Skip to main content
Ernesto Damiani
  • Via Bramante 65 26013 Crema
  • +390373898064
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing by the Web of information that must be accessed in a selective way requires the... more
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing by the Web of information that must be accessed in a selective way requires the definition and enforcement of security controls, ensuring that information will be accessible only to authorized entities. Approaches proposed to this end level, independently from the semantics of the data to be protected and for this reason result limited. The eXtensible Markup Language (XML), a markup language promoted by the World Wide Web Consortium (W3C), represents an important opportunity to solve this problem. We present an access control model to protect information distributed on the Web that, by exploiting XML’s own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of XML documents. We also present a language for the specification of access restrictions that uses standard notations and concepts and briefly describe a system architecture for access control enforcement based on existing technology.
Abstract A bottleneck in software reuse is the classification schema and retrieval method of components. Particularly when large repositories of components are available, classification and retrieval for reuse should be flexible to allow... more
Abstract A bottleneck in software reuse is the classification schema and retrieval method of components. Particularly when large repositories of components are available, classification and retrieval for reuse should be flexible to allow the selection also of components which, although not perfectly matching requirements, are adaptable with a limited effort. This paper presents a fuzzy classification model for a repository storing descriptors of components.
Abstract Effective access to repositories of reusable: components should rely on retrieval functionalities based also on imprecise queries. This paper presents a fuzzy retrieval model based on keywords describing the functionalities of... more
Abstract Effective access to repositories of reusable: components should rely on retrieval functionalities based also on imprecise queries. This paper presents a fuzzy retrieval model based on keywords describing the functionalities of reusable components. Fuzzy weights are assigned to these keywords automatically. Retrieval is supported by a Thesaurus where a fuzzy synonymia relationship is used to c: ompute adaptability of reusable components to the needs expressed by the user fuzzy query.
Abstract Traffic volume anomalies can take a wide range of different forms, each characterized in principle by a different traffic profile, but all the forms having in common the overall surge in traffic at a particular site. Often... more
Abstract Traffic volume anomalies can take a wide range of different forms, each characterized in principle by a different traffic profile, but all the forms having in common the overall surge in traffic at a particular site. Often anomalies, at the onset, appear up as innovations, an unprecedented experience for the network system. For this reason it is appropriate to face them with a negative selection approach that can detect foreign patterns in the complement space.
This paper presents a 3D object recognition method aimed to industrial applications. The proposed method compares any object represented as a set of 3D polygonal surfaces through their corresponding normal map, a bidimensional array which... more
This paper presents a 3D object recognition method aimed to industrial applications. The proposed method compares any object represented as a set of 3D polygonal surfaces through their corresponding normal map, a bidimensional array which stores local curvature (mesh normals) as the pixels RGB components of a color image. The recognition approach, based on the computation of a difference map resulting from the comparison of normal maps, is simple yet fast and accurate.
Several software component identification problems require evaluation of the fitness of a candidate on the basis of the information attached to it by a classification model. Fuzzy query algebras can effectively deal with these problems,... more
Several software component identification problems require evaluation of the fitness of a candidate on the basis of the information attached to it by a classification model. Fuzzy query algebras can effectively deal with these problems, choosing query execution mechanisms on the basis of the semantics selected by the user.
Summary. This paper introduces a distributed Trust Layer that can be superimposed to metadata generators. By means of a simulator of the Trust Layer we developed an experimentation aimed at validating the role of a Trust Layer as a... more
Summary. This paper introduces a distributed Trust Layer that can be superimposed to metadata generators. By means of a simulator of the Trust Layer we developed an experimentation aimed at validating the role of a Trust Layer as a technique for automatically screening high-quality metadata in a set of assertions coming from sources with different level of trustworthiness.
A lot of recent research has focused on methodsof modeling Web users and on efficient ways toinitialize and manage user models. In this paper, we present a new user modeling technique relyingon a temporal, graph-based data model... more
A lot of recent research has focused on methodsof modeling Web users and on efficient ways toinitialize and manage user models. In this paper, we present a new user modeling technique relyingon a temporal, graph-based data model forsemistructured information. Our technique canbe used to filter WWW information and to makethe Web experience personalized for the individualuser.
Location-based Access Control (LBAC) systems are based on applications whose access control policies include location predicates. The enforcement of location predicates is performed by an Access Control Engine (ACE) and requires complex... more
Location-based Access Control (LBAC) systems are based on applications whose access control policies include location predicates. The enforcement of location predicates is performed by an Access Control Engine (ACE) and requires complex location services integrating sensing technologies able to gather users' physical location and components that process this information according to LBAC specifications. A specialized Location Middleware (LM) provides such location services.
A fundamental feature of the software process consists in its own stochastic nature. A convenient approach for extracting the stochastic dynamics of a process from log data is that of modelling the process as a Markov model: in this way... more
A fundamental feature of the software process consists in its own stochastic nature. A convenient approach for extracting the stochastic dynamics of a process from log data is that of modelling the process as a Markov model: in this way the discovery of the short/medium range dynamics of the process is cast in terms of the learning of Markov models of different orders, ie in terms of learning the corresponding transition matrices.
Livre: Intelligent interactive multimedia systems and services (series: smart innovation, systems and technologies) TSIHRINTZIS George A, DAMIANI Ernesto, VIRVOU Maria.
La natura empirica degli attuali modelli del processo di produzione del software impone di ricorrere alla statistica inferenziale e all'estrazione automatica di conoscenza per la definizione di misure significative di prodotto e di... more
La natura empirica degli attuali modelli del processo di produzione del software impone di ricorrere alla statistica inferenziale e all'estrazione automatica di conoscenza per la definizione di misure significative di prodotto e di processo. In particolare, l'esperienza ha mostrato che il ricorso all'estrazione automatica diventa pressochè indispensabile nei casi in cui il campione dei dati è molto grande e/o il numero di variabili è alto, come tipicamente succede quando i dati sono collezionati automaticamente.
Semantic Web vision has evolved in recent years as a blueprint for a knowledge-based framework aimed at crossing the chasm from the current Web of unstructured information resources to a Web equipped with metadata and oriented to... more
Semantic Web vision has evolved in recent years as a blueprint for a knowledge-based framework aimed at crossing the chasm from the current Web of unstructured information resources to a Web equipped with metadata and oriented to delegation of tasks to software agents. Ontologies are the key piece of this framework in that they provide shared semantics to metadata, thus enabling a degree of semantic interoperability.
Abstract The paper describes a technique for building a closed loop reuse environment obtained by polling user feedback about selected reuse components in order to enhance the system effectiveness. Polling of user choices is exploited in... more
Abstract The paper describes a technique for building a closed loop reuse environment obtained by polling user feedback about selected reuse components in order to enhance the system effectiveness. Polling of user choices is exploited in two ways: to tune the retrieval of the software reuse environment and as a basis for a reward system to encourage reuse. Both feedback and reward are made dependent of the user typology through a user profile.
This paper discusses uncertainties in software develop ment for reuse and maintenance. In particular, we present how fuzzy techniques can help in handling a source of uncertainty: the classification of components and their retrieval for... more
This paper discusses uncertainties in software develop ment for reuse and maintenance. In particular, we present how fuzzy techniques can help in handling a source of uncertainty: the classification of components and their retrieval for reuse according to software behavioral properties. Behavioral classification is inherently impre.cise, due to the fact that any components may exhibit several behaviors, depending on the application viewpoint. A model is described based on a repository where software descriptors ar stored.
Abstract Today's global challenges such as in Energy and Sustainability, Healthcare and an Aging Society, Public Safety and Security, or Democracy and Participation/Involvement confront us with the most Complex Environments. Traditional... more
Abstract Today's global challenges such as in Energy and Sustainability, Healthcare and an Aging Society, Public Safety and Security, or Democracy and Participation/Involvement confront us with the most Complex Environments. Traditional ICT-support has often increased complexity, thus making the challenges even more severe. The Digital Ecosystem perspective aims to address the twofold challenge of Complex Environment Engineering and Digital Ecosystem Technology mapping.
In mobile communication, many new services rely on the knowledge of mobile terminals location. Mobile units location estimate is aimed at using the cellular network infrastructure and protocols to provide a reliable and accurate estimate... more
In mobile communication, many new services rely on the knowledge of mobile terminals location. Mobile units location estimate is aimed at using the cellular network infrastructure and protocols to provide a reliable and accurate estimate of mobile terminals positions without the need for global positioning systems such as GPS. In this paper a lookup table correlation techniques with multiple position estimation and optimal location is presented.
In order to pose effective queries to Web sites, some form of site data model must beimplicitly or explicitly shared by users. In this paper we propose WG-log, a query languagewhich allows the description of data manipulation primitives... more
In order to pose effective queries to Web sites, some form of site data model must beimplicitly or explicitly shared by users. In this paper we propose WG-log, a query languagewhich allows the description of data manipulation primitives via (sets of) graph (s). The useof WG-log for queries allows graphic query construction with respect to both the navigationaland the logical parts of schemata.
Abstract We introduce a general model of a Web query system, ie a set of integrated tools for the efficient and effective retrieval of hypermedia information on the World Wide Web. Then we describe a prototype environment based on WG-Log,... more
Abstract We introduce a general model of a Web query system, ie a set of integrated tools for the efficient and effective retrieval of hypermedia information on the World Wide Web. Then we describe a prototype environment based on WG-Log, a graph-oriented query and data description language for Web sites, focusing on metadata processing and storage
Abstract. As the global information infrastructure is becoming more and more ubiquitous, digital business transactions are increasingly performed using a variety of mobile devices and across multiple communication channels. In this new... more
Abstract. As the global information infrastructure is becoming more and more ubiquitous, digital business transactions are increasingly performed using a variety of mobile devices and across multiple communication channels. In this new paradigm of pervasive access, a much richer context representation regarding both users and the resources they access could be available to applications, potentially supporting highly expressive and intelligent policies regulating access and fruition.
Abstract Nowadays, a global information infrastructure connects remote parties through the use of large scale networks, and many companies focus on developing e-services based on remote resources and on interactions between remote... more
Abstract Nowadays, a global information infrastructure connects remote parties through the use of large scale networks, and many companies focus on developing e-services based on remote resources and on interactions between remote parties. In such a context, e-government (e-gov) systems became of paramount importance for the public administration, and many ongoing development projects are targeted on their implementation, security, and release (Bettini, Jajodia, Sean Wang, & Wijesekera, 2002).
Page 1. Service Oriented Architecture for Digital Ecosystems Dr.
Abstract In this paper we describe a methodology and a set of tools that support the exploitation of ideas, suggestions and proposals coming from different sources, internal and external to the organization (eg customers and employees).... more
Abstract In this paper we describe a methodology and a set of tools that support the exploitation of ideas, suggestions and proposals coming from different sources, internal and external to the organization (eg customers and employees). Items extracted from incoming message flows are used as a basis of a participatory design process. In this context, we discuss the design principles of an environment we call Open Innovation Factory, supporting collaborative design of new products and services.
The idea of a Workshop on Metadata for Security (WMS) first came out at a EU project meeting held in Ispra about digital identities, where Robert Meersman was invited as a guest speaker. During that meeting, some researchers in the field... more
The idea of a Workshop on Metadata for Security (WMS) first came out at a EU project meeting held in Ispra about digital identities, where Robert Meersman was invited as a guest speaker. During that meeting, some researchers in the field of security and identity management exchanged ideas with experts in knowledge management and representation.
Abstract In this chapter, several flexible techniques aimed at extracting, maintaining and enriching semantic-web style metadata are discussed.
Abstract Human motion analysis is an increasingly important active research domain with various applications in surveillance, human-machine interaction and human posture analysis. The recent developments in depth sensor technology,... more
Abstract Human motion analysis is an increasingly important active research domain with various applications in surveillance, human-machine interaction and human posture analysis. The recent developments in depth sensor technology, especially with the release of the Kinect device, have attracted significant attention to the question of how to take advantage of this technology in order to achieve accurate motion tracking and action detection in marker-less approaches.
Abstract The release of the Microsoft Kinect has attracted the attention of researchers in a variety of computer science domains. Even though this device is still relatively new, its recent applications have shown some promising results... more
Abstract The release of the Microsoft Kinect has attracted the attention of researchers in a variety of computer science domains. Even though this device is still relatively new, its recent applications have shown some promising results in terms of replacing current conventional methods like the stereo-camera for robotics navigation, multi-camera system for motion detection and laser scanner for 3D reconstruction.
In the last five years, service orientation and social computing have radically changed the nature of the World Wide Web. With today's Service-Oriented Architectures (SOA), no strict division of labor should or can exist between the tasks... more
In the last five years, service orientation and social computing have radically changed the nature of the World Wide Web. With today's Service-Oriented Architectures (SOA), no strict division of labor should or can exist between the tasks for which software services are responsible and those that are delegated to people. Rather, human actors and software process engines cooperate closely to enact business processes at a previously unheard-of scale and complexity level.
The present invention relates to a method and apparatus for processing electronic data, and in particular, to a method and apparatus for assisting a user to map different descriptions of stored electronic data, or ontologies or data... more
The present invention relates to a method and apparatus for processing electronic data, and in particular, to a method and apparatus for assisting a user to map different descriptions of stored electronic data, or ontologies or data schema, to one another to render considerably easier the process of enabling computers to process stored electronic data stored on different heterogeneous databases according to correspondingly different methodologies.
Abstract Next generation Business Intelligence systems requires flexible and on-time access to enterprise's data. This paper highlights the importance of a data integration layer in a Business Intelligence system and the benefits that the... more
Abstract Next generation Business Intelligence systems requires flexible and on-time access to enterprise's data. This paper highlights the importance of a data integration layer in a Business Intelligence system and the benefits that the use of an ontology as data description formalism and query interface, can bring to the system. In particular we focus on the aspects of data mapping and ontology enrichment, giving a general overview of the problem.
Data Integration systems are used to integrate heterogeneous data sources in a single view. Recent works on Business Intelligence do highlight the need of on-time, trustable and sound data access systems. This require for method based on... more
Data Integration systems are used to integrate heterogeneous data sources in a single view. Recent works on Business Intelligence do highlight the need of on-time, trustable and sound data access systems. This require for method based on a semi-automatic procedure that can provide reliable results. A crucial factor for any semi automatic algorithm is based on the matching operators implemented. Different categories of matching operators carry different semantics.
This paper introduces the notion of Ontology Robustness in Evolution and discusses a solution based on the distinction among a stable component and a contingent component of the ontology. The stable component represents the annotation... more
This paper introduces the notion of Ontology Robustness in Evolution and discusses a solution based on the distinction among a stable component and a contingent component of the ontology. The stable component represents the annotation used to store data into the ontology, while the contingent component contains assertions generated by constraining the assertions in the stable component. This distinction can be used to understand which annotations can be migrated from one old version of the ontology to a new one.
Abstract In this paper we present a closed loop, model-independent approach to software reuse aimed at automatic tuning of software reuse systems. To this end, we rely on polling developers' for their opinions about the reusability value... more
Abstract In this paper we present a closed loop, model-independent approach to software reuse aimed at automatic tuning of software reuse systems. To this end, we rely on polling developers' for their opinions about the reusability value of components, but instead of requiring them to express their views explicitly, our approach relies on observing the user reactions to query answers. The proposed techniques were conceived for reuse in-the-small. by fixing some locally measured reuse coefficients for small teams.

And 394 more