- Advanced Database Systems and Queries
- Data Management and Algorithms
- Service-Oriented Architecture and Web Services
- Algorithms and Data Compression
- Business Process Modeling and Analysis
- Semantic Web and Ontologies
- Access Control and Trust
- Optimization and Search Problems
- Digital Rights Management and Security
- Distributed systems and fault tolerance
- Computational Geometry and Mesh Generation
- Formal Methods in Verification
- Geographic Information Systems Studies
- Complexity and Algorithms in Graphs
- Mobile Agent-Based Network Management
- semigroups and automata theory
- 3D Modeling in Geospatial Applications
- Optimization and Packing Problems
- Privacy, Security, and Data Protection
- Advanced Manufacturing and Logistics Optimization
- Conservation Techniques and Studies
- Peer-to-Peer Network Technologies
- Advanced Graph Theory Research
- Advanced Authentication Protocols Security
- E-Government and Public Services
University of Rome Tor Vergata
2011-2023
Fondazione Roma
2017-2018
Informatica (South Korea)
2016
Istituto di Analisi dei Sistemi ed Informatica Antonio Ruberti
1983-2006
Sapienza University of Rome
1992-2005
University of Salerno
1989-2005
Informa (Italy)
2002
University of L'Aquila
1989-1994
Purdue University West Lafayette
1994
Columbia University
1991-1994
In this work, the authors prepared and characterized two different graphene oxides: one chemically synthesized (GO sample) other electrochemically (LiCl) ). Both samples were fully with atomic force microscopy (AFM), Raman Fourier transform infrared (FTIR) spectroscopies, X-ray photo electron spectroscopy (XPS), thermal analysis (TG/DTA), and<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" id="M1"><mml:mi fontfamily="Gadugi">Z</mml:mi></mml:math>-potential. The antibacterial...
Public key infrastructures (PKIs) are the cornerstone for security of communication layer online services relying on certificate-based authentication, such as e-commerce, e-government, banking, cloud services, and many others. A PKI is an infrastructure based a hierarchical model, but use PKIs in non-hierarchical contexts has exposed them to types attacks. Here, we discuss weaknesses exploited past attacks propose solution original consensus algorithm developed blockchain technology. In this...
The typical online bin-packing problem requires the fitting of a sequence rationals in (0,1] into minimum number bins unit capacity, by packing ith input element without any knowledge sizes or elements that follow. Moreover, unlike problems, this one issue does not admit data reorganization, i.e., no can be moved from bin to another. In paper, first all, "Relaxed" model will formalized; allows constant move another, as consequence arrival new element. Then, context model, two algorithms...
The in vitro biocompatibility of Graphene Oxide (GO) nanosheets, which were obtained by the electrochemical exfoliation graphite electrodes an electrolytic bath containing salts, was compared with pristine Single Wall Carbon Nanotubes (p-SWCNTs) under same experimental conditions different human cell lines. cells treated concentrations GO and SWCNTs for up to 48 h. did not induce any significant morphological or functional modifications (demonstrating a high biocompatibility), while SWNCTs...
Paper-based cultural heritage objects are subject to natural deterioration due internal and external factors, that is, the presence of heavy metals, incorrect conservation, humidity, exposure artifacts pollutants, light, high temperatures. To contrast decay original objects, it is necessary study apply innovative specific techniques, set up novel preservation methodologies, implement or synthesize new products. As nanomaterial science field developed over last decades, usage nanomaterials in...
The widespread use of small, mobile computing devices such as smartphones increases the need to protect these and sensitive data they contain against unauthorized use. Authentication solutions based on biometrics are a promising way replace common mechanisms relying personal identification numbers or passwords, which often perceived inconvenient by users. Fingerprint authentication schemes have been introduced latest generations smartphones. Fingerprints easy record show low intra-class...
Conservation and restoration of cultural heritage is something more than a simple process maintaining the existing. It an integral part improvement asset. The social context around shapes specific actions. Today, preservation, restoration, enhancement are increasingly multidisciplinary science, meeting point researchers coming from heterogeneous study areas. Data scientists Information technology (IT) specialists important. In this context, networks new generation smart sensors integrated...
Abstract Fullerene Black (FB) and Extracted (EFB) were used in modified screen‐printed electrodes producing electrochemical transducers (FB‐SPEs EFB‐SPEs). A complete study was performed the best results are obtained working with FB‐SPEs, especially terms of: 1. improved electron‐transfer kinetic mechanisms 2. sensitivity selectivity toward Acetaminophen (Ac) Guanine (G). These latter represent two important electro‐active targets to quantify medicine field application, because: Ac is a...
Certification of the executed service is a critical issue for an e-government infrastructure. In fact, given legal value that often attached to data managed and exchanged by public administrations, being able document actual execution e-services utmost importance. This made more complex in cases, as happens administration sector, where are based on legacy systems autonomous independent organizations. this paper we discuss, starting from real-life developed Italy, introduction, within...
In this paper we describe the architectural solution defined and implemented to ensure secure interoperability among information technology (IT) systems managing personal data registries in Italian municipalities Ministry of Interior. The architecture features a clear separation between security services, provided at an infrastructure level, application exposed on Internet as Web services. This approach has allowed easily design implement interoperability, since - notwithstanding huge...
Advances in computer technologies facilitate the implementation of inter-organizational business processes. At same time, managing security these processes is increasingly difficult. Compliance with high level specifcations, like normatives and pre-agreed protocols, rules requirements, difficult to validate. Here we discuss how Conformance Checking, a specific area Process Mining, can be adapted for this purpose. Its role verify if an execution process satisfies specifications represented by...
Mobile payment represents a promising emerging market. Nevertheless, especially for Proximity Payment (MPP), neither users nor merchants have largely adopted this innovation so far. This study aims to identify the adoption factors of MPP by developing user model, tested through an in-lab experimentation involving 50 in Italy. We then compared our results with those obtained remote survey that involved 1001 subjects who never used system before. Compatibility users' needs, habits and...
We present and discuss a novel architectural approach supporting the integration among legacy information systems of autonomous organizations. It is based on use data warehouse in new conceptual role. Namely, we propose to it during design implementation cooperative system as tool coherence maintenance underlying databases efficient management accesses them. Our rooted SICC project for cadastral exchange Italian Municipalities, Ministry Finance, Notaries Certified Land Surveyors. Research...
Online process mining techniques are increasingly used to provide operational support. In this work we describe tools support distributed business processes which handle sensitive data and require a high level of security together with real-time validation. The presented here have been specifically developed for compliance checking in choreographies heterogeneous entities. Challenges include the fast aggregation, analysis validation logs that collected from participants. autonomy...
In this paper, we present and discuss a novel architectural approach supporting the integration among legacy information systems of autonomous organizations. It is based on use data warehouse in new conceptual role. Namely, propose to it, during design implementation phases cooperative system, as tool coherence maintenance underlying databases efficient management accesses them. Our rooted SICC project for cadastral exchange Italian Municipalities, Ministry Finance, Notaries, Certified Land...