581 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
more
Language operator: and / or
Date operator: and / or
more
Rights operator: and / or
2015 Conference article Open Access OPEN
Experimenting an embedded-sensor network for early warning of natural risks due to fast failures along railways
Fantini A., Magrini M., Martino S., Moroni D., Pieri G., Prestininzi A., Salvetti O.
This paper deals with a project for real-time monitoring of railway tracks to detect events, such as fast failures from natural risks, which may threaten the transit of trains. The paper describes a network of smart sensors for early warning of these endangering events. Three main types of fast-failure events involving railways were identified: sinkhole, rock and debris falls. A case study on a known test site and experimentation with various scenarios were carried out with a view to developing algorithms capable of spotting and localising them. Results demonstrate the good performance of the network in monitoring the investigated events.Source: IMTA 2015 - 5th International Workshop on Image Mining. Theory and Applications, pp. 85–91, Berlin, Germany, 11-14 March 2015

See at: ISTI Repository Open Access | www.scitepress.org Restricted | CNR ExploRA


2015 Conference article Open Access OPEN
Signal processing for underwater archaeology
Moroni D., Pascali M. A., Reggiannini M., Salvetti O.
About three million wrecks lie scattered on the oceans' seafloors. This huge patrimony is actually threatened by criminal enterprises having advanced tools available for localization and rescue operations. ARROWS, a currently ongoing EU FP7 project, is an example of the effective commitment between cultural institutions and the scientific community towards the safeguard of the sunken cultural heritage. ARROWS is devoted to advanced technologies and tools for mapping, diagnosing, cleaning, and securing underwater and coastal archaeological sites. A fleet of Autonomous Underwater Vehicles (AUVs) will be manufactured with the purpose of surveying the seabed and sensing the underwater environment by means of proper payload sensors (digital cameras, side scan and multi-beam sonars). This paper describes a set of underwater scene understanding procedures specifically tailored to the purposes addressed in the ARROWS frame. In particular the data collected by the AUVs during the acquisition campaigns will be processed to detect targets of interest located on the seabed. The main approach adopted in the object detection procedures is to highlight the amount of regularity in the captured data. This can be pursued by exploiting computer vision algorithms that perform i) the recognition of geometrical curves ii) the classification of seafloor areas by means of textural pattern analysis iii) a large scale map generation to return an overall view of the site and iv) a reliable object recognition process performing the integration of the available multi modal information. Moreover the collected raw data together with the analysis output results will be stored to allow for an offline deep analysis of the archaeological findings. This will represent a powerful tool to be used by expert users or by the general public to enjoy the underwater cultural heritage.Source: IMTA 2015 - 5th International Workshop on Image Mining. Theory and Applications, pp. 80–84, Berlin, Germany, 11-14 March 2015
Project(s): ARROWS via OpenAIRE

See at: ISTI Repository Open Access | www.scitepress.org Restricted | CNR ExploRA


2015 Conference article Open Access OPEN
PRIAR using a graph segmentation method
Righi M., D'Acunto M., Salvetti O.
Recently, we have suggested a simple and general-purpose method able to combine high-resolution analysis with the classification and identification of components of microscopy imaging. The method named PRIAR (Pattern Recognition Image Augumented Resolution) is a tool developed by the authors that gives the possibility to enhance spatial and photometric resolution of low-res images. The implemented algorithm follows the scheme: 1) image classification; 2) blind super-resolution on single frame; 3) pattern-analysis; 4) reconstruction of the discovered pattern. In this paper, we suggest some improvements of the PRIAR algorithm, in particular, the definition of a segmentation method which is based on homomorphism between a processed image and a graph describing the image itself, able to identify object of interest in complex patterns. The case study is the identification of organs inside biological cells acquired with Atomic Force Microscopy Technique.Source: IMTA 2015 - 5th International Workshop on Image Mining. Theory and Applications, pp. 46–51, Berlin, Germany, 11-14 March 2015

See at: ISTI Repository Open Access | www.scitepress.org Restricted | CNR ExploRA


2015 Contribution to book Open Access OPEN
From EU projects to a family of model checkers. From Kandinsky to KandISTI
Ter Beek M. H., Gnesi S., Mazzanti F.
We describe the development of the KandISTI family of model checkers from its origins nearly two decades ago until its very recent latest addition. Most progress was made, however, during two integrated European projects, AGILE and SENSORIA, in which our FM&&T lab participated under the scientific coordination of Martin Wirsing. Moreover, the very name of the family of model checkers is partly due to Martin Wirsing's passion for art and science.Source: Software, Services, and Systems. Essays Dedicated to Martin Wirsing on the Occasion of His Retirement from the Chair of Programming and Software Engineering, edited by Rocco De Nicola, Rolf Hennicker, pp. 312–328, 2015
DOI: 10.1007/978-3-319-15545-6_20
Metrics:


See at: ISTI Repository Open Access | doi.org Restricted | link.springer.com Restricted | CNR ExploRA


2015 Report Unknown
Improving test coverage measurement for reused software
Miranda B., Bertolino A.
Test coverage adequacy measures provide a widely used stopping criterion. Engineering of modern software-intensive systems emphasizes reuse. In the case that a program including reused code or third-party components uses them in a context that is different from the original one, some of their entities (e.g. branches) might never be exercised, thus producing a code coverage level far from full and not meaningful anymore as a stopping rule for the program at hand. We introduce a new coverage criterion that in each testing context in which a code is reused calculates coverage measures over the set of relevant entities for that context. We provide an approach for identifying relevant entities using dynamic symbolic execution. The introduced coverage adequacy criterion is assessed in an exploratory study against traditional coverage in terms of test suite size reduction factor, cost-effectiveness ratio and rate of fault detection.Source: ISTI Technical reports, 2015

See at: CNR ExploRA


2015 Software Unknown
SIDEMAN: Service Discovery Algorithm for Mobile Social Networks
Girolami M.
SIDEMAN is a service discovery algorithm that exploits human mobility patterns for the advertisement and discovery of services. SIDEMAN takes advantage of two aspects of daily human behaviour, namely that users visit periodically a restricted number of communities, and that users in the same community share interests for similar services.

See at: CNR ExploRA


2015 Contribution to book Restricted
Quantitative analysis of distributed systems in stoklaim: a tutorial
Latella D., De Nicola R., Loreti M., Massink M.
Network and distributed systems typically consist of a large number of actors that act and interact with each other in a highly dynamic environment. Due to the number of involved actors and their strong dependence on mobility and interaction, performance and dependability issues are of utmost importance for this class of systems. To model these systems many specification languages have been proposed in the literature. One of these is KLAIM: an experimental language specifically designed to program distributed systems consisting of several mobile components that interact through multiple distributed tuple spaces. A stochastic extension of KLAIM, named STOKLAIM, has been proposed to facilitate the incorporation of random phenomena. Moreover, to address key functional aspects of STOKLAIM systems such as distribution awareness, mobility, and security and their integration with performance and dependability guarantees, the temporal logic MoSL has been introduced. In this chapter we show how STOKLAIM and MoSL can be used to specify and verify quantitative properties of distributed systems. These analysis will be performed by relying on statistical model-checking. The use of this relatively new technique permits supporting analysis of large scale systems that, due to the state space explosion problem, cannot be treated via the standard model-checking techniques.Source: Quantitative Assessments of Distributed Systems: Methodologies and Techniques, edited by Dario Bruneo, Salvatore Distefano, pp. 27–55. Hoboken: John Wiley & Sons Inc., 2015
DOI: 10.1002/9781119131151.ch2
Project(s): ASCENS via OpenAIRE
Metrics:


See at: doi.org Restricted | onlinelibrary.wiley.com Restricted | CNR ExploRA


2015 Journal article Open Access OPEN
Mesh joinery: a method for building fabricable structures
Cignoni P., Pietroni N., Malomo L., Scopigno R.
Mesh joinery is an innovative method to produce illustrative shape approximations suitable for fabrication. Mesh joinery is capable of producing complex fabricable structures in an efficient and visually pleasing manner. We represent an input geometry as a set of planar pieces arranged to compose a rigid structure by exploiting an efficient slit mechanism. Since slices are planar, a standard 2D cutting system is sufficient to fabricate them.Source: ERCIM news 101 (2015): 44–45.
Project(s): HARVEST4D via OpenAIRE

See at: ercim-news.ercim.eu Open Access | CNR ExploRA


2015 Conference article Open Access OPEN
Lightweight computer vision methods for traffic flow monitoring on low power embedded sensors
Magrini M., Moroni D., Pieri G., Salvetti O.
Nowadays pervasive monitoring of traffic flows in urban environment is a topic of great relevance, since the information it is possible to gather may be exploited for a more efficient and sustainable mobility. In this paper, we address the use of smart cameras for assessing the level of service of roads and early detect possible congestion. In particular, we devise a lightweight method that is suitable for use on low power and low cost sensors, resulting in a scalable and sustainable approach to flow monitoring over large areas. We also present the current prototype of an ad hoc device we designed and report experimental results obtained during a field test.Source: VISAPP 2015 - 10th International Conference on Computer Vision Theory and Applications, pp. 663–670, Berlin, Germany, 11-14 March 2015
Project(s): ICSI via OpenAIRE

See at: ISTI Repository Open Access | www.scitepress.org Restricted | CNR ExploRA


2015 Conference article Open Access OPEN
Virtual immersive environments for underwater archaeological exploration
Magrini M., Pascali M. A., Reggiannini M., Salvetti O., Tampucci M.
In this paper we describe a system designed for the fruition of underwater archaeological sites. It is under development in the ARROWS project (end August 2015, funded by the European Commission), along with other advanced technologies and tools for mapping, diagnosing, cleaning, and securing underwater and coastal archaeological sites. The main objective is to make easier the management of the heterogeneous set of data available for each underwater archaeological site (archival and historical data, 3D measurements, images, videos, sonograms, georeference, texture and shape of artefacts, others). All the data will be represented in a 3D interactive and informative scene, making the archaeological site accessible to experts (for research purposes, e.g. classification of artefacts by template matching) and to the general public (for dissemination of the underwater cultural heritage).Source: IMTA 2015 - 5th International Workshop on Image Mining. Theory and Applications, pp. 53–57, Berlin, Germany, 11-14 March 2015
Project(s): ARROWS via OpenAIRE

See at: ISTI Repository Open Access | www.scitepress.org Restricted | CNR ExploRA


2015 Contribution to conference Open Access OPEN
Proceedings of the 5th International Workshop on Image Mining. Theory and Applications
Gurevich I., Niemann H., Radig B., Salvetti O.
The IMTA-5 workshop continues the successful series of the IMTA workshops associated with VISAPP conferences and is devoted to modern mathematical techniques of image mining and to image analysis applications in different fields including natural and social sciences, engineering, technology and industry, medicine and others. Automation of image mining is one of the most important strategic goals in image analysis, recognition and un- derstanding both in scientific and technological aspects. The main goals are developing and applying of mathematical theory for constructing image models and representations allowable by efficient pattern recognition algorithms and for constructing standardized re- presentation and selection of image analysis transforms. Taking as a strategic goal the automated image mining it is necessary to provide image analysis professionals and final users with the following opportunities: - automated design, testing and adaptation of techniques and algorithms for image recognition, estimation and understanding; - automated selection of techniques and algorithms for image recognition, estimation and understanding; - automated testing of the raw data quality and suitability for solving image recognition problems; - standard technological schemes for image recognition, estimation, understanding and retrieval.Source: digital library: SCITEPRESS - Science and Technology Publications, 2015

See at: ISTI Repository Open Access | www.scitepress.org Open Access | CNR ExploRA


2015 Journal article Open Access OPEN
The role of tool support in public policies and accessibility
Paternò F., Schiavone A. G.
It has been years since the appearance of the first automated accessibility validators, but their adoption has not been fully addressed in public policies. Even if they do not provide a complete analysis of accessibility and can sometimes provide confusing results, accessibility validators can significantly reduce the time and effort to evaluate websites, making the validation process more efficient, consistent, and reliable. Public policy stakeholders should consider the progress in this field of research for at least three reasons. First, according to several national laws on Web accessibility, public officials are obliged to ensure accessibility in online communications. Further, pushed by the recent economic crisis, many public authorities are moving their services to the Web to speed up processes, reduce costs, and optimize document management. It is important that these e-government services be accessible. Finally, for ethical reasons, public administrations have the duty to support all citizens, giving everyone the same quality of services. Automated accessibility testing tools can play an important role in making public websites more accessible.Source: Interactions (New York, N.Y. Online) 22 (2015): 60–63. doi:10.1145/2745395
DOI: 10.1145/2745395
Metrics:


See at: ISTI Repository Open Access | dl.acm.org Restricted | Test deposit system Restricted | CNR ExploRA


2015 Report Unknown
e-SHS - Alcuni risultati ottenuti
Ferro E., Barsocchi P., Salvetti O., Magrini M., Delmastro F., Matteucci I., Esposito M., Ciampi M., Pettiti G., Crocco L., Soldovieri F., Catapano I., Giannini F., De Martino M., Burzagli L., Capozzi R., Attolico G., Cortellessa G., Cosi P., Paglieri F., Trivella M. G.
Negli ultimi anni, la valutazione del sonno ha acquisito una notevole attenzione e rilievo tra i medici e i ricercatori. L'obiettivo di ottenere i dati del sonno in studi su larga scala è stato quasi raggiunto nel corso degli ultimi anni. Questi studi dimostrano che è possibile identificare i disturbi del sonno per mezzo di una cronistoria del sonno, tra cui i tempi e la regolarità di andare a dormire, i risvegli notturni, il tempo di sveglia della mattina etc. I disturbi del sonno nei pazienti anziani possono essere classificati in due gruppi: disturbi del sonno primari e secondari. I disturbi del sonno primari includono sleep disordered breathing (SDB), REM sleep behavior disorder (RBD), restless leg syndrome (RLS), and periodic limb movement in sleep (PLMS). I disturbi del sonno secondari sono causa di malattie con dolore cronico e disagio, tra questi l'urinazione frequente durante la notte, dispnea e farmaci che interferisce con il sonno etc [1].Source: Project report, e-SHS, Deliverable D2, 2015

See at: CNR ExploRA


2015 Report Unknown
DOREMI - Wireless sensor networks, integration middleware and system configuration
Llorente M., Fortunati L., Kropf J.
This deliverable reports the first release of the DOREMI wireless sensor network (WSN), detailing its architecture, components and integration. This report is delivered together with the preliminary version of the DOREMI WSN, which has limited features but is 100% functional to perform integration and use tests with real users in a Living Lab environment. The document is focused in the description of how each element of the WSN gets data from a specific parcel of the user and puts them available to the rest of the DOREMI system. Features and working details of the software and hardware components developed until the release of this document are detailed. Finally, the development status and the next steps are described in order to put this release in context with the whole works to be performed within WP3 in DOREMI project.Source: Project report, DOREMI, Deliverable D3.2, 2015
Project(s): DOREMI via OpenAIRE

See at: CNR ExploRA


2015 Report Unknown
Human activity recognition using multisensor data fusion based on reservoir computing
Palumbo F., Gallicchio C., Pucci R., Micheli A.
Activity recognition plays a key role in providing activity assistance and care for users in smart homes. In this work, we present an activity recognition system that classifies in the near real-time a set of common daily activities exploiting both the data sampled by sensors embedded in a smartphone carried out by the user and the reciprocal Received Signal Strength (RSS) values coming from worn wireless sensor devices and from sensors deployed in the environment. In order to achieve an effective and responsive classification, a decision tree based on multisensor data-stream is applied fusing data coming from embedded sensors on the smartphone and environmental sensors before processing the RSS stream. To this end, we model the RSS stream, obtained from a Wireless Sensor Network (WSN), using Recurrent Neural Networks (RNNs) implemented as efficient Echo State Networks (ESNs), within the Reservoir Computing (RC) paradigm. We targeted the system for the EvAAL scenario, an international competition that aims at establishing benchmarks and evaluation metrics for comparing Ambient Assisted Living (AAL) solutions. In this paper, the performance of the proposed activity recognition system is assessed on a purposely collected real-world dataset, taking also into account a competitive neural network approach for performance comparison. Our results show that, with an appropriate configuration of the information fusion chain, the proposed system reaches a very good accuracy with a low deployment cost.Source: ISTI Technical reports, 2015
Project(s): DOREMI via OpenAIRE

See at: CNR ExploRA


2015 Journal article Open Access OPEN
A multidisciplinary approach for the study and the virtual reconstruction of the ancient polychromy of Roman sarcophagi
Siotto E., Dellepiane M., Callieri M., Scopigno R., Gatziu C., Moscato A., Burgio L., Legnaioli S., Lorenzetti G., Palleschi V.
In this paper, we report a multidisciplinary approach for the analytic study and the reconstruction of the ancient colour used for Roman sarcophagi. For this purpose, we adopted the three-dimensional (3D) digital technology and found it to be a valuable tool for the identification, documentation and reconstruction of the ancient colour. This technology proved to be an excellent link between archaeological knowledge and scientific analyses. Therefore, 3D digital technologies would effectively facilitate the exchange of information and collaboration between experts in various disciplines. This is extremely important in order to obtain demonstrable results in a new area of study, such as polychrome Roman sarcophagi (and the ancient polychromy and gilding on the marble). In this study, the digital 3D model of Ulpia Domnina's sarcophagus (National Roman Museum in Rome, inv. no. 125891) has been used to identify both the pigments and the techniques of application used, and to explore the potential of emerging technologies in the reconstruction and visualization of the ancient colour.Source: Journal of cultural heritage 16 (2015): 307–314. doi:10.1016/j.culher.2014.05.011
DOI: 10.1016/j.culher.2014.05.011
Metrics:


See at: ISTI Repository Open Access | Journal of Cultural Heritage Restricted | www.sciencedirect.com Restricted | CNR ExploRA


2015 Journal article Open Access OPEN
A non-stationary density model to separate overlapped texts in degraded documents
Tonazzini A., Savino P., Salerno E.
We address the problem of the removal of a text superimposed to a more important one, in a document image, considering the two instances of canceling back-to-front interferences from recto and verso images of archival documents and of recovering the erased text in palimpsests from multispectral images. Both problems are approached through a model where the ideal images of the two texts are considered as individual source patterns, mixed through some parametric operator. To cope with occlusions, ink saturation, and space variability of the mixing operator, a data model for this problem should be nonlinear and space variant. Here, we show that if a pointwise non-stationarity is allowed, a linear model can compensate for the lack of a suitable nonlinearity and for other modeling errors.Source: Signal, image and video processing (Print) 9 (2015): 155–164. doi:10.1007/s11760-014-0735-3
DOI: 10.1007/s11760-014-0735-3
Metrics:


See at: Signal Image and Video Processing Open Access | link.springer.com Open Access | Signal Image and Video Processing Open Access | ISTI Repository Open Access | CNR ExploRA


2015 Journal article Restricted
Fast and simple automatic alignment of large sets of range maps
Pingi P., Corsini M., Ganovelli F., Scopigno R.
We present a very fast and simple-to-implement algorithm for the automatic registration of a large number of range maps. The proposed algorithm exploits a compact and GPU-friendly descriptor specifically designed for the alignment of this type of data. This pairwise registration algorithm, which also includes a simple mechanism to avoid to get false positives, is part of a system capable to align a sequence of up to hundreds of range maps in few minutes. In order to reduce the number of pairs to align in the case of unordered range maps we use a prioritization strategy based on the fast computation of the correlation between range maps through FFT. The proposed system does not need any user input and it was tested successfully on a large variety of datasets coming from real acquisition campaigns.Source: Computers & graphics 47 (2015): 78–88. doi:10.1016/j.cag.2014.12.002
DOI: 10.1016/j.cag.2014.12.002
Project(s): HARVEST4D via OpenAIRE
Metrics:


See at: Computers & Graphics Restricted | www.sciencedirect.com Restricted | CNR ExploRA


2015 Journal article Open Access OPEN
Optimizing text quantifiers for multivariate loss functions
Esuli A., Sebastiani F.
Quantification - also known as class prior estimation - is the task of estimating the relative frequencies of classes in application scenarios in which such frequencies may change over time. This task is becoming increasingly important for the analysis of large and complex datasets. Researchers from ISTI-CNR, Pisa, are working with supervised learning methods explicitly devised with quantification in mind.Source: ERCIM news 100 (2015): 49–49.

See at: ercim-news.ercim.eu Open Access | ISTI Repository Open Access | CNR ExploRA


2015 Report Unknown
Evolving database conceptual graph partitioning
Locuratolo E. I.
Algorithms of graph partitioning exploited in conceptual database design for researches common to both information systems and software engineering approaches have recently been reused in concept theory to define a methodology of database concept preservation. An algorithm, called concept construction algorithm has been designed. The paper examines the advances in the database conceptual graph partitioning research. Relationships between conceptual graphs and concept generalization hierarchies are established at the boundary between concept theory and computer science. An algorithm for the integration of concept generalization hierarchies is proposed as a refinement step of the concept construction algorithm.Source: ISTI Technical reports, 2015

See at: CNR ExploRA