0000000000375973

AUTHOR

G. L. Re

Testing wearable IoT applications through sensor virtualization

The development of distributed IoT applications requires the integration of data provided by different sensors embedded in multiple devices. As an example, an application for health monitoring in an assisted living scenario may include several wearable and fixed nodes each carrying different sensors and running specific code. Verifying that the application is properly working according to the specifications requires assessing that the code of each node behaves consistently in all the possible use cases. Tests involving sensor data may be difficult or costly to replicate realistically and this could also slow down the development of the application in its early stages. In this paper we intro…

research product

A Smart Assistant for Visual Recognition of Painted Scenes

Nowadays, smart devices allow people to easily interact with the surrounding environment thanks to existing communication infrastructures, i.e., 3G/4G/5G or WiFi. In the context of a smart museum, data shared by visitors can be used to provide innovative services aimed to improve their cultural experience. In this paper, we consider as case study the painted wooden ceiling of the Sala Magna of Palazzo Chiaramonte in Palermo, Italy and we present an intelligent system that visitors can use to automatically get a description of the scenes they are interested in by simply pointing their smartphones to them. As compared to traditional applications, this system completely eliminates the need for…

research product

Secure e-voting in smart communities

Nowadays, digital voting systems are growing in importance. This is an especially sensitive area, because elections can directly affect democratic life of many smart communities. The goal of digital voting systems is to exploit ICT technologies to improve the security and usability of traditional electoral systems. In this work we present a secure electronic voting system that guarantees the secrecy, anonymity, integrity, uniqueness and authenticity of votes, while offering a user-friendly experience to voters, putting them at ease through the use of technologies familiar to them. To ensure these fundamental security requirements, the system fully separates the registration and voting phase…

research product

Twitter spam account detection by effective labeling

In the last years, the widespread diffusion of Online Social Networks (OSNs) has enabled new forms of communications that make it easier for people to interact remotely. Unfortunately, one of the first consequences of such a popularity is the increasing number of malicious users who sign-up and use OSNs for non-legit activities. In this paper we focus on spam detection, and present some preliminary results of a system that aims at speeding up the creation of a large-scale annotated dataset for spam account detection on Twitter. To this aim, two different algorithms capable of capturing the spammer behaviors, i.e., to share malicious urls and recurrent contents, are exploited. Experimental r…

research product

Image processing techniques for the analysis of the micro-architecture of three-dimensional porous scaffolds

research product