaticasensor networksComputer Science::Networking and Internet ArchitectureMobile wireless sensor networkNetwork performanceSettore MAT/09 - Ricerca OperativabusinessWireless sensor networksynchronizationNeuRFonComputer network
researchProduct

A game theoretic approach to MAC design for infrastructure networks

2010

Wireless network operation intrinsically assumes different forms of cooperation among the network nodes, such as sharing a common wireless medium without interfering, relaying frames belonging to other nodes, controlling the transmission power for optimizing spectrum reuse, coding cooperatively multiple frames for improving information redundancy, and so on. For this reason, Game Theory has been extensively employed to model wireless networks. In particular, we propose a game-theoretic approach for defining a generalized medium access protocol for slotted contention-based channels. Contention-based channels are largely adopted in data networks, e.g. in WiFi and WiMax networks and in some em…

game theorySettore ING-INF/03 - TelecomunicazioniComputer scienceWireless networkbusiness.industryDistributed computingNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSnetworks wifi game theoryThroughputnetworks; wifi; game theoryWiMAXShared resourceBase stationSettore ING-INF/04 - AutomaticaBest responsenetworksTelecommunications linkwifiWirelessbusinessGame theoryCommunication channelComputer network
researchProduct

Model Identification of a Network as Compressing Sensing

2013

In many applications, it is important to derive information about the topology and the internal connections of dynamical systems interacting together. Examples can be found in fields as diverse as Economics, Neuroscience and Biochemistry. The paper deals with the problem of deriving a descriptive model of a network, collecting the node outputs as time series with no use of a priori insight on the topology, and unveiling an unknown structure as the estimate of a "sparse Wiener filter". A geometric interpretation of the problem in a pre-Hilbert space for wide-sense stochastic processes is provided. We cast the problem as the optimization of a cost function where a set of parameters are used t…

IdentificationReduced modelTheoretical computer scienceGeneral Computer ScienceDynamical systems theoryComputer scienceNetworkTopology (electrical circuits)Dynamical Systems (math.DS)Systems and Control (eess.SY)Set (abstract data type)symbols.namesakeFOS: MathematicsFOS: Electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringMathematics - Dynamical SystemsMathematics - Optimization and ControlMathematics - General TopologySparsificationMechanical EngineeringWiener filterSystem identificationGeneral Topology (math.GN)Function (mathematics)Compressive sensingIdentification (information)Compressed sensingControl and Systems EngineeringOptimization and Control (math.OC)symbolsIdentification; Sparsification; Reduced models; Networks; Compressive sensingComputer Science - Systems and Control
researchProduct

MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach

2011

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…

FOS: Computer and information sciencesgame theorycheating nodeaccess protocolsmobile nodesComputer sciencegame-theoretic approachMAC designDistributed coordination functionUpload[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]MAC protocolschannel access policyComputer Science - Computer Science and Game TheoryFOS: MathematicsElectrical and Electronic EngineeringMathematics - Optimization and Controlwireless LANdistributed coordination functionMechanism designcheating nodesWiFi infrastructure networksbusiness.industryApplied MathematicsNode (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiFi; cheating nodes; game theory; MAC protocolsComputer Science ApplicationsShared resourceprogrammable cardsOptimization and Control (math.OC)game-theoretic analysisBest responserandom access schemebusinessrandom access protocolRandom accessCommunication channelComputer networkComputer Science and Game Theory (cs.GT)
researchProduct

Identification of Distributed Systems with Logical Interaction Structure

2012

This paper focuses on the structure identification problem for a class of networked systems, where the interaction among components or agents is described through logical maps. In particular, agents are heterogeneous cooperating systems, i.e. they may have different individual dynamics and different interaction rules depending on input events. While we assume that the individual agents' dynamics are known, each agent has partial knowledge of the logical map encoding the interaction of another agent with its neighbors. Based on the so-called algebraic normal form for binary functions, we present a technique by which the network structure described by a logical function can be dynamically est…

Partial knowledgeTheoretical computer scienceInteraction ruleDistributed computingBinary numberClass (philosophy)Individual dynamicAlgebraic normal formLogical functionAlgebraic normal forms; Binary functions; Cooperating systems; Distributed systems; Individual agent; Individual dynamics; Interaction rules; Interaction structures; Logical functions; Logical maps; Lower approximation; Network structures; Networked systems; Partial knowledge; Real systems; Structure identification; Truth tablesBinary functionSettore ING-INF/04 - AutomaticaLogical mapMathematicsCooperating systemStructure (mathematical logic)Networked systemStructure identificationTruth tablesTruth tableMobile robotReal systemParameter identification problemAlgebraic normal formIdentification (information)Lower approximationInteraction structureIndividual agentDistributed systemNetwork structure
researchProduct

Identification of linear parameter varying models

2003

We consider the problem of identifying discrete-time linear parameter varying models of nonlinear or time-varying systems. We assume that inputs, outputs and the scheduling parameters are measured, and a form of the functional dependence of the coefficients on the parameters. We show how the identification problem can be reduced to a linear regression, and we give conditions on persistency of excitation in terms of the inputs and parameter trajectories.

Parameter identification problemNonlinear systemIdentification (information)Control theoryMatrix algebraLinear regressionLinear systemScheduling (production processes)Applied mathematicsExcitationMathematics
researchProduct

Active queue management stability in multiple bottleneck networks

2004

In this paper, we show that the active queue management (AQM) controllers, usually configured on a single bottleneck basis, may not prevent instability in the presence of multiple bottlenecks. We justify this result through a multiple bottleneck model.

Queueing theoryAQM algorithmQueue management systemComputer sciencebusiness.industryDistributed computingStability (learning theory)Active queue managementBottleneckNetwork traffic controlManagementNetwork congestionCongestion control (communication)businessComputer network managementComputer network
researchProduct

LPV model identification for gain scheduling control: An application to rotating stall and surge control problem

2006

Abstract We approach the problem of identifying a nonlinear plant by parameterizing its dynamics as a linear parameter varying (LPV) model. The system under consideration is the Moore–Greitzer model which captures surge and stall phenomena in compressors. The control task is formulated as a problem of output regulation at various set points (stable and unstable) of the system under inputs and states constraints. We assume that inputs, outputs and scheduling parameters are measurable. It is worth pointing out that the adopted technique allows for identification of an LPV model's coefficients without the requirements of slow variations amongst set points. An example of combined identification…

decentralized controlEngineeringbusiness.industryApplied MathematicsSystem identificationStall (fluid mechanics)Control engineeringconsensus protocolOptimal controlconsensus protocolsDecentralised systemComputer Science Applicationsoptimal controlNonlinear systemGain schedulingControl and Systems EngineeringControl theorynetworksSettore MAT/09 - Ricerca OperativaElectrical and Electronic EngineeringSurgebusinessSurge controlconsensus protocols; decentralized control; optimal control; networksControl Engineering Practice
researchProduct

Performance analysis of selfish access strategies on WiFi infrastructure networks

2009

In this paper we propose a game-theoretic approach for characterizing WiFi network performance in presence of intelligent nodes employing cognitive functionalities. We assume that a cognitive WiFi node is aware of its application requirements and is able to dynamically estimate the network status, in order to dynamically change its access strategy by tuning the contention window settings. We prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium conditions, which are also Pareto optimal. Indeed, we show that the station strategies converge toward values which maximize a per-node uti…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - Telecomunicazionimedia_common.quotation_subjectDistributed computingNode (networking)Physical layerThroughputGame theory distributed wifi networksGame theory; distributed; wifi networksSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkdistributedFunction (engineering)businessGame theoryGame theorywifi networksmedia_commonComputer network
researchProduct

An Indoor and Outdoor Navigation System for Visually Impaired People

2019

In this paper, we present a system that allows visually impaired people to autonomously navigate in an unknown indoor and outdoor environment. The system, explicitly designed for low vision people, can be generalized to other users in an easy way. We assume that special landmarks are posed for helping the users in the localization of pre-defined paths. Our novel approach exploits the use of both the inertial sensors and the camera integrated into the smartphone as sensors. Such a navigation system can also provide direction estimates to the tracking system to the users. The success of out approach is proved both through experimental tests performed in controlled indoor environments and in r…

General Computer ScienceComputer scienceVisually impairedComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologydead reckoning01 natural sciencescomputer visionInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceComputer visionbusiness.industryDeep learning010401 analytical chemistryGeneral EngineeringNavigation system020206 networking & telecommunicationsTracking systemKalman filterNavigation0104 chemical sciencesvisually impairedArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringbusinessKalman filteringlcsh:TK1-9971IEEE Access
researchProduct

Approximation of Feasible Parameter Set in worst case identification of block-oriented nonlinear models

2003

Abstract The estimation of the Feasible Parameter Set for block-oriented nonlinear models in a worst case setting is considered. A bounding procedure is determined both for polytopic and ellipsoidie sets, consisting in the projection of the FPS ⊂ R MN of the extended parameter vector onto suitable M or N-dimensional subspaces and in the solution of convex optimization problems which provide the extreme points of the Parameter Uncertainties Intervals of the model parameteres. Bounds obtained are tighter then in the previous approaches.

Set (abstract data type)Nonlinear systemMathematical optimizationBounding overwatchConvex optimizationApplied mathematicsExtreme pointLinear subspaceProjection (linear algebra)MathematicsBlock (data storage)
researchProduct

Consensus for networks with unknown but bounded disturbances

2009

We consider stationary consensus protocols for networks of dynamic agents. The measure of the neighbors' states is affected by unknown but bounded disturbances. Here the main contribution is the formulation and solution of what we call the $\epsilon$-consensus problem, where the states are required to converge in a target set of radius $\epsilon$ asymptotically or in finite time. We introduce as a solution a dead-zone policy that we denote as the lazy rule.

Networks; UBB; Consensus; Dynamic AgentsMathematical optimizationConsensusControl and OptimizationApplied MathematicsDynamic Agentsnetworks; unknown but bounded; consensus; dynamic agentsUBBRadiusdynamic agentsMeasure (mathematics)Set (abstract data type)unknown but boundedSettore ING-INF/04 - AutomaticaconsensusnetworksBounded functionNetworks UBB Consensus Dynamic AgentsApplied mathematicsNetworksFinite timeMathematics
researchProduct

Application of model quality evaluation to systems biology

2008

Application of model quality evaluation to the quasispecies models is presented. These models are useful for the analysis of the DNA and RNA evolution and for the description of the population dynamics of viruses and bacteria. An estimate of the parameters together with their interval of variability is computed and the quality evaluation is tested on the basis of the model prediction error capability.

Computer sciencemedia_common.quotation_subjectSystems biologyset membershipPopulationViral quasispeciesInterval (mathematics)Computational biologycomputer.software_genreSettore ING-INF/04 - AutomaticaModels of DNA evolutionmolecular biophysicsQuality (business)educationgenetics microorganismsmedia_commoneducation.field_of_studyDNA; biochemistry evolution (biological); genetics microorganisms; molecular biophysics; reaction kinetics; identification; set membership; optimizationBasis (linear algebra)Estimation theoryDNADNA biochemistry evolution (biological) genetics microorganisms molecular biophysics reaction kinetics identification set membership optimizationbiochemistry evolution (biological)identificationreaction kineticsData miningcomputeroptimization
researchProduct

Large Scale Control of Deferrable Domestic Loads in Smart Grids

2016

International audience; In this paper, we investigate a realistic and low-cost deployment of large scale direct control of inelastic home appliances whose energy demand cannot be shaped, but simply deferred. The idea is to exploit 1) some simple actuators to be placed on the electric plugs for connecting or disconnecting appliances with heterogeneous control interfaces, including non-smart appliances, and 2) the Internet connections of customers for transporting the activation requests from the actuators to a centralized controller. Our solution requires no interaction with home users: in particular, it does not require them to express their energy demand in advance. A queuing theory model …

EngineeringGeneral Computer ScienceExploitQueuing analysis020209 energyDistributed computingReal-time computing02 engineering and technology7. Clean energySettore ING-INF/04 - AutomaticaControl theory0202 electrical engineering electronic engineering information engineering[INFO.INFO-SY]Computer Science [cs]/Systems and Control [cs.SY]Queueing theoryLoad managementLoad modelingbusiness.industrySettore ING-INF/03 - TelecomunicazioniQuality of serviceScale (chemistry)[SPI.NRJ]Engineering Sciences [physics]/Electric powerComputer Science (all)Smart gridsLoad management; Load modeling; Power demand; Queuing analysis; Smart grids;Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSmart gridSoftware deploymentPower demandThe Internetbusiness
researchProduct

Resource sharing optimality in WiFi infrastructure networks

2009

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. Assuming that a contending node can dynamically change its strategy, by tuning its contention parameters to non-standard values on the basis of channel observations, we prove that, for infrastructure networks with bidirectional traffic and homogeneous application requirements, selfish access strategies are able to reach equilibrium condi…

Computer sciencebusiness.industryBidirectional trafficSettore ING-INF/03 - TelecomunicazioniDistributed computingNode (networking)ThroughputDistributed coordination functionShared resourceSettore ING-INF/04 - AutomaticaWireless lanTelecommunications linkMobile telephonybusinessGame theory Mechanism Design WiFi Infrastructure NetworksRandom accessCommunication channelComputer network
researchProduct

Regularized LMS methods for baseline wandering removal in wearable ECG devices

2016

The acquisition of electrocardiogram (ECG) signals by means of light and reduced size devices can be usefully exploited in several health-care applications, e.g., in remote monitoring of patients. ECG signals, however, are affected by several artifacts due to noise and other disturbances. One of the major ECG degradation is represented by the baseline wandering (BW), a slowly varying change of the signal trend. Several BW removal algorithms have been proposed into the literature, even though their complexity often hinders their implementation into wearable devices characterized by limited computational and memory resources. In this study, we formalize the BW removal problem as a mean-square…

0209 industrial biotechnologyEngineeringbusiness.industrySpeech recognitionReal-time computingApproximation algorithmWearable computer020206 networking & telecommunications02 engineering and technologySignalLeast mean squares filter020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringPenalty methodNoise (video)businessWearable technologyDegradation (telecommunications)2016 IEEE 55th Conference on Decision and Control (CDC)
researchProduct

A STUDY ON RESEARCH METHODS IN INTERDISCIPLINARY PROJECTS

2006

researchProduct

Distributed consensus for switched networks with unknown but bounded noise

2007

researchProduct

Unidirectional probabilistic direct control for deferrable loads

2014

International audience; The idea of harnessing the inherent flexibility in demand of many types of electric loads has been largely discussed in the last years for coping with the need to maintain the energy demand-supply balance. In particular, the fine tuning of the operation conditions of different thermostatic loads (such as air-conditioning, refrigerators, etc.) has appeared as the most natural solution for load control with minimal user discomfort. In this paper we focus on an alternative approach: deploying simple open-loop control strategies for deferrable loads with minimal communication overhead. The idea is to send a multicast control message to a group of users, on the basis of t…

Flexibility (engineering)MulticastComputer scienceSettore ING-INF/03 - TelecomunicazioniControl (management)Real-time computing[SPI.NRJ]Engineering Sciences [physics]/Electric powerProbabilistic logicSmart Grid Energy System Direct Load Control Demand Response.Demand ResponseEnergy SystemSmart Grid; Energy System; Direct Load Control; Demand Response.[SPI.AUTO]Engineering Sciences [physics]/Automatic[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Null (SQL)Settore ING-INF/04 - AutomaticaControl theoryOverhead (computing)Smart GridEnergy (signal processing)Direct Load Control
researchProduct

Utility-based resource allocations in multi-hop wireless networks

2011

It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …

Ad-hoc Networks; Distributed Resource Allocation; Game theory; Sensor NetworksSettore ING-INF/04 - Automatica[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad-hoc Networksad hoc wireless networks allocations networksSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYSensor NetworksDistributed Resource AllocationGame theory
researchProduct

Unidirectional Direct Load Control through Smart Plugs

2014

International audience; Balancing energy demand and production is be-coming a more and more challenging task for energy utilities also because of the larger penetration of renewable energies which are more difficult to predict and control. While the traditional solution is to dynamically adapt energy production to follow time-varying demand, a new trend is to drive demand itself. Most of the ongoing actions in this direction involve greedy energy consumers, like industrial plants, supermarkets or large buildings. Pervasive communication technologies may allow in the near future to push further the granularity of such approach, by having the energy utility interacting with residen-tial appli…

Engineeringbusiness.industryLoad control switchSettore ING-INF/03 - TelecomunicazioniDistributed computing[SPI.NRJ]Engineering Sciences [physics]/Electric powerReal-time computingProbabilistic logic[SCCO.COMP]Cognitive science/Computer scienceLoad balancing (electrical power)Renewable energySmart Grid; Demand Response; Direct Load Control; Energy SystemsDemand response[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Smart gridSettore ING-INF/04 - Automatica[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC]GranularityInterruptbusinessSmart Grid Demand Response Direct Load Control Energy Systems
researchProduct

The stall and surge control problem for jet engines: LPV Model Identification and Gain Scheduling Predictive Control.

2005

researchProduct

Scalable and Privacy-Preserving Admission Control for Smart Grids

2015

International audience; Energy demand and production need to be constantly matched in the power grid. The traditional paradigm to continuously adapt the production to the demand is challenged by the increasing penetration of more variable and less predictable energy sources, like solar photovoltaics and wind power. An alternative approach is the so called direct control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performanc…

EngineeringControl and Optimizationlarge deviationRandom variableDistributed computingReal-time computingprivacyModeling and simulation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]PhotovoltaicsAdmission control; Home appliances; Logic gates; Power demand; Privacy; Random variables; Shape; Control and Systems Engineering; Modeling and Simulation; Control and OptimizationWind poweradmission controlSettore ING-INF/03 - Telecomunicazionibusiness.industryBandwidth (signal processing)[SPI.NRJ]Engineering Sciences [physics]/Electric powerdirect load controlShapeLogic gateSmart gridsAdmission controlHome applianceSmart gridControl and Systems EngineeringModeling and SimulationScalabilityPower demand[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC]businessEnergy source
researchProduct

Robust control in uncertain multi-inventory systems and consensus problems

2008

Abstract We consider a continuous time linear multi–inventory system with unknown demands bounded within ellipsoids and controls bounded within polytopes. We address the problem of ∈-stabilizing the inventory since this implies some reduction of the inventory costs. The main results are certain conditions under which ∈-stabilizability is possible through a saturated linear state feedback control. The idea of this approach is similar to the consensus problem solution for a network of continuous time dynamic agents, where each agent evolves according to a first order dynamics has bounded control and it is subject to unknown but bounded disturbances. In this context, we derive conditions under…

LMI; robust control; inventory systems; consensusMathematical optimizationMulti-agent systemMulti-agent systemsPolytopeContext (language use)EllipsoidCooperative systemsReduction (complexity)inventory systemsConsensusSettore ING-INF/04 - AutomaticaconsensusControl theoryBounded functionLMI robust control inventory systems consensusLMIRobust controlSettore MAT/09 - Ricerca OperativaDistributed control and estimationrobust controlCooperative systems; Distributed control and estimation; Multi-agent systemsMathematics
researchProduct

Quantized Dissensus in Networks of Agents subject to Death and Duplication

2012

Dissensus is a modeling framework for networks of dynamic agents in competition for scarce resources. Originally inspired by biological cells behaviors, it fits also marketing, finance and many other application areas. Competition is often unstable in the sense that strong agents, those having access to large resources, gain more and more resources at the expense of weak agents. Thus, strong agents duplicate when reaching a critical amount of resources, whereas weak agents die when loosing all their resources. To capture all these phenomena we introduce systems with a discrete time gossip and unstable state dynamics interrupted by discrete events affecting the network topology. Invariancy o…

Dynamic ProgrammingConsensus ProtocolsComputer sciencemedia_common.quotation_subjectDistributed computingSubject (philosophy)Dynamical Systems (math.DS)Network topologyConsensus protocolScarcityCompetition (economics)Settore ING-INF/04 - AutomaticaGossipFOS: MathematicsElectrical and Electronic EngineeringMathematics - Dynamical SystemsMathematics - Optimization and Controlmedia_commonConsensus Protocols; Quantized Control; Dynamic Programming; Network based marketing; Dynamic Pie Diagram.Dynamic Pie Diagramquantized controlComputer Science ApplicationsConsensus protocolsConsensus protocols; network based marketing; quantized controlDiscrete time and continuous timeControl and Systems Engineeringnetwork based marketingOptimization and Control (math.OC)90C3993Dxx34K2034a38Settore MAT/09 - Ricerca Operativa
researchProduct

HL7v3 CDA Rel.2 prescription: Localization experience and GP Integration Project

2010

The localization experience for the e-prescription, based on the Health Level Seven Version 3 (HL7v3) Clinical Document Architecture, Release 2 (CDA Rel.2), is presented. As application, we propose a project of General Practitioners Integration with the EHR (Electronic Health Record), implementing the e-prescription, patient summary and other CDA Rel.2 documents. The integration is made possible with HL7v3, the most widely used standard for healthcare information interoperability. The project is in line with the state of the art in the normative referring context for the Italian Healthcare, both at national and regional level (Tuscany Region). Final remarks are drawn, also referring to the …

Knowledge managementbusiness.industrycomputer.internet_protocolContext (language use)computer.file_formatInteroperabilityClinical Document ArchitectureInteroperability; e-Health; Localization; Hl7v3Interoperability e-Health Localization Hl7v3Hl7v3Settore ING-INF/04 - AutomaticaLocalizationHealth caree-HealtheHealthNormativeMedicineMedical prescriptionPatient summarybusinesscomputerXML2010 IEEE Workshop on Health Care Management (WHCM)
researchProduct

NARX Models of an Industrial Power Plant Gas Turbine

2005

This brief reports the experience with the identification of a nonlinear autoregressive with exogenous inputs (NARX) model for the PGT10B1 power plant gas turbine manufactured by General Electric-Nuovo Pignone. Two operating conditions of the turbine are considered: isolated mode and nonisolated mode. The NARX model parameters are estimated iteratively with a Gram-Schmidt procedure, exploiting both forward and stepwise regression. Many indexes have been evaluated and compared in order to perform subset selection in the functional basis set and determine the structure of the nonlinear model. Various input signals (from narrow to broadband) for identification and validation have been consider…

EngineeringNonlinear autoregressive exogenous modelbusiness.industryTurbinesSystem identificationControl engineeringNonlinear controlTurbineDistributed power generationElectric power systemNonlinear systemAutoregressive modelControl and Systems EngineeringSteam turbineControl theoryElectrical and Electronic EngineeringbusinessGas turbines
researchProduct

Set Membership (In)Validation of Quasispecies models for Molecular Evolution

2006

researchProduct

Medium access in WiFi networks: strategies of selfish nodes

2009

This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.

Settore ING-INF/04 - AutomaticaSettore ING-INF/03 - TelecomunicazioniWiFiGame thoery WiFiGame thoeryGame thoery; WiFi
researchProduct

A decentralized solution for the constrained minimum cost flow

2010

In this paper we propose a decentralized solution to the problem of network stabilization, under flow constraints ensuring steady—state flow optimality. We propose a stabilizing strategy for network flow control with capacity constraints which drives the buffer levels arbitrarily close to a desired reference. This is a decentralized strategy optimizing the flow via the minimization of a quadratic cost of the control. A second problem characterized by non-fully connected networks is also considered, for which an exact network equilibrium is not possible. Here, the strategy, in the absence of constraints leads to a least square decentralized problem, but, unfortunately, in the presence of con…

Flow control (data)Mathematical optimizationnetworks; control; optimizaton; decentralizedEthernet flow controlnetworks control optimizaton decentralizedoptimizatonOptimal controlMulti-commodity flow problemSettore ING-INF/04 - AutomaticaControl theoryRobustness (computer science)networksdecentralizedMinimum-cost flow problemQuadratic programmingMinificationSettore MAT/09 - Ricerca OperativacontrolMathematics49th IEEE Conference on Decision and Control (CDC)
researchProduct

Coloring-based resource allocations in ad-hoc wireless networks

2011

It is well known that CSMA/CA protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. We propose to control such an interference by preallocating temporal slots in which different sets of network nodes are allowed to contend for the channel access. The approach is based on distributed coloring algorithms with limited signaling overhead that can be customized as a function of the network topology and traffic load.

Settore ING-INF/03 - Telecomunicazionibusiness.industryWireless ad hoc networkWireless networkComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputNetwork topologyInterference (wave propagation)coloring schemes; multi-hop wireless networksSettore ING-INF/04 - Automaticacoloring schemesOverhead (computing)Resource managementbusinesscoloring schememulti-hop wireless networksComputer networkCommunication channel2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop
researchProduct

Lazy consensus for networks with unknown but bounded disturbances

2007

We consider stationary consensus protocols for networks of dynamic agents. The measure of the neighbors' state is affected by Unknown But Bounded disturbances. Here the main contribution is the formulation and solution of what we call the isin-consensus problem, where the states are required to converge in a tube of ray isin asymptotically or in finite time.

Computer Science::Multiagent SystemsDynamic agentsLazy consensusComputer scienceControl theoryMulti-agent systemBounded functionDynamic agents; Lazy consensus; Stationary consensus protocolsState (functional analysis)Stationary consensus protocolsTopologyMeasure (mathematics)Uniform consensus2007 46th IEEE Conference on Decision and Control
researchProduct

A Cognitive Tuning of Contention Windows in WiFi Infrastructure Networks

2009

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since it should guarantee that all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios. These phenomena are due to different reasons, including non-standard configurations of the nodes, critical network topologies, and short-term performance observations. In this paper we propose a game-theoretic approach for defining an enhanced DCF scheme suitable for WiFi intelligent nodes employing cognitive fun…

Settore ING-INF/04 - AutomaticaWiFi Networks MAC design Game theorySettore ING-INF/03 - Telecomunicazioni
researchProduct

Supporting Autonomous Navigation of Visually Impaired People for Experiencing Cultural Heritage

2020

In this chapter, we present a system for indoor and outdoor localization and navigation to allow the low vision users in experiencing cultural heritage in autonomy. The system is based on the joint utilization of dead-reckoning and computer vision techniques on a smartphone-centric tracking system. The system is explicitly designed for visually impaired people, but it can be easily generalized to other users, and it is built under the assumption that special reference signals, such as colored tapes, painted lines, or tactile paving, are deployed in the environment for guiding visually impaired users along pre-defined paths. Differently from previous works on localization, which are focused …

ExploitSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer sciencemedia_common.quotation_subjectNavigation systemTracking systemNavigation visually impaired computer vision dead reckoningCultural heritageColoredHuman–computer interactionInertial measurement unitbusinessAutonomyPATH (variable)media_common
researchProduct

Consensus in Noncooperative Dynamic Games: a Multi-Retailer Inventory Application

2008

We focus on Nash equilibria and Pareto optimal Nash equilibria for a finite horizon noncooperative dynamic game with a special structure of the stage cost. We study the existence of these solutions by proving that the game is a potential game. For the single-stage version of the game, we characterize the aforementioned solutions and derive a consensus protocol that makes the players converge to the unique Pareto optimal Nash equilibrium. Such an equilibrium guarantees the interests of the players and is also social optimal in the set of Nash equilibria. For the multistage version of the game, we present an algorithm that converges to Nash equilibria, unfortunately, not necessarily Pareto op…

TheoryofComputation_MISCELLANEOUSComputer Science::Computer Science and Game TheoryCorrelated equilibriumSequential gameComputer scienceDynamic programmingSubgame perfect equilibriumsymbols.namesakeCoordination gameElectrical and Electronic EngineeringRisk dominanceFolk theoremPrice of stabilityNon-credible threatGame theoryCentipede gameImplementation theoryNon-cooperative gameInventoryNormal-form gameStochastic gameComputingMilieux_PERSONALCOMPUTINGTheoryofComputation_GENERALComputer Science ApplicationsConsensus protocols; Dynamic programming; Game theory; InventoryConsensus protocolsZero-sum gameControl and Systems EngineeringNash equilibriumEquilibrium selectionBest responsesymbolsRepeated gameEpsilon-equilibriumConsensus protocols; Dynamic programming; Game theory; Inventory;Potential gameSolution conceptMathematical economicsGame theory
researchProduct

Teletraffic Engineering for Direct Load Control in Smart Grids

2018

International audience; The traditional paradigm for power grid operation is to continuously adapt energy production to demand. This paradigm is challenged by the increasing penetration of renewable sources, that are more variable and less predictable. An alternative approach is the direct load control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performance metrics. In this paper we go beyond such an analogy, showing that u…

Computer science020209 energyDistributed computingDirect controlEnergy Engineering and Power Technology02 engineering and technologySmart gridAdmission control; Direct load control; Privacy; Smart grid;7. Clean energyTeletraffic engineering[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringPower gridElectrical and Electronic EngineeringDirect load controlLeakage (electronics)Direct Load Controlbusiness.industryRenewable Energy Sustainability and the EnvironmentSettore ING-INF/03 - TelecomunicazioniBandwidth (signal processing)Admission Control[SPI.NRJ]Engineering Sciences [physics]/Electric powerAdmission controlRenewable energySmart gridControl and Systems EngineeringPrivacybusinessAdmission control
researchProduct

ARIANNA: a smartphone-based navigation system with human in the loop

2014

In this paper we present a low cost navigation system, called ARIANNA, primarily designed for visually impaired people. ARIANNA (pAth Recognition for Indoor Assisted NavigatioN with Augmented perception) permits to find some points of interests in an indoor environment by following a path painted or sticked on the floor. The path is detected by the camera of the smartphone which also generates a vibration signal providing a feedback to the user for correcting his/her direction. Some special landmarks can be deployed along the path for coding additional information detectable by the camera. In order to study the practical feasibility of the ARIANNA system for human users that want to follow …

EngineeringPath recognitionbusiness.industryVisually impairedSettore ING-INF/03 - TelecomunicazioniFeedback controlNavigation systemassistive tech- nologyExtended Kalman filterkalman filteringSettore ING-INF/04 - Automaticanavigation system; vibration; assistive tech- nology; kalman filteringnavigation systemHuman-in-the-loopComputer visionArtificial intelligencevibrationbusinessCoding (social sciences)
researchProduct

Quantized Dissensus in switching networks with nodes death and duplication

2009

Hybrid systemsswitching systemsHybrid systems switching systems consensus protocol quantized protocolquantized protocolHybrid systems; switching systems; consensus protocol; quantized protocolconsensus protocol
researchProduct

On Discovering Low Order Models in Biochemical Reaction Kinetics

2007

We develop a method by which a large number of differential equations representing biochemical reaction kinetics may be represented by a smaller number of differential equations. The basis of our technique is a conjecture that the high dimension equations of biochemical kinetics, which involve reaction terms of specific forms, are actually implementing a low dimension system whose behavior requires right hand sides that can not be biochemically implemented. For systems that satisfy this conjecture, we develop a simple approximation scheme based on multilinear algebra that extracts the low dimensional system from simulations of the high dimension system. We demonstrate this technique on a st…

Multilinear algebraNonlinear systemBasis (linear algebra)Dimension (vector space)Settore ING-INF/04 - AutomaticaSimple (abstract algebra)Differential equationMathematical analysisChaoticApplied mathematicsDimensional modelingKinetic theory Nonlinear equations Polynomials Differential equationsMathematics
researchProduct

Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]

2009

This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.

business.industryComputer scienceApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSignal ProcessingWireless lanThroughputMobile telephonyElectrical and Electronic EngineeringbusinessGame theoryProtocol (object-oriented programming)Computer networkIEEE Signal Processing Magazine
researchProduct

The linear saturated decentralized strategy for constrained flow control is asymptotically optimal

2013

We present an algorithm for constrained network flow control in the presence of an unknown demand. Our algorithm is decentralized in the sense that it is implemented by a team of agents, each controlling just the flow on a single arc of the network based only on the buffer levels at the nodes at the extremes of the arc, while ignoring the actions of other agents and the network topology. We prove that our algorithm is also stabilizing and steady-state optimal. Specifically, we show that it asymptotically produces the minimum-norm flow. We finally generalize our algorithm to networks with a linear dynamics and we prove that certain least-square optimality properties still hold.

Production-distribution systemsOptimizationMathematical optimizationRobust controlUncertain systemsMinimum normNetwork topologyMinimum norm flowControl theoryElectric network topologyConstrained flowUncertain systemsElectrical and Electronic EngineeringMathematicsFlow control (data)Network topologyAsymptotically optimalRobust control; OptimizationUncertain systemEthernet flow controlAsymptotically optimal Constrained flow Distributed flow control Minimum norm Network optimization Network topology Production-distribution systems Steady-state optimal; Algorithms Electric network topology Flow control Uncertain systems; OptimizationProduction-distribution systemFlow controlAsymptotically optimal algorithmControl and Systems EngineeringSteady-state optimalMinimum-cost flow problemDistributed flow controlRobust controlNetwork optimization; Distributed flow control; Production-distribution systems; Uncertain systems; Minimum norm flowNetwork optimizationAlgorithms
researchProduct

SM identification of approximating models forH∞ robust control

1999

Set Membership (SM) W, identification of mixed parametric and nonparametric models is investigated, aimed to estimate a low order approximating model and an identification error, giving a measure of the unmodeled dynamics in a form well suited for H, control methodologies. In particular, the problem of estimating the parameters of the parametric part and the H, bound on the modeling error is solved using frequency domain data, supposing lbo bounded measurement errors and exponentially stable unmodeled dynamics. The effectiveness of the proposed procedure is tested on some numerical examples, showing the advantages of the proposed methods over the existing nonparametric H, identification app…

Observational errorMechanical EngineeringGeneral Chemical EngineeringBiomedical EngineeringNonparametric statisticsAerospace EngineeringIndustrial and Manufacturing EngineeringH-infinity methods in control theoryExponential stabilityControl and Systems EngineeringControl theoryFrequency domainBounded functionApplied mathematicsElectrical and Electronic EngineeringRobust controlParametric statisticsMathematicsInternational Journal of Robust and Nonlinear Control
researchProduct

www.researcherblog.blogspot.com

2005

researchProduct