2013
Software
Metadata Only Access
ConnectEnabler-Monitor
Calabrò A.The deployment and the execution of applications on dynamic runtime infrastructures introduces new requirements of adaptability with respect to monitoring. Specifically, the governance of services relies on the observation and analysis of events happening at different abstraction layers. Adaptability requirements are even more evident when monitoring deals with Service Level Agreements (SLA) or KPI (Key Performance Indicator). The proposed monitoring infrastructure keeps track of the continuous evolution of the underlying environment, and adapt itself accordingly. The multi-source monitoring architecture developed by SEDC Laboratory that can synthesize on-the-fly SLA/KPI monitoring rules following the evolution of the infrastructure. Here below, a brief description of the main monitoring components as show in Figure 1. More details are provided in the referenced papers.
See at:
github.com | CNR IRIS
2016
Software
Metadata Only Access
Monitoring component for business process model simulation engine
Calabrò A.A Business Process models a set of tasks to be carried out within an organization to achieve a business goal. Key performance In-dicators (KPIs) are set on such process models so to get a quantitative assessment of critical success metrics. A timely and reliable monitoring of KPIs is instrumental to BP management, and several frameworks are being proposed for such purpose.
We propose here a reference architecture supporting BP KPI monitoring that is independent from specific notations and platforms, and allows for flexible KPI decisions.
See at:
github.com | CNR IRIS
2015
Other
Metadata Only Access
Amaretto 2016 - website
Calabrò A.Sito web della prima edizione della conferenza internazionale Amaretto realizzata in congiunzione della conferenza Modelsward . Realizzato su joomla con estensione di plugin e template ad hoc per le tablet e dispositivi mobili.
See at:
amaretto2016.isti.cnr.it | CNR IRIS
2017
Other
Metadata Only Access
AST2018 - website
Calabrò A.Website has been created using html5 technologies and is hosted on SEDC laboratory servers.
AST 2018 is the 13th edition of the successful AST series held at ICSE conferences since 2006. It will provide researchers and practitioners with a forum for exchanging ideas, experiences, understanding of the problems, visions for the future, and promising solutions.
See at:
ast2018.isti.cnr.it | CNR IRIS
2018
Other
Metadata Only Access
AST2019 - website
Calabrò A.Website has been created using html5 technologies and is hosted on SEDC laboratory servers.
AST 2019 is the 14th edition of the successful AST series held at ICSE conferences since 2006. It will provide researchers and practitioners with a forum for exchanging ideas, experiences, understanding of the problems, visions for the future, and promising solutions.
See at:
ast2019.isti.cnr.it | CNR IRIS
2021
Software
Metadata Only Access
Transponder - supporT foR locAliziNg diStressed People thrOugh a flyiNg Drone nEtwoRk
Calabrò A.Solutions for improving Search and Rescue operations (SAR) operations are receiving increasing attention. Transponder is one of the an open-source, lightweight and low-cost solution. It installed on top of a drone, conceived for the analysis of Wi-Fi beacons or probe requests in areas without network infrastructure. It relies on LoRa communications and uses a Complex Event Processor for the enhancing and enriching data analysis and for providing first-aid information.
See at:
github.com | CNR IRIS
2022
Software
Metadata Only Access
Concern - COmplex eveNt proCEssing monitoR iNfrastructure
Calabrò A.Concern is a predictive simulation monitoring infrastructure that aims to cooperate within Digital Twin in execution on a simulated environment to avoid possible accidents or failures happen in real systems using forecasting and self-generation rules techniques.Project(s): BIECO
See at:
github.com | CNR IRIS
2009
Conference article
Metadata Only Access
Book4All: a tool to make an e-book more accessible to students with vision/visual-impairments
Calabrò A., Contini E., Leporini B.Empowering people who are blind or otherwise visually impaired includes ensuring that products and electronic materials incorporate a broad range of accessibility features and work well with screen readers and other assistive technology devices. This is particularly important for students with vision impairments. Unfortunately, authors and publishers often do not include specific criteria when preparing the contents. Consequently, e-books can be inadequate for blind and low vision users, especially for students. In this paper we describe a semi-automatic tool developed to support operators who adapt e-documents for visually impaired students. The proposed tool can be used to convert a PDF e-book into a more suitable accessible and usable format readable on desktop computer or on mobile devices.
See at:
CNR IRIS | link.springer.com
2013
Software
Metadata Only Access
Choreos MultiSource Monitoring Framework
Calabrò A., De Angelis G.The deployment and the execution of applications on dynamic Cloud infrastructures introduces new requirements of adaptability with respect to monitoring. Specifically, the governance of service choreographies enacted over Cloud-based solutions relies on the observation and analysis of events happening at different abstraction layers. Adaptability requirements are even more evident when monitoring deals with Service Level Agreements (SLA) established among the choreography participants. In fact, as the Cloud paradigm offers on-demand solutions as a service, often monitoring rules cannot be completely defined off-line. Thus also the monitoring infrastructure must keep track of the continuous evolution of the underlying environment, and adapt itself accordingly. The software realize an architecture that can synthesize on-the-fly SLA monitoring rules following the evolution of the Cloud infrastructure.Project(s): CHOREOS
See at:
github.com | CNR IRIS
2019
Conference article
Restricted
GDPR and business processes: an effective solution
Bartolini C., Calabrò A., Marchetti E.In the European Union, the recent update to data protection laws by virtue of the General Data Protection Regulation (GDPR) significantly changed the landscape of the processing of personal data. Consequently, adequate solutions to ensure that the controller and processor properly understand and meet the data protection requirements are needed. In enterprise reality it is quite common to use Business Process (BP) models to manage the different business activities. Hence the idea of integrating privacy concepts into BP models so as to leverage them to the role of GDPR recommenders. To this end, suggestions and recommendations about data management pursuant to GDPR provisions have been added to specific tasks of the BP, to improve both the process management and personnel learning and training. Feasibility of the proposed idea, implemented into an Eclipse plugin, has been provided through a realistic example.
See at:
dl.acm.org | CNR IRIS | CNR IRIS
2010
Software
Metadata Only Access
Book4All
Leporini B., Contini E., Calabrò A.Book4All fornisce un supporto semi-automatico agli operatori per adattare documenti elettronici per studenti ipovedenti. Lo strumento può essere utilizzato per convertire un e-book PDF in un formato accessibile e utilizzabile, leggibile su computer desktop o su dispositivi mobili come XHTML e DAISY.
See at:
hci.isti.cnr.it | CNR IRIS
2024
Journal article
Open Access
Transponder: support for localizing distressed people through a flying drone network
Calabrò A., Marchetti E.In Search and Rescue (SAR) operations, the speed and techniques used by rescuers and effective communication with the person in need of rescue are vital for successful operations. Recently, drones have become an essential tool in SAR, used by both military and civilian organizations to locate and aid missing persons. Objective: The paper introduces Transponder, a Wi-Fi-based solution designed to enhance SAR efforts by tracking, localizing, and providing first aid information to distressed individuals, even in challenging environments such as forests, mountains, and urban areas lacking GSM/UMTS coverage or that are difficult to reach with terrestrial rescue. Methods: Provide an innovative mechanism based on Wi-Fi beacon detection, LoRa communication, and the possible mobile application to leverage the SAR operation. Provide the preliminary implementation of the Transponder and perform its assessment in scenarios with dense vegetation. Results: The Transponder functionalities have been proven to enhance and expedite the detection of missing persons. Additionally, responses to several research questions regarding its performance and effectiveness are provided. Conclusions: Transponder is an innovative detection mechanism that combines ground-based analysis with on-board analysis, optimizing energy consumption and realizing an efficient solution for real-world scenarios.Source: DRONES, vol. 8 (issue 9)
Project(s): RESearch and innovation on future Telecommunications systems and networks, to make Italy more smart”, SEcurity and RIghts In the CyberSpace
See at:
CNR IRIS | www.mdpi.com | CNR IRIS
2024
Journal article
Open Access
A methodological approach to securing cyber-physical systems for critical infrastructures
Calabrò A., Cambiaso E., Cheminod M., Cibrario Bertolotti I., Durante L., Forestiero A., Lombardi F., Manco G., Marchetti E., Orlando A., Papuzzo G.Modern ICT infrastructures, i.e., cyber-physical systems and critical infrastructures relying on interconnected IT (Information Technology)- and OT (Operational Technology)-based components and (sub-)systems, raise complex challenges in tackling security and safety issues. Nowadays, many security controls and mechanisms have been made available and exploitable to solve specific security needs, but, when dealing with very complex and multifaceted heterogeneous systems, a methodology is needed on top of the selection of each security control that will allow the designer/maintainer to drive her/his choices to build and keep the system secure as a whole, leaving the choice of the security controls to the last step of the system design/development. This paper aims at providing a comprehensive methodological approach to design and preliminarily implement an Open Platform Architecture (OPA) to secure the cyber-physical systems of critical infrastructures. Here, the Open Platform Architecture (OPA) depicts how an already existing or under-design target system (TS) can be equipped with technologies that are modern or currently under development, to monitor and timely detect possibly dangerous situations and to react in an automatic way by putting in place suitable countermeasures. A multifaceted use case (UC) that is able to show the OPA, starting from the security and safety requirements to the fully designed system, will be developed step by step to show the feasibility and the effectiveness of the proposed methodology.Source: FUTURE INTERNET, vol. 16 (issue 11)
Project(s): SEcurity and RIghts in the CyberSpace
See at:
CNR IRIS | www.mdpi.com | CNR IRIS