- Software Engineering Research
- Business Process Modeling and Analysis
- Service-Oriented Architecture and Web Services
- Software Engineering Techniques and Practices
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Model-Driven Software Engineering Techniques
- Advanced Software Engineering Methodologies
- Anomaly Detection Techniques and Applications
- Software Reliability and Analysis Research
- Software System Performance and Reliability
- Open Source Software Innovations
- Web Applications and Data Management
- Semantic Web and Ontologies
- Digital and Cyber Forensics
- Data Stream Mining Techniques
- COVID-19 diagnosis using AI
- E-Learning and Knowledge Management
- Big Data and Business Intelligence
- Healthcare Systems and Public Health
- Radiomics and Machine Learning in Medical Imaging
- Teaching and Learning Programming
- Artificial Intelligence in Games
- Voice and Speech Disorders
- Software Testing and Debugging Techniques
Unitelma Sapienza University
2015-2024
Sapienza University of Rome
2012-2022
University of Calabria
2020
University of Sannio
2015-2016
University of Tartu
2016
University of Bari Aldo Moro
2007-2012
The thyroid is an endocrine gland located in the anterior region of neck: its main task to produce hormones, which are functional our entire body. Its possible dysfunction can lead production insufficient or excessive amount hormone. Therefore, become inflamed swollen due one more swellings forming inside it. Some these nodules be site malignant tumors. One most used treatments sodium levothyroxine, also known as LT4, a synthetic hormone treatment disorders and diseases. Predictions about...
Today's business processes are often controlled and supported by information systems. These systems record real-time about during their executions. This enables the analysis at runtime of process behavior. However, many modern produce "big data", i.e., collections data sets so large complex that it becomes impossible to store all them. Moreover, few in steady-state but, due changing circumstances, they evolve need adapt continuously. In this paper, we present a novel framework for discovery...
Driver identification and path kind are becoming very critical topics given the increasing interest of automobile industry to improve driver experience safety necessity reduce global environmental problems. Since in last years a high number always more sophisticated accurate car sensors monitoring systems produced, several proposed approaches based on analysis huge amount real-time data describing driving experience. In this work, set behavioral features extracted by system is realize...
Cross-system bug fixing propagation is frequent among systems having similar characteristics, using a common framework, or, in general, with cloned source code fragments. While previous studies showed that clones tend to be properly maintained within single system, very little known about cross-system management.
Knowledge about design pattern (DP) instances improves program comprehension and reengineering of object-oriented systems. Effectively, it helps to discover developer decisions trade-offs that often are not documented. This work describes an approach automatically detect DPs in existing systems by tracing systems' source code components with the roles they play patterns. In proposed approach, modeled based on their high-level structural properties (e.g., inheritance, dependency, invocation,...
The current authentication systems based on password and pin code are not enough to guarantee attacks from malicious users. For this reason, in the last years, several studies proposed with aim identify users basing their typing dynamics. In paper, we propose a deep neural network architecture aimed discriminate between different using set of keystroke features. idea behind method is silently continuously during monitored system. To perform such user identification effectively, feature model...
Parkinson's disease is a degenerative movement disorder causing considerable disability. However, the early detection of this syndrome and its progression rates may be decisive for identification appropriate therapies. For reason, adoption Neural Networks to detect on base walking information gaining more interest. In paper, we defined Deep Network based approach allowing one exploit coming from various sensors located under feet person. The proposed allows discriminate people affected by...
Anomaly detection in network traffic is a hot and ongoing research theme especially when concerning IoT devices, which are quickly spreading throughout various situations of people’s life and, at the same time, prone to be attacked through different weak points. In this paper, we tackle emerging anomaly problem IoT, by integrating five datasets abnormal evaluating them with deep learning approach capable identifying both normal malicious as well types anomalies. The large integrated dataset...
The capability of sensors to identify individuals in a specific scenario is topic high relevance for sensitive sectors such as public security. A traditional approach involves cameras; however, camera-based surveillance systems lack discretion and have computational storing requirements order perform human identification. Moreover, they are strongly influenced by external factors (e.g., light weather). This paper proposes an based on temporal convolutional deep neural networks classifier...
Process mining is a family of techniques that aim at analyzing business process execution data recorded in event logs. Conformance checking branch this discipline embracing approaches for verifying whether the behavior process, as log, line with some expected provided form model. In literature, have already been used to study software development processes starting from logs derived version management systems or document systems. paper, we use conformance test coding behaviors generated IDE...
Information technologies can introduce important innovation in human life and daily activities. Among the most innovations developed recent years, those concerning agriculture are particularly relevant even from an economic point of view.The main advantage is cross-analysis environmental, climatic, cultural factors, which allows establishing irrigation nutritional needs crops, preventing pathologies, identifying weeds before they proliferate.Specifically, contribution this work consists use...