Andrea Pugliese

ORCID: 0000-0003-4385-958X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • Analog and Mixed-Signal Circuit Design
  • Data Management and Algorithms
  • Network Security and Intrusion Detection
  • Semantic Web and Ontologies
  • Advancements in Semiconductor Devices and Circuit Design
  • Radio Frequency Integrated Circuit Design
  • Graph Theory and Algorithms
  • Algorithms and Data Compression
  • Advanced Malware Detection Techniques
  • Low-power high-performance VLSI design
  • Information and Cyber Security
  • Advanced Graph Neural Networks
  • Multimedia Communication and Technology
  • Web Data Mining and Analysis
  • Distributed and Parallel Computing Systems
  • Advanced Data Storage Technologies
  • Logic, Reasoning, and Knowledge
  • Parallel Computing and Optimization Techniques
  • Web Applications and Data Management
  • Scientific Computing and Data Management
  • Anomaly Detection Techniques and Applications
  • Peer-to-Peer Network Technologies
  • Spam and Phishing Detection
  • Semiconductor materials and devices

University of Calabria
2014-2025

Touro College
2025

Institute of Electrical and Electronics Engineers
2002-2005

Interactions, Corpus, Apprentissages, Représentations
2004

Indian Council of Agricultural Research
2002-2004

National Academies of Sciences, Engineering, and Medicine
2002

Data mining algorithms are widely used today for the analysis of large corporate and scientific datasets stored in databases data archives. Industry, science, commerce fields often need to analyze very maintained over geographically distributed sites by using computational power parallel systems. The grid can play a significant role providing an effective support knowledge discovery applications. For development applications on grids we designed system called Knowledge Grid. This paper...

10.1109/tsmcb.2004.836890 article EN IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics) 2004-11-15

Because of the widespread diffusion semistructured data in XML format, much research effort is currently devoted to support storage and retrieval large collections such documents. documents can be compared as their structural similarity, order group them into clusters so that different storage, retrieval, processing techniques effectively exploited. In this scenario, an efficient effective similarity function key a successful management process. We present approach for detecting between...

10.1109/tkde.2005.27 article EN IEEE Transactions on Knowledge and Data Engineering 2005-01-12

The World Wide Web Consortium's RDF standard primarily consists of (subject, property, object) triples that specify the value a given subject has for property. However, it is frequently case even fixed and varies with time. As consequence, efforts have been made to annotate "valid time" intervals. date, no proposals exist efficient indexing such temporal databases. It clearly beneficial store data in relational DB - however, indexes are inadequately equipped handle RDF's graph structure. In...

10.1145/1367497.1367579 article EN 2008-04-21

The National Vulnerability Database (NVD) maintained by the US Institute of Standards and Technology provides valuable information about vulnerabilities in popular software, as well any patches available to address these vulnerabilities. Most enterprise security managers today simply patch most dangerous vulnerabilities—an adversary can thus easily compromise an using less important penetrate enterprise. In this article, we capture a Dependency Graph (VDG) show that attacks graphs be...

10.1145/2699907 article EN ACM Transactions on Information and System Security 2015-03-09

Malicious attackers often scan nodes in a network order to identify vulnerabilities that they may exploit as traverse the network. In this paper, we propose system generates mix of true and false answers response requests. If attacker believes all results are true, then he will be on wrong path. some faked, would have expend time effort separate fact from fiction. We probabilistic logic deception show various computations NP-hard. model attacker's state effects faked results. how defender...

10.1109/tifs.2017.2710945 article EN IEEE Transactions on Information Forensics and Security 2017-06-01

XML compression has gained prominence recently because it counters the disadvantage of verbose representation gives to data. In many applications, such as data exchange and archiving, entirely compressing decompressing a document is acceptable. other where queries must be run over compressed documents, may not beneficial since performance penalty in running query processor outweighs benefits. While balancing interests processing received significant attention domain relational databases,...

10.1145/1239971.1239974 article EN ACM Transactions on Internet Technology 2007-05-01

Subgraph matching is a key operation on graph data. Social network (SN) providers may want to find all subgraphs within their social that match certain query patterns. Unfortunately, subgraph NP-complete, making its application massive SNs major challenge. Past work has shown how implement single processor when the 10-25M edges. In this paper, we show use cloud computing in conjunction with such existing methods efficiently complex graphs as large 778M A consists of one master compute node...

10.1109/asonam.2010.80 article EN 2010-08-01

Low-power, low-voltage, and high-performance requirements are badly needed for operational amplifiers (op-amps) in modern applications. In this brief, a design method minimizing the settling time three-stage nested-Miller schemes is presented. As an application example, CMOS 0.35-mum voltage follower with 115-dB dc gain fastest step response to 1% accuracy level, designed. Circuital simulations demonstrate that proposed procedure allows amplifier settling-time/power-consumption ratio be...

10.1109/tcsii.2007.906086 article EN IEEE Transactions on Circuits & Systems II Express Briefs 2008-01-01

This paper addresses the problem of both actively searching and tracking multiple unknown dynamic objects in a known environment with cooperative autonomous agents partial observability. The target ends when uncertainty is below threshold. Current methods typically assume homogeneous without access to external information utilize short-horizon predictive models. Such assumptions limit real-world applications. We propose fully integrated pipeline where main contributions are: (1) time-varying...

10.48550/arxiv.2502.01041 preprint EN arXiv (Cornell University) 2025-02-02

Keloids, characterized by excessive collagen deposition resulting in raised and often painful scars, profoundly affect the psychosocial well-being of adolescents, leading to anxiety, depression, social withdrawal during a critical period identity formation. Current literature highlights these challenges but lacks comprehensive management strategies within dermatological practice. This review identifies need for integrated care models that combine clinical treatment with mental health...

10.18203/issn.2455-4529.intjresdermatol20250441 article EN International Journal of Research in Dermatology 2025-02-24

Today, numerous applications require the ability to monitor a continuous stream of fine-grained data for occurrence certain high-level activities. A number computerized systems-including ATM networks, web servers, and intrusion detection systems-systematically track every atomic action we perform, thus generating massive streams timestamped observation data, possibly from multiple concurrent In this paper, address problem efficiently detecting occurrences activities such interleaved streams....

10.1109/tkde.2011.246 article EN IEEE Transactions on Knowledge and Data Engineering 2011-12-06

This paper presents XAHM, a model for Adaptive Hypermedia Systems based on XML. We introduce multidimensional approach to different aspects of the adaptation process, which is three adaptivity dimensions: user's behavior (preferences and browsing activity), technology (network terminal) external environment (time, location, language, socio-political issues, etc.). An modeled with respect such dimensions, view over it corresponds each potential position user in space. Finally, we propose...

10.1145/568760.568869 article EN 2002-07-15

A new settling-time-oriented design methodology for the most common three-stage operational amplifier (op-amp) schemes reported in literature is presented this paper. The proposed approach allows systematic sizing of compensation network order to reach best closed-loop op-amp settling behavior. To demonstrate effectiveness and correctness analysis, examined topologies are designed a commercial 0.35-¿m CMOS technology. Circuit simulations show that approach, each investigated topology,...

10.1109/tcsi.2009.2017133 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2009-03-12
Coming Soon ...