Search results for "Exploit"

showing 10 items of 284 documents

Changing the strategy formation process in a service cooperative

2010

PurposeThe purpose of this paper is to concern the strategic changes a firm needs to incorporate in order to deliver a complex service such as providing assistance to the socially disadvantaged. The paper seeks to analyze the development of such a process considering the ability of managers to exploit resources and foster new opportunities for the firm.Design/methodology/approachThe qualitative methodology applied is that of a case study. The organization analyzed was a service cooperative. A semi‐structured questionnaire was used to gather the information along with documents and additional information thereafter, thus facilitating the triangulation process.FindingsNon‐profit service organ…

Service (business)Organizational Behavior and Human Resource ManagementProcess managementExploitProcess (engineering)business.industryStrategy and ManagementGeneral Decision SciencesPublic relationsDisadvantagedTriangulation (geometry)Order (exchange)Management of Technology and InnovationEconomicsStrategic managementbusinessQualitative researchJournal of Organizational Change Management
researchProduct

Privacy-preserving data allocation in decentralized online social networks

2016

International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…

Service (systems architecture)ExploitComputer sciencePrivacy policyControl (management)02 engineering and technologyPeer-to-peercomputer.software_genreComputer securityTheoretical Computer ScienceSet (abstract data type)[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Privacy policySocial networkSettore INF/01 - Informaticabusiness.industryComputer Science (all)020206 networking & telecommunicationsService providerDecentralized online social network Data availability Privacy policy Peer-to-peerData availabilityPeer-to-peerDecentralized online social network020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct

New distributive and ecological data on Tuber magnatum (Tuberaceae) in Italy

2014

The recent discovery of natural truffle grounds of the prized Tuber magnatum Pico in Sicily (southern Italy) allows to up-to-date the ecology and distribution of this choice edible mushroom in Italy and opens new economic opportunities in rural areas traditionally suffering from the economic point of view. The two new localities reported expand the southern range border of the species in Italy and Europe.

Settore BIO/02 - Botanica SistematicaSettore BIO/03 - Botanica Ambientale E Applicatawhite truffle ecology distribution exploitationPlant Science
researchProduct

Schede per la flora ornamentale siciliana. 61-67

2013

With the aim to improve the knowledge of the ornamental flora of Sicily, a series of reports on the most rare and significant species found in the historic or public gardens and parks has been started since 2001. The plants taken in consideration are examined as far as taxonomy, geographical origin, biology, ecology are concerned, also taking into account their condition in Sicily with respect to introduction, sanitary status, occurrence, etc... Furthermore, germplasm conservation is, when possible, provided in the Botanical Garden of Palermo. Each taxon is treated in a single report. Here the reports 61-67, by F. Argento, M.R. Cucco, E. Di Gristina & R. Oliveri, are presented. These concer…

Settore BIO/03 - Botanica Ambientale E ApplicataFlora Sicilian Gardens Knowledge Conservation exploitation.
researchProduct

Status and prospects of systems biology in grapevine research

2019

The cultivated grapevine, Vitis vinifera L., has gathered a vast amount of omics data throughout the last two decades, driving the imperative use of computational resources for its analysis and integration. Molecular systems biology arises from this need allowing to model and predict the emergence of phenotypes or responses in biological systems. Beyond single omics networks, integrative approaches associate the molecular components of an organism and combine them into higher order networks to model dynamic behaviors. Application of network-based methods in multi-omics data is providing additional resources to address important questions regarding grapevine fruit quality and composition. He…

Settore BIO/11 - BIOLOGIA MOLECOLAREMulti-omicsExploitComputer scienceSystems biologyIntegrative analysisMolecular systemsRegulatory networkData scienceOmics dataMulti omicsGene co-expressionVitis viniferaOrganism
researchProduct

Analysis of Users Behaviour from a Movie Preferences Perspective

2018

Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…

Settore INF/01 - InformaticaExploitComputer Networks and CommunicationsPerspective (graphical)020206 networking & telecommunications02 engineering and technologyHomophilyDecentralizationPopularityData scienceDecentralized Online Social NetworksData availabilityHomophilyTerm (time)Data availabilitySimilarity (psychology)0202 electrical engineering electronic engineering information engineeringDecentralized Online Social Network020201 artificial intelligence & image processingData availability; Decentralized Online Social Networks; Homophily; Computer Networks and Communications
researchProduct

Exploiting community detection to recommend privacy policies in decentralized online social networks

2018

The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…

Settore INF/01 - InformaticaExploitbusiness.industryEnd userComputer sciencePrivacy policyInternet privacy020206 networking & telecommunications02 engineering and technologyPrivacy policiesRecommender systemTheoretical Computer ScienceRecommendation systemPrivacyComputer Science0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingDecentralized online social networksPrivacy policiebusinessSet (psychology)Personally identifiable informationDecentralized online social networks; Privacy; Privacy policies; Recommendation system; Security
researchProduct

A Network Tomography Approach for Traffic Monitoring in Smart Cities

2018

Traffic monitoring is a key enabler for several planning and management activities of a Smart City. However, traditional techniques are often not cost efficient, flexible, and scalable. This paper proposes an approach to traffic monitoring that does not rely on probe vehicles, nor requires vehicle localization through GPS. Conversely, it exploits just a limited number of cameras placed at road intersections to measure car end-to-end traveling times. We model the problem within the theoretical framework of network tomography, in order to infer the traveling times of all individual road segments in the road network. We specifically deal with the potential presence of noisy measurements, and t…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni050210 logistics & transportationCost efficiencyExploitbusiness.industryComputer scienceMechanical Engineering05 social sciencesReal-time computingNetwork tomography smart cities Traffic monitoring020206 networking & telecommunicationsTopology (electrical circuits)02 engineering and technologyNetwork tomographyComputer Science ApplicationsSmart city0502 economics and businessAutomotive EngineeringScalability0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemKey (cryptography)businessIEEE Transactions on Intelligent Transportation Systems
researchProduct

A hybrid system for malware detection on big data

2018

In recent years, the increasing diffusion of malicious software has encouraged the adoption of advanced machine learning algorithms to timely detect new threats. A cloud-based approach allows to exploit the big data produced by client agents to train such algorithms, but on the other hand, poses severe challenges on their scalability and performance. We propose a hybrid cloud-based malware detection system in which static and dynamic analyses are combined in order to find a good trade-off between response time and detection accuracy. Our system performs a continuous learning process of its models, based on deep networks, by exploiting the growing amount of data provided by clients. The prel…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniControl and OptimizationExploitComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingBig dataFeature extraction020206 networking & telecommunicationsCloud computing02 engineering and technologyStatic analysiscomputer.software_genreArtificial IntelligenceHybrid systemScalability0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingbusinesscomputerIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

User Activity Recognition via Kinect in an Ambient Intelligence Scenario

2014

The availability of an ever-increasing kind of cheap, unobtrusive, sensing devices has stressed the need for new approaches to merge raw measurements in order to realize what is happening in the monitored environment. Ambient Intelligence (AmI) techniques exploit information about the environment state to adapt the environment itself to the users’ preferences. Even if traditional sensors allow a rough understanding of the users’ preferences, ad-hoc sensors are required to obtain a deeper comprehension of users’ habits and activities. In this paper we propose a framework to recognize users’ activities via a depth and RGB camera device, namely the Microsoft Kinect. The proposed approach takes…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringKinectAmbient intelligenceAmbient IntelligenceExploitbusiness.industryUser ProfilingActivity Recognitioncomputer.software_genreActivity recognitionSupport vector machineHuman–computer interactionData miningCluster analysisbusinessMerge (version control)computerIERI Procedia
researchProduct