Maurizio Talamo

ORCID: 0000-0002-3888-0889
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • Data Management and Algorithms
  • Service-Oriented Architecture and Web Services
  • Algorithms and Data Compression
  • Business Process Modeling and Analysis
  • Semantic Web and Ontologies
  • Access Control and Trust
  • Optimization and Search Problems
  • Digital Rights Management and Security
  • Distributed systems and fault tolerance
  • Computational Geometry and Mesh Generation
  • Formal Methods in Verification
  • Geographic Information Systems Studies
  • Complexity and Algorithms in Graphs
  • Mobile Agent-Based Network Management
  • semigroups and automata theory
  • 3D Modeling in Geospatial Applications
  • Optimization and Packing Problems
  • Privacy, Security, and Data Protection
  • Advanced Manufacturing and Logistics Optimization
  • Conservation Techniques and Studies
  • Peer-to-Peer Network Technologies
  • Advanced Graph Theory Research
  • Advanced Authentication Protocols Security
  • E-Government and Public Services

University of Rome Tor Vergata
2011-2023

Fondazione Roma
2017-2018

Informatica (South Korea)
2016

Istituto di Analisi dei Sistemi ed Informatica Antonio Ruberti
1983-2006

Sapienza University of Rome
1992-2005

University of Salerno
1989-2005

Informa (Italy)
2002

University of L'Aquila
1989-1994

Purdue University West Lafayette
1994

Columbia University
1991-1994

10.1016/0164-1212(84)90006-2 article EN Journal of Systems and Software 1984-07-01

In this work, the authors prepared and characterized two different graphene oxides: one chemically synthesized (GO sample) other electrochemically (LiCl) ). Both samples were fully with atomic force microscopy (AFM), Raman Fourier transform infrared (FTIR) spectroscopies, X-ray photo electron spectroscopy (XPS), thermal analysis (TG/DTA), and<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mi fontfamily="Gadugi">Z</mml:mi></mml:math>-potential. The antibacterial...

10.1155/2019/2752539 article EN Journal of Nanomaterials 2019-02-14

Public key infrastructures (PKIs) are the cornerstone for security of communication layer online services relying on certificate-based authentication, such as e-commerce, e-government, banking, cloud services, and many others. A PKI is an infrastructure based a hierarchical model, but use PKIs in non-hierarchical contexts has exposed them to types attacks. Here, we discuss weaknesses exploited past attacks propose solution original consensus algorithm developed blockchain technology. In this...

10.3390/fi12020040 article EN cc-by Future Internet 2020-02-14

The typical online bin-packing problem requires the fitting of a sequence rationals in (0,1] into minimum number bins unit capacity, by packing ith input element without any knowledge sizes or elements that follow. Moreover, unlike problems, this one issue does not admit data reorganization, i.e., no can be moved from bin to another. In paper, first all, "Relaxed" model will formalized; allows constant move another, as consequence arrival new element. Then, context model, two algorithms...

10.1137/s0097539799180408 article EN SIAM Journal on Computing 2000-01-01

The in vitro biocompatibility of Graphene Oxide (GO) nanosheets, which were obtained by the electrochemical exfoliation graphite electrodes an electrolytic bath containing salts, was compared with pristine Single Wall Carbon Nanotubes (p-SWCNTs) under same experimental conditions different human cell lines. cells treated concentrations GO and SWCNTs for up to 48 h. did not induce any significant morphological or functional modifications (demonstrating a high biocompatibility), while SWNCTs...

10.3390/ijms19051316 article EN International Journal of Molecular Sciences 2018-04-28

Paper-based cultural heritage objects are subject to natural deterioration due internal and external factors, that is, the presence of heavy metals, incorrect conservation, humidity, exposure artifacts pollutants, light, high temperatures. To contrast decay original objects, it is necessary study apply innovative specific techniques, set up novel preservation methodologies, implement or synthesize new products. As nanomaterial science field developed over last decades, usage nanomaterials in...

10.1155/2017/2372789 article EN cc-by Journal of Analytical Methods in Chemistry 2017-01-01

10.1016/0304-3975(90)90125-2 article EN publisher-specific-oa Theoretical Computer Science 1990-01-01

The widespread use of small, mobile computing devices such as smartphones increases the need to protect these and sensitive data they contain against unauthorized use. Authentication solutions based on biometrics are a promising way replace common mechanisms relying personal identification numbers or passwords, which often perceived inconvenient by users. Fingerprint authentication schemes have been introduced latest generations smartphones. Fingerprints easy record show low intra-class...

10.1109/ccst.2015.7389688 article EN 2015-09-01

Conservation and restoration of cultural heritage is something more than a simple process maintaining the existing. It an integral part improvement asset. The social context around shapes specific actions. Today, preservation, restoration, enhancement are increasingly multidisciplinary science, meeting point researchers coming from heterogeneous study areas. Data scientists Information technology (IT) specialists important. In this context, networks new generation smart sensors integrated...

10.3390/s20071909 article EN cc-by Sensors 2020-03-30

Abstract Fullerene Black (FB) and Extracted (EFB) were used in modified screen‐printed electrodes producing electrochemical transducers (FB‐SPEs EFB‐SPEs). A complete study was performed the best results are obtained working with FB‐SPEs, especially terms of: 1. improved electron‐transfer kinetic mechanisms 2. sensitivity selectivity toward Acetaminophen (Ac) Guanine (G). These latter represent two important electro‐active targets to quantify medicine field application, because: Ac is a...

10.1002/elan.201700426 article EN Electroanalysis 2017-10-19

Certification of the executed service is a critical issue for an e-government infrastructure. In fact, given legal value that often attached to data managed and exchanged by public administrations, being able document actual execution e-services utmost importance. This made more complex in cases, as happens administration sector, where are based on legacy systems autonomous independent organizations. this paper we discuss, starting from real-life developed Italy, introduction, within...

10.1109/ride.2002.995108 article EN 2003-06-25

In this paper we describe the architectural solution defined and implemented to ensure secure interoperability among information technology (IT) systems managing personal data registries in Italian municipalities Ministry of Interior. The architecture features a clear separation between security services, provided at an infrastructure level, application exposed on Internet as Web services. This approach has allowed easily design implement interoperability, since - notwithstanding huge...

10.1109/ride.2004.1281708 article EN 2004-06-10

Advances in computer technologies facilitate the implementation of inter-organizational business processes. At same time, managing security these processes is increasingly difficult. Compliance with high level specifcations, like normatives and pre-agreed protocols, rules requirements, difficult to validate. Here we discuss how Conformance Checking, a specific area Process Mining, can be adapted for this purpose. Its role verify if an execution process satisfies specifications represented by...

10.1109/ccst.2013.6922056 article EN 2013-10-01

Mobile payment represents a promising emerging market. Nevertheless, especially for Proximity Payment (MPP), neither users nor merchants have largely adopted this innovation so far. This study aims to identify the adoption factors of MPP by developing user model, tested through an in-lab experimentation involving 50 in Italy. We then compared our results with those obtained remote survey that involved 1001 subjects who never used system before. Compatibility users' needs, habits and...

10.1145/2785830.2785874 article EN 2015-08-24

We present and discuss a novel architectural approach supporting the integration among legacy information systems of autonomous organizations. It is based on use data warehouse in new conceptual role. Namely, we propose to it during design implementation cooperative system as tool coherence maintenance underlying databases efficient management accesses them. Our rooted SICC project for cadastral exchange Italian Municipalities, Ministry Finance, Notaries Certified Land Surveyors. Research...

10.1109/coopis.1999.792157 article EN 1999-01-01

Online process mining techniques are increasingly used to provide operational support. In this work we describe tools support distributed business processes which handle sensitive data and require a high level of security together with real-time validation. The presented here have been specifically developed for compliance checking in choreographies heterogeneous entities. Challenges include the fast aggregation, analysis validation logs that collected from participants. autonomy...

10.1109/ccst.2015.7389656 article EN 2015-09-01

In this paper, we present and discuss a novel architectural approach supporting the integration among legacy information systems of autonomous organizations. It is based on use data warehouse in new conceptual role. Namely, propose to it, during design implementation phases cooperative system, as tool coherence maintenance underlying databases efficient management accesses them. Our rooted SICC project for cadastral exchange Italian Municipalities, Ministry Finance, Notaries, Certified Land...

10.1142/s0218843002000546 article EN International Journal of Cooperative Information Systems 2002-03-01
Coming Soon ...