Pietro Ruiu

ORCID: 0000-0003-4420-3363
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Cloud Computing and Resource Management
  • Scientific Computing and Data Management
  • Electromagnetic Scattering and Analysis
  • Advanced Data Storage Technologies
  • Electromagnetic Simulation and Numerical Methods
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Face recognition and analysis
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Software-Defined Networks and 5G
  • Energy Harvesting in Wireless Networks
  • Visual Attention and Saliency Detection
  • Face and Expression Recognition
  • Smart Grid Security and Resilience
  • Parallel Computing and Optimization Techniques
  • Metaheuristic Optimization Algorithms Research
  • Privacy-Preserving Technologies in Data
  • GNSS positioning and interference
  • Soil Moisture and Remote Sensing
  • Digital Transformation in Industry
  • Digital Transformation in Law
  • Cloud Computing and Remote Desktop Technologies
  • Big Data Technologies and Applications

University of Sassari
2023-2025

Zimmer Biomet (United States)
2023

Istituto Superiore Mario Boella
2009-2018

Polytechnic University of Turin
2016-2017

Istituto Nazionale di Geofisica e Vulcanologia
2016

How to effectively manage increasingly complex enterprise computing environments is one of the hardest challenges that most organizations have face in era cloud computing, big data and IoT. Advanced automation orchestration systems are valuable solutions helping IT staff handle large-scale centers. Containers new revolution world, they more lightweight than VMs, can radically decrease both start up time instances processing storage overhead with respect traditional VMs. The aim this paper...

10.1109/cisis.2015.35 article EN 2015-07-01

Data as a Service (DaaS) is among the latest kind of services being investigated in Cloud computing community. The main aim DaaS to overcome limitations state-of-the-art approaches data technologies, according which stored and accessed from repositories whose location known relevant for sharing processing. Besides sharing, current also do not achieve fully separate/decouple software thus impose inter-operability. In this paper we propose approach intelligent processing large collections with...

10.1109/cisis.2013.87 article EN 2013-07-01

3D modeling and reconstruction are critical to creating immersive XR experiences, providing realistic virtual environments, objects, interactions that increase user engagement enable new forms of content manipulation. Today, data can be easily captured using off-the-shelf, specialized headsets; very often, these tools provide real-time, albeit low-resolution, integration continuously depth maps. This approach is generally suitable for basic AR MR applications, where users direct their...

10.3390/mti8050036 article EN cc-by Multimodal Technologies and Interaction 2024-05-03

Driven by technological advances in various fields (AI, 5G, VR, IoT, etc.) together with the emergence of digital twins technologies (HDT, HAL, BIM, etc.), Metaverse has attracted growing attention from scientific and industrial communities. This interest is due to its potential impact on people lives different sectors such as education or medicine. Specific solutions can also increase inclusiveness disabilities that are an impediment a fulfilled life. However, security privacy concerns...

10.3390/mti8060048 article EN cc-by Multimodal Technologies and Interaction 2024-06-05

as key collaborators.DemoGRAPE is a new prototype of support for the satellite navigation in Antarctica.Besides scientific interest, accuracy Antarctica paramount importance since there always danger that people and vehicles can fall into crevasse during snowstorm, when visibility limited travel restricted to following specified routes using systems.The variability ionospheric delay scintillation are two primary factors which affect navigation.The project will provide demonstrator cutting...

10.1002/2016sw001488 article EN Space Weather 2016-09-21

With the integration of virtualization technologies, Internet Things (IoT) is expanding its capabilities and quickly becoming a complex ecosystem networked devices. The Social (SIoT), where intelligent things include social properties that improve functioning user engagement, result this progress. SIoT still has issues with scalability, data management, user-centric operations, despite tremendous In order to overcome these obstacles, strong architecture needed can handle enormous number IoT...

10.1016/j.comnet.2024.110632 article EN cc-by Computer Networks 2024-07-08

Power consumption is a primary concern for cloud computing data centers. Being the network one of non-negligible contributors to energy in centers, several architectures have been designed with goal improving performance and energy-efficiency. In this paper, we provide comparison study center architectures, covering both classical two- three-tier design state-of-art ones as Jupiter, recently disclosed by Google. Specifically, analyze combined effect on overall system different power profiles...

10.1109/icc.2016.7510998 article EN 2016-05-01

The rapid increase in Internet of Things (IoT) applications has raised security and privacy issues due to the huge amount data acquired by IoT devices transmitted through Internet. Therefore, there is a need understand what strategies should be applied make systems robust flaws weaknesses. In this paper, we first identify discuss best practices for security, which include set procedures that can taken as guidelines determine solve systems. Then, follow apply identified two real IoT-based use...

10.1109/access.2023.3331820 article EN cc-by-nc-nd IEEE Access 2023-01-01

In recent years the number of credentials and digital identities needed to access online services is exploding, increasing risk fraud unauthorized personal data.Biometric verification techniques can help build more secure authentication systems; in particular face recognition algorithms have reached near perfect accuracy under ideal conditions. Europe 60% population owns an electronic identification (eID) document which contains biometric data, almost all member states provide tools verify...

10.1016/j.jisa.2023.103577 article EN cc-by-nc-nd Journal of Information Security and Applications 2023-08-11

Data centers provision industry and end users with the necessary computing communication resources to access vast majority of services online on a pay-as-you-go basis. In this paper, we study problem energy proportionality in data center networks (DCNs). Devices are proportional when any increase load corresponds consumption. centers, consumption is concern as it considerably impacts operational expenses (OPEX) operators. our analysis, investigate impact three different allocation policies...

10.1109/tsusc.2017.2711967 article EN IEEE Transactions on Sustainable Computing 2017-04-01

The cloud computing paradigm has recently emerged as a convenient solution for running different workloads on highly parallel and scalable infrastructures. One major appeal of is its capability abstracting hardware resources making them easy to use. Conversely, one the challenges providers energy efficiency improvement their Aimed at overcoming this challenge, heterogeneous architectures have started become part standard equipment used in data centers. Despite effort, systems remain...

10.1109/cisis.2016.107 article EN 2016-07-01

Face recognition with Deep Learning is generally approached as a problem of capacity. The field has seen progressively deeper, more complex models or larger, highly variant datasets. However, the carbon footprint machine learning (ML) concern. A real push developing to reduce energy consumption ML we strive for eco-friendly society. Lower compute budget always desirable, if accuracy not reduced below usable level. We present an approach using state art Vision Transformer and Early Exits...

10.1109/biosig58226.2023.10346005 article EN 2023-09-20

Today, more than ever before, technological progress is evolving rapidly, and in the absence of adequate regulatory frameworks, big players digital market (the so-called Big Techs) are exploiting personal data (name, address, telephone numbers) private (political opinions, religious beliefs, financial information, or health status) an uncontrolled manner. A crucial role this scenario played by weakness international frameworks due to slow response time legislators who incapable, from a point...

10.3390/fi16070228 article EN cc-by Future Internet 2024-06-28

The adoption of Cloud computing involves many advantages in terms flexibility, scalability and reliability, but also implies new challenges on security, data privacy protection personal data. Since more sensitive applications are moved to the cloud, verification digital identity participants electronic communication has become a crucial challenge. Currently, use biometric techniques can be considered as an effective solution ensure significant increase security authentication protocols...

10.1109/cisis.2016.76 article EN 2016-07-01

As cloud computing adoption and deployment increase, the performance evaluation of environments is becoming very important. Cloud applications have different composition, configuration, requirements. Simulation modeling techniques are suitable to quantify resource allocation policies application scheduling algorithms in for service models according work loads, energy system size. In this paper, we give an overview existing distributed systems simulation tools order outline main...

10.1109/cisis.2014.32 article EN 2014-07-01

Abstract In many fields, it is a common practice to collect large amounts of data characterized by high number features. These datasets are at the core modern applications supervised machine learning, where goal create an automatic classifier for newly presented data. However, well known that presence irrelevant features in dataset can make learning phase harder and, most importantly, lead suboptimal classifiers. Consequently, becoming increasingly important be able select right subset...

10.1007/s11227-023-05226-y article EN cc-by The Journal of Supercomputing 2023-04-16
Coming Soon ...