Search results for "Exploit"
showing 10 items of 284 documents
Changing the strategy formation process in a service cooperative
2010
PurposeThe purpose of this paper is to concern the strategic changes a firm needs to incorporate in order to deliver a complex service such as providing assistance to the socially disadvantaged. The paper seeks to analyze the development of such a process considering the ability of managers to exploit resources and foster new opportunities for the firm.Design/methodology/approachThe qualitative methodology applied is that of a case study. The organization analyzed was a service cooperative. A semi‐structured questionnaire was used to gather the information along with documents and additional information thereafter, thus facilitating the triangulation process.FindingsNon‐profit service organ…
Privacy-preserving data allocation in decentralized online social networks
2016
International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…
New distributive and ecological data on Tuber magnatum (Tuberaceae) in Italy
2014
The recent discovery of natural truffle grounds of the prized Tuber magnatum Pico in Sicily (southern Italy) allows to up-to-date the ecology and distribution of this choice edible mushroom in Italy and opens new economic opportunities in rural areas traditionally suffering from the economic point of view. The two new localities reported expand the southern range border of the species in Italy and Europe.
Schede per la flora ornamentale siciliana. 61-67
2013
With the aim to improve the knowledge of the ornamental flora of Sicily, a series of reports on the most rare and significant species found in the historic or public gardens and parks has been started since 2001. The plants taken in consideration are examined as far as taxonomy, geographical origin, biology, ecology are concerned, also taking into account their condition in Sicily with respect to introduction, sanitary status, occurrence, etc... Furthermore, germplasm conservation is, when possible, provided in the Botanical Garden of Palermo. Each taxon is treated in a single report. Here the reports 61-67, by F. Argento, M.R. Cucco, E. Di Gristina & R. Oliveri, are presented. These concer…
Status and prospects of systems biology in grapevine research
2019
The cultivated grapevine, Vitis vinifera L., has gathered a vast amount of omics data throughout the last two decades, driving the imperative use of computational resources for its analysis and integration. Molecular systems biology arises from this need allowing to model and predict the emergence of phenotypes or responses in biological systems. Beyond single omics networks, integrative approaches associate the molecular components of an organism and combine them into higher order networks to model dynamic behaviors. Application of network-based methods in multi-omics data is providing additional resources to address important questions regarding grapevine fruit quality and composition. He…
Analysis of Users Behaviour from a Movie Preferences Perspective
2018
Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…
Exploiting community detection to recommend privacy policies in decentralized online social networks
2018
The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…
A Network Tomography Approach for Traffic Monitoring in Smart Cities
2018
Traffic monitoring is a key enabler for several planning and management activities of a Smart City. However, traditional techniques are often not cost efficient, flexible, and scalable. This paper proposes an approach to traffic monitoring that does not rely on probe vehicles, nor requires vehicle localization through GPS. Conversely, it exploits just a limited number of cameras placed at road intersections to measure car end-to-end traveling times. We model the problem within the theoretical framework of network tomography, in order to infer the traveling times of all individual road segments in the road network. We specifically deal with the potential presence of noisy measurements, and t…
A hybrid system for malware detection on big data
2018
In recent years, the increasing diffusion of malicious software has encouraged the adoption of advanced machine learning algorithms to timely detect new threats. A cloud-based approach allows to exploit the big data produced by client agents to train such algorithms, but on the other hand, poses severe challenges on their scalability and performance. We propose a hybrid cloud-based malware detection system in which static and dynamic analyses are combined in order to find a good trade-off between response time and detection accuracy. Our system performs a continuous learning process of its models, based on deep networks, by exploiting the growing amount of data provided by clients. The prel…
User Activity Recognition via Kinect in an Ambient Intelligence Scenario
2014
The availability of an ever-increasing kind of cheap, unobtrusive, sensing devices has stressed the need for new approaches to merge raw measurements in order to realize what is happening in the monitored environment. Ambient Intelligence (AmI) techniques exploit information about the environment state to adapt the environment itself to the users’ preferences. Even if traditional sensors allow a rough understanding of the users’ preferences, ad-hoc sensors are required to obtain a deeper comprehension of users’ habits and activities. In this paper we propose a framework to recognize users’ activities via a depth and RGB camera device, namely the Microsoft Kinect. The proposed approach takes…