Books by Ernesto Damiani
Papers by Ernesto Damiani
Web-based applications greatly increase information availability and ease of access, which is opt... more Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing by the Web of information that must be accessed in a selective way requires the definition and enforcement of security controls, ensuring that information will be accessible only to authorized entities. Approaches proposed to this end level, independently from the semantics of the data to be protected and for this reason result limited. The eXtensible Markup Language (XML), a markup language promoted by the World Wide Web Consortium (W3C), represents an important opportunity to solve this problem. We present an access control model to protect information distributed on the Web that, by exploiting XML’s own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of XML documents. We also present a language for the specification of access restrictions that uses standard notations and concepts and briefly describe a system architecture for access control enforcement based on existing technology.
Abstract A bottleneck in software reuse is the classification schema and retrieval method of comp... more Abstract A bottleneck in software reuse is the classification schema and retrieval method of components. Particularly when large repositories of components are available, classification and retrieval for reuse should be flexible to allow the selection also of components which, although not perfectly matching requirements, are adaptable with a limited effort. This paper presents a fuzzy classification model for a repository storing descriptors of components.
Abstract Effective access to repositories of reusable: components should rely on retrieval functi... more Abstract Effective access to repositories of reusable: components should rely on retrieval functionalities based also on imprecise queries. This paper presents a fuzzy retrieval model based on keywords describing the functionalities of reusable components. Fuzzy weights are assigned to these keywords automatically. Retrieval is supported by a Thesaurus where a fuzzy synonymia relationship is used to c: ompute adaptability of reusable components to the needs expressed by the user fuzzy query.
Abstract Traffic volume anomalies can take a wide range of different forms, each characterized in... more Abstract Traffic volume anomalies can take a wide range of different forms, each characterized in principle by a different traffic profile, but all the forms having in common the overall surge in traffic at a particular site. Often anomalies, at the onset, appear up as innovations, an unprecedented experience for the network system. For this reason it is appropriate to face them with a negative selection approach that can detect foreign patterns in the complement space.
This paper presents a 3D object recognition method aimed to industrial applications. The proposed... more This paper presents a 3D object recognition method aimed to industrial applications. The proposed method compares any object represented as a set of 3D polygonal surfaces through their corresponding normal map, a bidimensional array which stores local curvature (mesh normals) as the pixels RGB components of a color image. The recognition approach, based on the computation of a difference map resulting from the comparison of normal maps, is simple yet fast and accurate.
Several software component identification problems require evaluation of the fitness of a candida... more Several software component identification problems require evaluation of the fitness of a candidate on the basis of the information attached to it by a classification model. Fuzzy query algebras can effectively deal with these problems, choosing query execution mechanisms on the basis of the semantics selected by the user.
Summary. This paper introduces a distributed Trust Layer that can be superimposed to metadata gen... more Summary. This paper introduces a distributed Trust Layer that can be superimposed to metadata generators. By means of a simulator of the Trust Layer we developed an experimentation aimed at validating the role of a Trust Layer as a technique for automatically screening high-quality metadata in a set of assertions coming from sources with different level of trustworthiness.
A lot of recent research has focused on methodsof modeling Web users and on efficient ways toinit... more A lot of recent research has focused on methodsof modeling Web users and on efficient ways toinitialize and manage user models. In this paper, we present a new user modeling technique relyingon a temporal, graph-based data model forsemistructured information. Our technique canbe used to filter WWW information and to makethe Web experience personalized for the individualuser.
Location-based Access Control (LBAC) systems are based on applications whose access control polic... more Location-based Access Control (LBAC) systems are based on applications whose access control policies include location predicates. The enforcement of location predicates is performed by an Access Control Engine (ACE) and requires complex location services integrating sensing technologies able to gather users' physical location and components that process this information according to LBAC specifications. A specialized Location Middleware (LM) provides such location services.
A fundamental feature of the software process consists in its own stochastic nature. A convenient... more A fundamental feature of the software process consists in its own stochastic nature. A convenient approach for extracting the stochastic dynamics of a process from log data is that of modelling the process as a Markov model: in this way the discovery of the short/medium range dynamics of the process is cast in terms of the learning of Markov models of different orders, ie in terms of learning the corresponding transition matrices.
Livre: Intelligent interactive multimedia systems and services (series: smart innovation, systems... more Livre: Intelligent interactive multimedia systems and services (series: smart innovation, systems and technologies) TSIHRINTZIS George A, DAMIANI Ernesto, VIRVOU Maria.
Uploads
Books by Ernesto Damiani
Papers by Ernesto Damiani