522 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
more
Language operator: and / or
Date operator: and / or
more
Rights operator: and / or
2006 Journal article Unknown
An automatic system for the analysis of links among dream sources
Barcaro U., Cavallero C., Navona C., Salvetti O.
An automatic system is described for the automatic analysis of textfiles including dream reports obtained after forced awakening and associations with the dream items. The system consists of a Dictionary Database, a Result Database, and a set of Java procedures. The final result consists in tables representing multigraphs whose nodes correspond to memory sources and whose arcs correspond to links among memory sources.Source: Journal of sleep research (Print) 6 (2006).

See at: CNR ExploRA


2006 Journal article Open Access OPEN
A markov model for blind image separation by a mean-field EM algorithm
Tonazzini A., Bedini L., Salerno E.
This paper deals with blind separation of images from noisy linear mixtures with unknown coefficients, formulated as a Bayesian estimation problem. This is a flexible framework, where any kind of prior knowledge about the source images and the mixing matrix can be accounted for. In particular, we describe local correlation within the individual images through the use of MRF image models. These are naturally suited to express the joint pdf of the sources in a factorized form, so that the statistical independence requirements of most ICA approaches to BSS are retained. Our model also includes edge variables to preserve intensity discontinuities. MRF models have been proved to be very efficient in many visual reconstruction problems, such as blind image restoration, and allow separation and edge detection to be performed simultaneously. We propose an Expectation-Maximization algorithm with the mean field approximation, to derive a procedure for estimating the mixing matrix, the sources and their edge maps. We tested this procedure on both synthetic and real images, in the fully blind case (i.e. no prior information on mixing is exploited) and found that a source model accounting for local auto-correlation is able to increase robustness against noise, even space-variant. Furthermore, when the model closely fits the source characteristics, independence is no more a strict requirement, and cross-correlated sources can be separated as well.Source: IEEE transactions on image processing 15 (2006): 473–482. doi:10.1109/TIP.2005.860323
DOI: 10.1109/tip.2005.860323
Metrics:


See at: IEEE Transactions on Image Processing Open Access | IEEE Transactions on Image Processing Restricted | CNR ExploRA


2006 Journal article Unknown
A practical architecture-centric analysis process
Bucchiarone A., Muccini H., Pelliccione P.
When engineering complex and distributed software and hardware systems (increasingly used in many sectors, such as manufacturing, aerospace, transportation, communication, energy and health-care), dependability has became a must, since failures can have economics consequences and can also endanger human life. Software Architectures (SA) can help improving the overall system dependability, providing a system blueprint that can be validated and that can guide all phases of the system development. Even if much work has been done on this direction, three important topics require major investigation: how different analysis techniques can be integrated together, how results obtained with SA-based analysis can be related to requirements and coding, and how integrate new methodologies in the industrial software development life-cycle. In this paper we propose an architecture-centric analysis process which allows formal analysis driven by model-based architectural specifications. This analysis process satisfies the industrial requirements, since it is tool supported and based on semi-formal (UML-based) specifications.Source: Lecture notes in computer science (2006): 127–144.

See at: CNR ExploRA


2006 Journal article Open Access OPEN
A realtime immersive application with realistic lighting: the Parthenon
Callieri M., Debevec P., Pair J., Scopigno R.
Off-line rendering techniques have nowadays reached an astonishing level of realism but pay the cost of long computational times. The new generation of programmable graphic hardware, on the other hand, gives the possibility to implement in realtime some of the visual e ects previously available only for cinematographic production. We describe the design and implementation of an interactive system which is able to reproduce in realtime one of the crucial sequences from the short movie 'The Parthenon' presented at Siggraph 2004. The application is designed to run on a specific immersive reality system, making possible for a user to perceive the virtual environment with nearly-cinematographic visual quality.Source: Computers & graphics 30 (2006): 368–376. doi:10.1016/j.cag.2006.02.015
DOI: 10.1016/j.cag.2006.02.015
Metrics:


See at: Computers & Graphics Open Access | Computers & Graphics Restricted | www.sciencedirect.com Restricted | CNR ExploRA


2006 Journal article Restricted
A story about formal methods adoption by a railway signaling Manufacturer
Bacherini S., Fantechi A., Tempestini M., Zingoni N.
This paper reports the story of the introduction of formal methods in the development process of a railway signaling manufacturer. The first difficulty for a company is due to the many different formal methods proposals around; we show how this difficulty has been addressed and how the choice of a reference formal specification notation and of the related tools has been driven by many external factors related to the specific application domain, to the company policies, to european regulations. Cooperation with University has been fundamental in this process, which is now at the stage in which internal acceptance of the chosen formalisms and tools is establishedSource: Lecture notes in computer science (2006): 179–189.

See at: www.springerlink.com Restricted | CNR ExploRA


2006 Journal article Unknown
A symbolic framework for model-based testing
Frantzen L., Tretmans J., Willemse T.
The starting point for Model-Based Testing is an implementation relation that formally defines when a formal model representing the System Under Test conforms to a formal model constituting its specification. An implementation relation for the formalism of Labelled Transition Systems is ioco. For ioco several test generation algorithms and test tools have been built. In this paper we define a framework for the symbolic implementation relation sioco which lifts ioco to Symbolic Transition Systems. These are transition systems with an explicit notion of data and data-dependent control flow. The introduction of symbolism avoids the state-space explosion during test generation, and it preserves the information present in data definitions and constraints for use during the test selection process. We show the soundness and completeness of the symbolic notions w.r.t. their underlying Labelled Transition Systems' counterparts.Source: Lecture notes in computer science (2006): 40–54.

See at: CNR ExploRA


2006 Journal article Unknown
A taxonomy for migratory user interfaces
Berti S., Paternò F., Santoro C.
Migratory user interfaces are particularly promising for forthcoming ubiquitous environments enabled by the evolution of wireless technology and the proliferation of a wide variety of interactive devices. In this paper we present a logical framework and some fundamental concepts and dimensions that can be useful to help user interface designers and developers understand migratory interfaces, analyse the state of the art, and identify areas which need further research. A number of works in this area are compared and referred to such framework and dimensions, so as to identify the advantages and drawbacks of the various approaches.Source: Lecture notes in computer science (2006): 149–160.

See at: CNR ExploRA


2006 Journal article Restricted
A unified interaction scheme for information sources
Tzitzikas Y., Meghini C., Spyratos N.
Commonly, for retrieving the desired information from an information source (knowledge base or information base), the user has to use the query language that is provided by the system. This is a big barrier for many ordinary users and the resulting interaction style is rather inflexible. In this paper we give the theoretical foundations of an interaction scheme that allows users to retrieve the objects of interest without having to be familiar with the conceptual schema of the source or with the supported query language. Specifically, we describe an interaction manager that provides a quite flexible interaction scheme by unifying several well-known interaction schemes. Furthermore, we show how this scheme can be applied to taxonomy-based sources by providing all needed algorithms and reporting their computational complexity.Source: Journal of intelligent information systems 26 (2006): 75–93. doi:10.1007/s10844-006-5452-0
DOI: 10.1007/s10844-006-5452-0
Metrics:


See at: Journal of Intelligent Information Systems Restricted | www.springerlink.com Restricted | CNR ExploRA


2006 Conference article Restricted
Abduction for extending incomplete information sources
Meghini C., Tzitzikas Y., Spyratos N.
The extraction of information from a source containing term-classified objects is plagued with uncertainty, due, among other things, to the possible incompleteness of the source index. To overcome this incompleteness, the study proposes to expand the index of the source, in a way that is as reasonable as possible with respect to the original classification of objects. By equating reasonableness with logical implication, the sought expansion turns out to be an explanation of the index, captured by abduction. We study the general problem of query evaluation on the extended information source, providing a polynomial time algorithm which tackles the general case, in which no hypothesis is made on the structure of the taxonomy. We then specialize the algorithm for two well-know structures: DAGs and trees, showing that each specialization results in a more efficient query evaluation.Source: 4th Helenic Conference on AI, SETN 2006, pp. 267–278, Heraklion, Crete, May 18-20, 2006
DOI: 10.1007/11752912_28
Metrics:


See at: doi.org Restricted | link.springer.com Restricted | CNR ExploRA


2006 Journal article Unknown
Achieving fault tolerance by a formally validated interaction policy
Fantechi A., Gnesi S., Semini L.
This paper presents the rigorous validation of an integrity policy by means of the application of formal methods and related support tools for its specification and verification. The protocol which carries out the integrity policy is formally specified and formally validated, exploiting model-checking. Specific interaction patterns, which subsume the most complex interaction schemata, are considered and temporal logic formulae expressing the non-violation of integrity rules are checked on them.Source: Lecture notes in computer science (2006): 133–152.

See at: CNR ExploRA


2006 Journal article Unknown
Adaptive cross-layer bandwidth allocation in a rain-faded satellite environment
Celandroni N., Davoli F., Ferro E., Gotta A.
Two control schemes, based on cross-layer adaptation and a hierarchical parametric optimization of the bandwidth allocation, are described and investigated in a satellite network environment, in the presence of both real-time and best-effort traffic flows. A number of earth stations (traffic stations) operate in different weather conditions, with different levels of fade, which affect the transmitted signals. The call admission control policy for real-time connections is administered locally at the traffic stations. A master station is charged to manage the time division multiple access bandwidth allocation policy, by defining bandwidth partitions to the traffic stations. Upon detecting significant fade changes, the signalling from the traffic stations triggers new bandwidth redistributions. The control schemes are compared, and the effect of fade countermeasures, applied at the physical layer, on the bandwidth occupation is explicitly accounted for. For each policy, figures of merit such as loss, blocking and dropping probabilities are computed for a specific real environment, based on the Italsat satellite national coverage payload characteristics.Source: International journal of communication systems (Print) 19 (2006): 509–530.

See at: CNR ExploRA


2006 Journal article Restricted
Ambient occlusion and edge cueing to enhance real time molecular visualization
Tarini M., Cignoni P., Montani C.
The paper presents a set of combined techniques to enhance the real-time visualization of simple or complex molecules (up to order of 10^6 atoms) space fill mode. The proposed approach includes an innovative technique for efficient computation and storage of ambient occlusion terms, a small set of GPU accelerated procedural impostors for space-fill and ball-and-stick rendering, and novel edge-cueing techniques. As a result, the user's understanding of the three-dimensional structure under inspection is strongly increased (even for still images), while the rendering still occurs in real time.Source: IEEE transactions on visualization and computer graphics 12 (2006): 1237–1244. doi:10.1109/TVCG.2006.115
DOI: 10.1109/tvcg.2006.115
Metrics:


See at: IEEE Transactions on Visualization and Computer Graphics Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA


2006 Conference article Open Access OPEN
An environment for defining and handling guidelines for the Web
Leporini B., Paternò F., Scorcia A.
Several accessibility and usability guidelines are proposed more and more. In this paper we present an environment for defining, handling and checking guidelines for the Web. The goal of such a tool is to support developers and evaluators in flexibly handling multiple sets of guidelines, which can be dynamically considered in the evaluation process. In particular, an interactive editor has been designed to assist the evaluators in abstracting and specifying new and existing guidelines in our XML-based Guideline Abstraction Language (GAL), which are then stored in external files. Our tool is able to check any guidelines specified in this language without requiring changes in its implementation.Source: 10th International Conference, ICCHP 2006, pp. 176–183, Linz, Austria, July 11-13, 2006
DOI: 10.1007/11788713_27
Metrics:


See at: giove.isti.cnr.it Open Access | doi.org Restricted | link.springer.com Restricted | www.scopus.com Restricted | CNR ExploRA


2006 Contribution to journal Open Access OPEN
An integrated infrared-visible system for fire detection
Pieri G., Benvenuti M., De Michele P., Petri D., Salvetti O.
The activity under investigation in this paper regards in particular the development of an information system for the automatic monitoring and detection of forest fires, using combined infrared and visible cameras. The proposed system is based on previously selected and studied algorithms. An integrated information system developed for the monitoring and the automatic detection and location of forest fires is described. This system uses robotized stations equipped with combined infrared (IR) and visible cameras. A specific approach has been developed based on computing thermal and spatial information suitably fused. Real time meteorological information, and previously stored morphological information are integrated and processed by a suitable decisional component based on a fuzzy rules system, which gives the final response for an alert on an active fire.Source: Forest ecology and management 234 (2006): S37.

See at: ISTI Repository Open Access | CNR ExploRA


2006 Journal article Unknown
An interactive musical exhibit based on infrared sensor
Bertini G., Magrini M., Tarabella L.
This paper deals with the description of the design of an exhibit for controlling real-time audio synthesis with a wireless, IR-based interface. Researching new way for playing and real-time controlling electronic music is today's hot topic in the computer music field. In this specific project the goal is to obtain an enjoyable exhibit playability together with robustness and reliability, in order to constantly operate with young users (children too) and, more in general, non expert people. Our effort has been focused to carefully design the hardware/software project, in a way that the final user will interact only with non critical parts of the system.Source: Lecture notes in computer science 3902 (2006): 92–100.

See at: CNR ExploRA


2006 Journal article Restricted
An open standard solution for domotic interoperability
Miori V., Tarrini L., Manca M., Tolomei G.
This article describes a service-oriented solution framework designed for home environments. A pragmatic approach is developed to help integrate conventional home automation systems following the service oriented computing paradigm. We believe it is improbable that there will be a single dominant middleware for the home computing that would be right for different appliances. A number of middlewares have recently emerged and it is common knowledge that they haven't a sufficient degree of interoperability. Because of this, the authors show how the approach based on XML, Web Services, and Internet protocols, provide a uniform and novel architecture to cope with the architecture complexity in a open standard way. Furthermore a converging layer is conceived to incorporate a high level abstraction by an XML-based home automation language.Source: IEEE transactions on consumer electronics 52 (2006): 97–103. doi:10.1109/TCE.2006.1605032
DOI: 10.1109/tce.2006.1605032
Metrics:


See at: IEEE Transactions on Consumer Electronics Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA


2006 Journal article Unknown
Analysing context-dependent deviations in interacting with safety-critical systems
Paternò F., Santoro C.
Mobile technology is penetrating many areas of human life. This implies that the context of use can vary in many respects. We present a method that aims to support designers in managing the complex design space when considering applications with varying contexts and help them to identify solutions that support users in performing their activities while preserving usability and safety. The method is a novel combination of an analysis of both potential deviations in task performance and most suitable information representations based on distributed cognition. The originality of the contribution is in providing a conceptual tool for better understanding the impact of context of use on user interaction in safety-critical domains. In order to present our approach we provide an example in which the implications of introducing new support through mobile devices in a safety-critical system are identified and analysed in terms of potential hazards.Source: Reliability engineering & systems safety 91 (2006): 1546–1553.

See at: CNR ExploRA


2006 Journal article Restricted
Analysis of the orbital decay of spherical satellites using different solar flux proxies and atmospheric density models
Pardini C., Tobiska W. K., Anselmo L.
In order to highlight the performances of the JR-71 and MSISE-90 atmospheric density models and also to investigate whether the use of the E10.7 index, instead of the F10.7 cm solar radio flux, improves the trajectory modeling of low Earth objects, the orbital decay of eleven spherical satellites was analyzed. The data were distributed over a full solar activity cycle and covered altitudes in between 150 and 1500 km. The observed evolution of the mean semi-major axis was obtained by processing the historical two-line elements record. For each satellite, environmental condition, atmospheric model and solar flux proxy, a drag coefficient was computed by fitting the observed semi-major axis decay, comparing the results with the theoretical estimates. Below 400 km, both models overestimated the atmosphere density, independently on the solar flux proxy and environmental conditions. MSISE-90, with F10.7, proved to be the best model to compute the air density, in low solar activity conditions. JR-71, with F10.7, was generally more accurate over the maximum of the 23rd solar cycle, while MSISE-90 revealed to be the best model in the increasing phase of the solar flux, when using E10.7. Between 750 and 850 km, the average accuracy of the models was generally better than 15% and the choice of the atmospheric density model was relatively inconsequential, both in conditions of low and high solar activity. A quite large uncertainty was instead observed in moderate conditions, when using E10.7 in both models. At 1500 km, both models underestimated the air density by more than 35%, in low solar activity conditions. For high solar fluxes, the density was well represented by JR-71, both using F10.7 and E10.7, while it resulted to be underestimated, by about 25%, when using MSISE-90, both with E10.7 and F10.7. In general, more accurate orbital decay fits were obtained with E10.7, which seems able to better describe the atmosphere density changes induced by a varying solar activity. In conclusion, none of the models analyzed was able to accurately describe the atmosphere density in all orbital regimes and environmental conditions, independently on the solar flux proxy.Source: Advances in space research 37 (2006): 392–400. doi:10.1016/j.asr.2004.10.009
DOI: 10.1016/j.asr.2004.10.009
Metrics:


See at: Advances in Space Research Restricted | CNR ExploRA


2006 Journal article Unknown
Audition of Web services for testing conformance to open specified protocols
Bertolino A., Frantzen L., Polini A., Tretmans J.
A Web Service (WS) is a type of component specifically conceived for distributed machine-to-machine interaction. Interoperability between WSs involves both data and messages exchanged and protocols of usage, and is pursued via the establishment of standard specifications to which service providers must conform. In previous work we have envisaged a framework for WS testing. Within this framework, this paper focuses on how the intended protocol of access for a standard service could be specified, and especially on how the conformance of a service instance to this specified protocol can then be tested. We propose to augment the WSDL description with a UML2.0 Protocol State Machine (PSM) diagram. The PSM is intended to express how, and under which conditions, the service provided by a component through its ports and interfaces can be accessed by a client. We then propose to translate the PSM to a Symbolic Transition System, to which existing formal testing theory and tools can be readily applied for conformance evaluation. A simple example illustrates the approach and highlights the peculiar challenges raised by WS conformance testing.Source: Lecture notes in computer science 3938 (2006): 1–25.

See at: CNR ExploRA


2006 Journal article Restricted
Beyond manual drafting: a restoration-oriented system
Callieri M., Cignoni P., Scopigno R., Gori G., Risaliti M.
The production of drawings is a basic activity in restoration, archeology and Cultural Heritage (CH) didactics. The manual production of technical drawings is a complex process, both in terms of time and skills required. In this paper we present a computer-aided methodology to produce technical drawings of CH artifacts. A pre-requisite of our methodology is the acquisition of an accurate digital 3D model of the artifact, which is now possible at affordable costs using 3D scanning technology. We discuss the specific needs that a drafting system oriented to the CH domain should satisfy and we present the design, features and performances of a computer-aided drafting system, called Cavalieri. Cavalieri allows to manage the huge digital models produced with 3D scanning devices and supports easy specification of orthographic drawings and cut-through sections, which are given in output as very high resolution images (with user-selected reproduction scale and printer resolution). We conclude with some results of Cavalieri's assessment in the framework of two restoration projects.Source: Journal of cultural heritage 7 (2006): 214–226. doi:10.1016/j.culher.2006.06.002
DOI: 10.1016/j.culher.2006.06.002
Metrics:


See at: Journal of Cultural Heritage Restricted | www.sciencedirect.com Restricted | CNR ExploRA