- Advanced Database Systems and Queries
- Analog and Mixed-Signal Circuit Design
- Data Management and Algorithms
- Network Security and Intrusion Detection
- Semantic Web and Ontologies
- Advancements in Semiconductor Devices and Circuit Design
- Radio Frequency Integrated Circuit Design
- Graph Theory and Algorithms
- Algorithms and Data Compression
- Advanced Malware Detection Techniques
- Low-power high-performance VLSI design
- Information and Cyber Security
- Advanced Graph Neural Networks
- Multimedia Communication and Technology
- Web Data Mining and Analysis
- Distributed and Parallel Computing Systems
- Advanced Data Storage Technologies
- Logic, Reasoning, and Knowledge
- Parallel Computing and Optimization Techniques
- Web Applications and Data Management
- Scientific Computing and Data Management
- Anomaly Detection Techniques and Applications
- Peer-to-Peer Network Technologies
- Spam and Phishing Detection
- Semiconductor materials and devices
University of Calabria
2014-2025
Touro College
2025
Institute of Electrical and Electronics Engineers
2002-2005
Interactions, Corpus, Apprentissages, Représentations
2004
Indian Council of Agricultural Research
2002-2004
National Academies of Sciences, Engineering, and Medicine
2002
Data mining algorithms are widely used today for the analysis of large corporate and scientific datasets stored in databases data archives. Industry, science, commerce fields often need to analyze very maintained over geographically distributed sites by using computational power parallel systems. The grid can play a significant role providing an effective support knowledge discovery applications. For development applications on grids we designed system called Knowledge Grid. This paper...
Because of the widespread diffusion semistructured data in XML format, much research effort is currently devoted to support storage and retrieval large collections such documents. documents can be compared as their structural similarity, order group them into clusters so that different storage, retrieval, processing techniques effectively exploited. In this scenario, an efficient effective similarity function key a successful management process. We present approach for detecting between...
The World Wide Web Consortium's RDF standard primarily consists of (subject, property, object) triples that specify the value a given subject has for property. However, it is frequently case even fixed and varies with time. As consequence, efforts have been made to annotate "valid time" intervals. date, no proposals exist efficient indexing such temporal databases. It clearly beneficial store data in relational DB - however, indexes are inadequately equipped handle RDF's graph structure. In...
The National Vulnerability Database (NVD) maintained by the US Institute of Standards and Technology provides valuable information about vulnerabilities in popular software, as well any patches available to address these vulnerabilities. Most enterprise security managers today simply patch most dangerous vulnerabilities—an adversary can thus easily compromise an using less important penetrate enterprise. In this article, we capture a Dependency Graph (VDG) show that attacks graphs be...
Malicious attackers often scan nodes in a network order to identify vulnerabilities that they may exploit as traverse the network. In this paper, we propose system generates mix of true and false answers response requests. If attacker believes all results are true, then he will be on wrong path. some faked, would have expend time effort separate fact from fiction. We probabilistic logic deception show various computations NP-hard. model attacker's state effects faked results. how defender...
XML compression has gained prominence recently because it counters the disadvantage of verbose representation gives to data. In many applications, such as data exchange and archiving, entirely compressing decompressing a document is acceptable. other where queries must be run over compressed documents, may not beneficial since performance penalty in running query processor outweighs benefits. While balancing interests processing received significant attention domain relational databases,...
Subgraph matching is a key operation on graph data. Social network (SN) providers may want to find all subgraphs within their social that match certain query patterns. Unfortunately, subgraph NP-complete, making its application massive SNs major challenge. Past work has shown how implement single processor when the 10-25M edges. In this paper, we show use cloud computing in conjunction with such existing methods efficiently complex graphs as large 778M A consists of one master compute node...
Low-power, low-voltage, and high-performance requirements are badly needed for operational amplifiers (op-amps) in modern applications. In this brief, a design method minimizing the settling time three-stage nested-Miller schemes is presented. As an application example, CMOS 0.35-mum voltage follower with 115-dB dc gain fastest step response to 1% accuracy level, designed. Circuital simulations demonstrate that proposed procedure allows amplifier settling-time/power-consumption ratio be...
This paper addresses the problem of both actively searching and tracking multiple unknown dynamic objects in a known environment with cooperative autonomous agents partial observability. The target ends when uncertainty is below threshold. Current methods typically assume homogeneous without access to external information utilize short-horizon predictive models. Such assumptions limit real-world applications. We propose fully integrated pipeline where main contributions are: (1) time-varying...
Keloids, characterized by excessive collagen deposition resulting in raised and often painful scars, profoundly affect the psychosocial well-being of adolescents, leading to anxiety, depression, social withdrawal during a critical period identity formation. Current literature highlights these challenges but lacks comprehensive management strategies within dermatological practice. This review identifies need for integrated care models that combine clinical treatment with mental health...
Today, numerous applications require the ability to monitor a continuous stream of fine-grained data for occurrence certain high-level activities. A number computerized systems-including ATM networks, web servers, and intrusion detection systems-systematically track every atomic action we perform, thus generating massive streams timestamped observation data, possibly from multiple concurrent In this paper, address problem efficiently detecting occurrences activities such interleaved streams....
This paper presents XAHM, a model for Adaptive Hypermedia Systems based on XML. We introduce multidimensional approach to different aspects of the adaptation process, which is three adaptivity dimensions: user's behavior (preferences and browsing activity), technology (network terminal) external environment (time, location, language, socio-political issues, etc.). An modeled with respect such dimensions, view over it corresponds each potential position user in space. Finally, we propose...
A new settling-time-oriented design methodology for the most common three-stage operational amplifier (op-amp) schemes reported in literature is presented this paper. The proposed approach allows systematic sizing of compensation network order to reach best closed-loop op-amp settling behavior. To demonstrate effectiveness and correctness analysis, examined topologies are designed a commercial 0.35-¿m CMOS technology. Circuit simulations show that approach, each investigated topology,...