- Formal Methods in Verification
- Advanced Software Engineering Methodologies
- Modular Robots and Swarm Intelligence
- Service-Oriented Architecture and Web Services
- Logic, programming, and type systems
- Blockchain Technology Applications and Security
- Context-Aware Activity Recognition Systems
- IoT and Edge/Fog Computing
- Scientific Computing and Data Management
- Semantic Web and Ontologies
- Model-Driven Software Engineering Techniques
- semigroups and automata theory
- DNA and Biological Computing
- Network Security and Intrusion Detection
- Energy Harvesting in Wireless Networks
- Internet of Things and AI
- Biomedical Text Mining and Ontologies
- Smart Grid Energy Management
- Distributed and Parallel Computing Systems
- Energy Efficient Wireless Sensor Networks
- Business Process Modeling and Analysis
- Mobile Ad Hoc Networks
- COVID-19 diagnosis using AI
- Opportunistic and Delay-Tolerant Networks
- Cellular Automata and Applications
Università di Camerino
2015-2025
University of L'Aquila
2001
Internet of Things (IoT) applications and resources are highly vulnerable to flood attacks, including Distributed Denial Service (DDoS) attacks. These attacks overwhelm the targeted device with numerous network packets, making its inaccessible authorized users. Such may comprise attack references, types, sub-categories, host information, malicious scripts, etc. details assist security professionals in identifying weaknesses, tailoring defense measures, responding rapidly possible threats,...
A Wireless Sensor Network (WSN) is composed of distributed sensors with limited processing capabilities and energy restrictions. These unique attributes pose new challenges amongst which prolonging the WSN lifetime one most important. Clustering an efficient routing technique that has been widely applied to report data from nodes a centralised Base Station. plethora different clustering protocols have proposed. Some are based on equal-sized clusters while others use unequal size. make...
Population aging may be seen both as a human success story, the triumph of public health, medical advancements and economic development over diseases injures, one most challenging phenomena that society faces in this century. Assistive technology all its possible implementations (from Telemedicine to Ambient Assisted Living, Intelligence) represents an emerging answer needs new generation older adults whose desire is live longer with higher quality life. Objective paper present results...
The simulation and visualization of biological system models is becoming more important both in clinical use basic research. Since many systems are characterized by interactions involving different scales at the same time, several approaches have been defined to handle such complex spatial temporal scale. In this context, we propose BioShape, a 3D particle-based simulator whose novelty consists providing uniform geometry-oriented multiscale modeling environment. These features make BioShape...
Due to the huge volume and complexity of biological data available today, a fundamental component biomedical research is now in silico analysis. This includes modelling simulation systems processes, as well automated bioinformatics analysis high-throughput data. The quest for resources (including databases, tools, knowledge) becomes therefore extreme importance. Bioinformatics itself rapid evolution dedicated Grid cyberinfrastructures already offer easier access sharing resources....
In this paper we investigate fair computations in the pi-calculus. Following Costa and Stirling's approach for CCS-like languages, consider a method to label process actions order filter out unfair computations. We contrast existing fair-testing notion with those that naturally arise by imposing weak strong fairness. This comparison provides insight about expressiveness of various `fair' testing semantics their discriminating power.
In [C. Palamidessi, V. Saraswat, F. Valencia and B. Victor. On the Expressiveness of Linearity vs Persistence in Asynchronous Pi Calculus. LICS 2006:59–68, 2006] authors studied expressiveness persistence asynchronous π-calculus (Aπ) wrt weak barbed congruence. The study is incomplete because it ignores issue divergence. this paper, we present an De Nicola Hennessy's testing scenario which sensitive to Following 2006], consider Aπ three sub-languages it, each capturing one source...
Intelligent Environments (IE) are a very active area of research and number applications currently being deployed in domains ranging from smart home to e-health autonomous vehicles. In cases, IE operate together with (or support) humans, it is therefore fundamental that thoroughly verified. this paper we present how set techniques tools developed for the verification software code can be employed described by means event-condition-action rules. particular, reduce problem verifying key...
Many biological phenomena are inherently multiscale, i.e. they characterised by interactions involving different scales at the same time. This is case of bone remodelling, where macroscopic behaviour (at organ and tissue scale) microstructure cell strongly influence each other. Consequently, several approaches have been defined to model such a process spatial temporal levels and, in particular, terms continuum properties, abstracting this way from realistic – more complex cellular scenario....