Search results for "Computer Networks"

showing 10 items of 860 documents

Sensor9k : A testbed for designing and experimenting with WSN-based ambient intelligence applications

2012

Ambient Intelligence systems are typically characterized by the use of pervasive equipment for monitoring and modifying the environment according to users' needs, and to globally defined constraints. Our work describes the implementation of a testbed providing the hardware and software tools for the development and management of AmI applications based on wireless sensor and actuator networks, whose main goal is energy saving for global sustainability. A sample application is presented that addresses temperature control in a work environment, through a multi-objective fuzzy controller taking into account users' preferences and energy consumption.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingTestbedEnergy consumptionProbabilistic reasoningFuzzy logicComputer Science ApplicationsSoftwareEnergy efficiencyHardware and ArchitectureControl theoryEmbedded systemWireless sensor and actuator networkWirelessAmbient intelligencebusinessSoftwareInformation SystemsEfficient energy use
researchProduct

A multi‐agent system for itinerary suggestion in smart environments

2021

Abstract Modern smart environments pose several challenges, among which the design of intelligent algorithms aimed to assist the users. When a variety of points of interest are available, for instance, trajectory recommendations are needed to suggest users the most suitable itineraries based on their interests and contextual constraints. Unfortunately, in many cases, these interests must be explicitly requested and their lack causes the so‐called cold‐start problem. Moreover, lengthy travelling distances and excessive crowdedness of specific points of interest make itinerary planning more difficult. To address these aspects, a multi‐agent itinerary suggestion system that aims at assisting t…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArtificial intelligenceComputer Networks and CommunicationsComputer scienceMulti-agent systemDistributed computingpattern recognitionHuman-Computer InteractionQA76.75-76.765Computational linguistics. Natural language processingSmart environmentComputer softwareComputer Vision and Pattern RecognitionP98-98.5Information Systems
researchProduct

METABOLIC NETWORKS ROBUSTNESS: THEORY, SIMULATIONS AND RESULTS

2011

Metabolic networks are composed of several functional modules, reproducing metabolic pathways and describing the entire cellular metabolism of an organism. In the last decade, an enormous interest has grown for the study of tolerance to errors and attacks in metabolic networks. Studies on their robustness have suggested that metabolic networks are tolerant to errors, but very vulnerable to targeted attacks against highly connected nodes. However, many findings on metabolic networks suggest that the above classification is too simple and imprecise, since hub node attacks can be by-passed if alternative metabolic paths can be exploited. On the contrary, non-hub nodes attacks can affect cell …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCellular metabolismTheoretical computer scienceComputer Networks and Communicationsnetwork robustness and fault tolerance propertietopological analysiRobustness (evolution)Metabolic networkComputational biologyfunctional analysisComputingMethodologies_PATTERNRECOGNITIONstatistical analysiStatistical analysisOrganismMathematics
researchProduct

Copy–Move Forgery Detection by Matching Triangles of Keypoints

2015

Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and CommunicationsComputer scienceDelaunay triangulationbusiness.industryFeature vectorSURFFeature extractionScale-invariant feature transformPattern recognitionDelaunay TriangulationDigital Image ForensicVisualizationVertex (geometry)Copy-move ForgeryDigital imageComputer Networks and CommunicationHarriSIFTComputer visionArtificial intelligenceSafety Risk Reliability and QualitybusinessCopy-move Forgery; Delaunay Triangulation; Digital Image Forensics; Harris; SIFT; SURF; Computer Networks and Communications; Safety Risk Reliability and QualityTransformation geometryIEEE Transactions on Information Forensics and Security
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

Social-Behavioral Aware Optimization of Energy Consumption in Smart Homes

2018

Residential energy consumption is skyrocketing, as residential customers in the U.S. alone used 1.4 trillion kilowatt-hours in 2014 and the consumption is expected to increase in the next years. Previous efforts to limit such consumption have included demand response and smart residential environments. However, recent research has shown that such approaches can actually increase the overall energy consumption due to the numerous complex human psychological processes that take place when interacting with electrical appliances. In this paper we propose a social-behavioral aware framework for energy management in smart residential environments. We envision a smart home where appliances are int…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniConsumption (economics)Smart HomeInformation Systems and ManagementOperations researchbusiness.industryComputer scienceHeuristic (computer science)Energy management020209 energySocial-Behavioral aware OptimizationEnergy Consumption02 engineering and technologyEnergy consumptionDemand responseComputer Networks and CommunicationHome automation0202 electrical engineering electronic engineering information engineeringSet (psychology)businessInteger programming2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS)
researchProduct

A hybrid system for malware detection on big data

2018

In recent years, the increasing diffusion of malicious software has encouraged the adoption of advanced machine learning algorithms to timely detect new threats. A cloud-based approach allows to exploit the big data produced by client agents to train such algorithms, but on the other hand, poses severe challenges on their scalability and performance. We propose a hybrid cloud-based malware detection system in which static and dynamic analyses are combined in order to find a good trade-off between response time and detection accuracy. Our system performs a continuous learning process of its models, based on deep networks, by exploiting the growing amount of data provided by clients. The prel…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniControl and OptimizationExploitComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingBig dataFeature extraction020206 networking & telecommunicationsCloud computing02 engineering and technologyStatic analysiscomputer.software_genreArtificial IntelligenceHybrid systemScalability0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingbusinesscomputerIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

A Framework for Parallel Assessment of Reputation Management Systems

2016

Several distributed applications running over the Internet use Reputation Management Systems (RMSs) to guarantee reliable interactions among unknown agents. Because of the heterogeneity of the existing RMSs, their assessment in terms of correctness and resistance to security attacks is not a trivial task. This work addresses this issue by presenting a novel parallel simulator aimed to support researchers in evaluating the performances of a RMS since the design phase. Preliminary results obtained by simulating two different attacks confirm the suitability of the proposed framework to evaluate different RMSs.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCorrectnessbusiness.industryComputer scienceDistributed computing02 engineering and technologyMulti-threaded applicationTask (project management)Human-Computer InteractionDesign phaseParallel simulationComputer Networks and CommunicationDistributed reputation management020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetParallel simulationbusinessSoftwareReputation managementProceedings of the 17th International Conference on Computer Systems and Technologies 2016
researchProduct

A Fog-Based Application for Human Activity Recognition Using Personal Smart Devices

2019

The diffusion of heterogeneous smart devices capable of capturing and analysing data about users, and/or the environment, has encouraged the growth of novel sensing methodologies. One of the most attractive scenarios in which such devices, such as smartphones, tablet computers, or activity trackers, can be exploited to infer relevant information is human activity recognition (HAR). Even though some simple HAR techniques can be directly implemented on mobile devices, in some cases, such as when complex activities need to be analysed timely, users’ smart devices can operate as part of a more complex architecture. In this article, we propose a multi-device HAR framework that exploits the fog c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitComputer Networks and CommunicationsComputer sciencebusiness.industryBandwidth (signal processing)Activity tracker020206 networking & telecommunicationsCloud computing02 engineering and technologyActivity recognitionHuman–computer interactionHuman activity recognition mobile crowdsensing fog computing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentbusinessMobile deviceWearable technologyACM Transactions on Internet Technology
researchProduct

Human Activity Recognition Process Using 3-D Posture Data

2015

In this paper, we present a method for recognizing human activities using information sensed by an RGB-D camera, namely the Microsoft Kinect. Our approach is based on the estimation of some relevant joints of the human body by means of the Kinect; three different machine learning techniques, i.e., K-means clustering, support vector machines, and hidden Markov models, are combined to detect the postures involved while performing an activity, to classify them, and to model each activity as a spatiotemporal evolution of known postures. Experiments were performed on Kinect Activity Recognition Dataset, a new dataset, and on CAD-60, a public dataset. Experimental results show that our solution o…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniImage fusionMarkov chainComputer Networks and CommunicationsComputer sciencebusiness.industryMaximum-entropy Markov modelFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHuman Factors and ErgonomicsPattern recognitionComputer Science ApplicationsHuman-Computer InteractionActivity recognitionSupport vector machineHuman activity recognition kinect ambient intelligenceArtificial IntelligenceControl and Systems EngineeringSignal ProcessingComputer visionArtificial intelligenceCluster analysisHidden Markov modelbusinessIEEE Transactions on Human-Machine Systems
researchProduct