Marta Cimitile

ORCID: 0000-0003-2403-8313
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Software Engineering Techniques and Practices
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Model-Driven Software Engineering Techniques
  • Advanced Software Engineering Methodologies
  • Anomaly Detection Techniques and Applications
  • Software Reliability and Analysis Research
  • Software System Performance and Reliability
  • Open Source Software Innovations
  • Web Applications and Data Management
  • Semantic Web and Ontologies
  • Digital and Cyber Forensics
  • Data Stream Mining Techniques
  • COVID-19 diagnosis using AI
  • E-Learning and Knowledge Management
  • Big Data and Business Intelligence
  • Healthcare Systems and Public Health
  • Radiomics and Machine Learning in Medical Imaging
  • Teaching and Learning Programming
  • Artificial Intelligence in Games
  • Voice and Speech Disorders
  • Software Testing and Debugging Techniques

Unitelma Sapienza University
2015-2024

Sapienza University of Rome
2012-2022

University of Calabria
2020

University of Sannio
2015-2016

University of Tartu
2016

University of Bari Aldo Moro
2007-2012

The thyroid is an endocrine gland located in the anterior region of neck: its main task to produce hormones, which are functional our entire body. Its possible dysfunction can lead production insufficient or excessive amount hormone. Therefore, become inflamed swollen due one more swellings forming inside it. Some these nodules be site malignant tumors. One most used treatments sodium levothyroxine, also known as LT4, a synthetic hormone treatment disorders and diseases. Predictions about...

10.1016/j.procs.2021.08.106 article EN Procedia Computer Science 2021-01-01

Today's business processes are often controlled and supported by information systems. These systems record real-time about during their executions. This enables the analysis at runtime of process behavior. However, many modern produce "big data", i.e., collections data sets so large complex that it becomes impossible to store all them. Moreover, few in steady-state but, due changing circumstances, they evolve need adapt continuously. In this paper, we present a novel framework for discovery...

10.1109/tsc.2015.2459703 article EN IEEE Transactions on Services Computing 2015-07-22

Driver identification and path kind are becoming very critical topics given the increasing interest of automobile industry to improve driver experience safety necessity reduce global environmental problems. Since in last years a high number always more sophisticated accurate car sensors monitoring systems produced, several proposed approaches based on analysis huge amount real-time data describing driving experience. In this work, set behavioral features extracted by system is realize...

10.1155/2018/1758731 article EN cc-by Journal of Advanced Transportation 2018-01-01

Cross-system bug fixing propagation is frequent among systems having similar characteristics, using a common framework, or, in general, with cloned source code fragments. While previous studies showed that clones tend to be properly maintained within single system, very little known about cross-system management.

10.1145/1985441.1985463 article EN 2011-05-21

Knowledge about design pattern (DP) instances improves program comprehension and reengineering of object-oriented systems. Effectively, it helps to discover developer decisions trade-offs that often are not documented. This work describes an approach automatically detect DPs in existing systems by tracing systems' source code components with the roles they play patterns. In proposed approach, modeled based on their high-level structural properties (e.g., inheritance, dependency, invocation,...

10.1002/smr.1674 article EN Journal of Software Evolution and Process 2014-09-29

The current authentication systems based on password and pin code are not enough to guarantee attacks from malicious users. For this reason, in the last years, several studies proposed with aim identify users basing their typing dynamics. In paper, we propose a deep neural network architecture aimed discriminate between different using set of keystroke features. idea behind method is silently continuously during monitored system. To perform such user identification effectively, feature model...

10.1109/ijcnn.2019.8852068 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2019-07-01

Parkinson's disease is a degenerative movement disorder causing considerable disability. However, the early detection of this syndrome and its progression rates may be decisive for identification appropriate therapies. For reason, adoption Neural Networks to detect on base walking information gaining more interest. In paper, we defined Deep Network based approach allowing one exploit coming from various sensors located under feet person. The proposed allows discriminate people affected by...

10.1109/ijcnn48605.2020.9207380 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2020-07-01

Anomaly detection in network traffic is a hot and ongoing research theme especially when concerning IoT devices, which are quickly spreading throughout various situations of people’s life and, at the same time, prone to be attacked through different weak points. In this paper, we tackle emerging anomaly problem IoT, by integrating five datasets abnormal evaluating them with deep learning approach capable identifying both normal malicious as well types anomalies. The large integrated dataset...

10.1155/2021/9054336 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

The capability of sensors to identify individuals in a specific scenario is topic high relevance for sensitive sectors such as public security. A traditional approach involves cameras; however, camera-based surveillance systems lack discretion and have computational storing requirements order perform human identification. Moreover, they are strongly influenced by external factors (e.g., light weather). This paper proposes an based on temporal convolutional deep neural networks classifier...

10.3390/s21020381 article EN cc-by Sensors 2021-01-07

10.1109/ijcnn60899.2024.10651492 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2024-06-30

Process mining is a family of techniques that aim at analyzing business process execution data recorded in event logs. Conformance checking branch this discipline embracing approaches for verifying whether the behavior process, as log, line with some expected provided form model. In literature, have already been used to study software development processes starting from logs derived version management systems or document systems. paper, we use conformance test coding behaviors generated IDE...

10.1109/icssp.2019.00020 article EN 2019-05-01

Information technologies can introduce important innovation in human life and daily activities. Among the most innovations developed recent years, those concerning agriculture are particularly relevant even from an economic point of view.The main advantage is cross-analysis environmental, climatic, cultural factors, which allows establishing irrigation nutritional needs crops, preventing pathologies, identifying weeds before they proliferate.Specifically, contribution this work consists use...

10.1109/metroagrifor50201.2020.9277626 article EN 2020-11-04
Coming Soon ...