70 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
Language operator: and / or
Date operator: and / or
more
Rights operator: and / or
2017 Other Restricted
Use cases for GLIMPSE, a Generic fLexIble Monitoring based on a Publish-Subscribe infrastructurE
Calabrò A.
Use cases for GLIMPSE, a Generic fLexIble Monitoring based on a Publish-Subscribe infrastructurE.Project(s): ELASTEST via OpenAIRE

See at: CNR IRIS Restricted | CNR IRIS Restricted


2014 Other Restricted
ICSE 2015 - The 37th International Conference on Software Engineering
Calabrò A.
Sito web della trentasettesima edizione della conferenza internazionale di Ingegneria del Software ( RANK A1 ) . Realizzato su wordpress con estensione di plugin e template ad hoc per le tablet e dispositivi mobili. Layout completamente alternativo a quello delle precedenti edizioni della conferenza. Gestione ranking google e manutenzione negli anni.

See at: 2015.icse-conferences.org Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2013 Software Metadata Only Access
ConnectEnabler-Monitor
Calabrò A.
The deployment and the execution of applications on dynamic runtime infrastructures introduces new requirements of adaptability with respect to monitoring. Specifically, the governance of services relies on the observation and analysis of events happening at different abstraction layers. Adaptability requirements are even more evident when monitoring deals with Service Level Agreements (SLA) or KPI (Key Performance Indicator). The proposed monitoring infrastructure keeps track of the continuous evolution of the underlying environment, and adapt itself accordingly. The multi-source monitoring architecture developed by SEDC Laboratory that can synthesize on-the-fly SLA/KPI monitoring rules following the evolution of the infrastructure. Here below, a brief description of the main monitoring components as show in Figure 1. More details are provided in the referenced papers.

See at: github.com Restricted | CNR IRIS Restricted


2016 Software Metadata Only Access
Monitoring component for business process model simulation engine
Calabrò A.
A Business Process models a set of tasks to be carried out within an organization to achieve a business goal. Key performance In-dicators (KPIs) are set on such process models so to get a quantitative assessment of critical success metrics. A timely and reliable monitoring of KPIs is instrumental to BP management, and several frameworks are being proposed for such purpose. We propose here a reference architecture supporting BP KPI monitoring that is independent from specific notations and platforms, and allows for flexible KPI decisions.

See at: github.com Restricted | CNR IRIS Restricted


2015 Other Metadata Only Access
Amaretto 2016 - website
Calabrò A.
Sito web della prima edizione della conferenza internazionale Amaretto realizzata in congiunzione della conferenza Modelsward . Realizzato su joomla con estensione di plugin e template ad hoc per le tablet e dispositivi mobili.

See at: amaretto2016.isti.cnr.it Restricted | CNR IRIS Restricted


2017 Other Metadata Only Access
AST2018 - website
Calabrò A.
Website has been created using html5 technologies and is hosted on SEDC laboratory servers. AST 2018 is the 13th edition of the successful AST series held at ICSE conferences since 2006. It will provide researchers and practitioners with a forum for exchanging ideas, experiences, understanding of the problems, visions for the future, and promising solutions.

See at: ast2018.isti.cnr.it Restricted | CNR IRIS Restricted


2018 Other Metadata Only Access
AST2019 - website
Calabrò A.
Website has been created using html5 technologies and is hosted on SEDC laboratory servers. AST 2019 is the 14th edition of the successful AST series held at ICSE conferences since 2006. It will provide researchers and practitioners with a forum for exchanging ideas, experiences, understanding of the problems, visions for the future, and promising solutions.

See at: ast2019.isti.cnr.it Restricted | CNR IRIS Restricted


2021 Software Metadata Only Access
Transponder - supporT foR locAliziNg diStressed People thrOugh a flyiNg Drone nEtwoRk
Calabrò A.
Solutions for improving Search and Rescue operations (SAR) operations are receiving increasing attention. Transponder is one of the an open-source, lightweight and low-cost solution. It installed on top of a drone, conceived for the analysis of Wi-Fi beacons or probe requests in areas without network infrastructure. It relies on LoRa communications and uses a Complex Event Processor for the enhancing and enriching data analysis and for providing first-aid information.

See at: github.com Restricted | CNR IRIS Restricted


2022 Software Metadata Only Access
Concern - COmplex eveNt proCEssing monitoR iNfrastructure
Calabrò A.
Concern is a predictive simulation monitoring infrastructure that aims to cooperate within Digital Twin in execution on a simulated environment to avoid possible accidents or failures happen in real systems using forecasting and self-generation rules techniques.Project(s): BIECO via OpenAIRE

See at: github.com Restricted | CNR IRIS Restricted


2021 Conference article Open Access OPEN
Integrated Wi-Fi and LoRa network on UAVs for localizing people during SAR operations
Calabrò A., Giuliano R.
In distress and crisis situations, the way how the rescuers answer is extremely important and critical. Rapidity on which Search and Rescue (SAR) operations are deployed and executed may have a high impact on the physical and psychological health of the user in distress. The proposed tool aim in localizing users in areas where any wired or wireless access communication has been interrupted or not working properly like earthquakes areas or mountains where no cellular signal are available. The proposed system is deployed on top of a drone capable to detect Wi-Fi beacons generated by distressed user's device Wi-Fi interface. Beacons acquired are analyzed through the Complex Event Processor and after being aggregated with the acquired GPS position sent to the ground station using LoRa radio transmission protocol. The system has been tested in a woods scenario for simulating the absence of the mobile cellular signal and validating the proposed tracking approach.

See at: CNR IRIS Open Access | ieeexplore.ieee.org Open Access | ISTI Repository Open Access | CNR IRIS Restricted | CNR IRIS Restricted


2009 Conference article Metadata Only Access
Book4All: a tool to make an e-book more accessible to students with vision/visual-impairments
Calabrò A., Contini E., Leporini B.
Empowering people who are blind or otherwise visually impaired includes ensuring that products and electronic materials incorporate a broad range of accessibility features and work well with screen readers and other assistive technology devices. This is particularly important for students with vision impairments. Unfortunately, authors and publishers often do not include specific criteria when preparing the contents. Consequently, e-books can be inadequate for blind and low vision users, especially for students. In this paper we describe a semi-automatic tool developed to support operators who adapt e-documents for visually impaired students. The proposed tool can be used to convert a PDF e-book into a more suitable accessible and usable format readable on desktop computer or on mobile devices.

See at: CNR IRIS Restricted | link.springer.com Restricted


2012 Journal article Open Access OPEN
Never-stop Learning: continuous validation of learned models for evolving systems through monitoring
Bertolino A., Calabrò A., Merten M., Steffen B.
Interoperability among the multitude of heterogeneous and evolving networked systems made available as black boxes remains a tough challenge. Learning technology is increasingly employed to extract behavioural models that form the basis for systems of systems integration. However, as networked systems evolve, their learned models need to evolve as well. This can be achieved by collecting actual interactions via monitoring and using these observations to continuously refine the learned behavioural models and, in turn, the overall system. This approach is part of the overall CONNECT approach.Source: ERCIM NEWS, vol. 88, pp. 28-29
Project(s): CONNECT via OpenAIRE

See at: CNR IRIS Open Access | CNR IRIS Restricted


2013 Software Metadata Only Access
Choreos MultiSource Monitoring Framework
Calabrò A., De Angelis G.
The deployment and the execution of applications on dynamic Cloud infrastructures introduces new requirements of adaptability with respect to monitoring. Specifically, the governance of service choreographies enacted over Cloud-based solutions relies on the observation and analysis of events happening at different abstraction layers. Adaptability requirements are even more evident when monitoring deals with Service Level Agreements (SLA) established among the choreography participants. In fact, as the Cloud paradigm offers on-demand solutions as a service, often monitoring rules cannot be completely defined off-line. Thus also the monitoring infrastructure must keep track of the continuous evolution of the underlying environment, and adapt itself accordingly. The software realize an architecture that can synthesize on-the-fly SLA monitoring rules following the evolution of the Cloud infrastructure.Project(s): CHOREOS via OpenAIRE

See at: github.com Restricted | CNR IRIS Restricted


2019 Conference article Restricted
GDPR and business processes: an effective solution
Bartolini C., Calabrò A., Marchetti E.
In the European Union, the recent update to data protection laws by virtue of the General Data Protection Regulation (GDPR) significantly changed the landscape of the processing of personal data. Consequently, adequate solutions to ensure that the controller and processor properly understand and meet the data protection requirements are needed. In enterprise reality it is quite common to use Business Process (BP) models to manage the different business activities. Hence the idea of integrating privacy concepts into BP models so as to leverage them to the role of GDPR recommenders. To this end, suggestions and recommendations about data management pursuant to GDPR provisions have been added to specific tasks of the BP, to improve both the process management and personnel learning and training. Feasibility of the proposed idea, implemented into an Eclipse plugin, has been provided through a realistic example.

See at: dl.acm.org Restricted | CNR IRIS Restricted | CNR IRIS Restricted


2019 Conference article Open Access OPEN
Enhancing business process modelling with data protection compliance: an ontology-based proposal
Bartolini C., Calabrò A., Marchetti E.
The research and industrial environments are struggling to identify practical approaches to highlight the (new) duties of controllers of personal data and foster the transition of IT-based systems, services, and tools to comply with the GDPR. In this paper, we present a solution for enhancing the modelling of business processes with facilities to help evaluate the compliance with the GDPR. The proposal is based on a model describing the constituents of the data protection domain: A structured form of the legal text, an ontology of data protection concepts, and a machine-readable translation of the GDPR provisions. An example of application is also provided.

See at: CNR IRIS Open Access | ISTI Repository Open Access | www.scitepress.org Open Access | CNR IRIS Restricted


2010 Software Metadata Only Access
Book4All
Leporini B., Contini E., Calabrò A.
Book4All fornisce un supporto semi-automatico agli operatori per adattare documenti elettronici per studenti ipovedenti. Lo strumento può essere utilizzato per convertire un e-book PDF in un formato accessibile e utilizzabile, leggibile su computer desktop o su dispositivi mobili come XHTML e DAISY.

See at: hci.isti.cnr.it Restricted | CNR IRIS Restricted


2022 Conference article Open Access OPEN
Improving SAR ops using Wi-Fi and LoRa on UAV
Calabrò A., Marchetti E.
Solutions for improving Search and Rescue operations (SAR) operations are receiving increasing attention. Transponder is one of the an open-source, lightweight and low-cost solution. It installed on top of a drone, conceived for the analysis of Wi-Fi beacons or probe requests in areas without network infrastructure. It relies on LoRa communications and uses a Complex Event Processor for the enhancing and enriching data analysis and for providing first-aid information. The use of Transponder in a realistic scenario is also presented.

See at: CNR IRIS Open Access | ieeexplore.ieee.org Open Access | ISTI Repository Open Access | CNR IRIS Restricted | CNR IRIS Restricted


2023 Journal article Open Access OPEN
Cobot protocol customisation manager - PLuME
Calabrò A., Marchetti E.
Making cobot safety protocols closer to a cookbook than to methodologies: Let users implement protocols without overhead in knowledge and understanding of the procedures.Source: ERCIM NEWS, vol. 132, pp. 14-15

See at: ercim-news.ercim.eu Open Access | CNR IRIS Open Access | ISTI Repository Open Access | CNR IRIS Restricted


2024 Journal article Open Access OPEN
Transponder: support for localizing distressed people through a flying drone network
Calabrò A., Marchetti E.
In Search and Rescue (SAR) operations, the speed and techniques used by rescuers and effective communication with the person in need of rescue are vital for successful operations. Recently, drones have become an essential tool in SAR, used by both military and civilian organizations to locate and aid missing persons. Objective: The paper introduces Transponder, a Wi-Fi-based solution designed to enhance SAR efforts by tracking, localizing, and providing first aid information to distressed individuals, even in challenging environments such as forests, mountains, and urban areas lacking GSM/UMTS coverage or that are difficult to reach with terrestrial rescue. Methods: Provide an innovative mechanism based on Wi-Fi beacon detection, LoRa communication, and the possible mobile application to leverage the SAR operation. Provide the preliminary implementation of the Transponder and perform its assessment in scenarios with dense vegetation. Results: The Transponder functionalities have been proven to enhance and expedite the detection of missing persons. Additionally, responses to several research questions regarding its performance and effectiveness are provided. Conclusions: Transponder is an innovative detection mechanism that combines ground-based analysis with on-board analysis, optimizing energy consumption and realizing an efficient solution for real-world scenarios.Source: DRONES, vol. 8 (issue 9)
Project(s): RESearch and innovation on future Telecommunications systems and networks, to make Italy more smart”, SEcurity and RIghts In the CyberSpace

See at: CNR IRIS Open Access | www.mdpi.com Open Access | CNR IRIS Restricted


2024 Journal article Open Access OPEN
A methodological approach to securing cyber-physical systems for critical infrastructures
Calabrò A., Cambiaso E., Cheminod M., Cibrario Bertolotti I., Durante L., Forestiero A., Lombardi F., Manco G., Marchetti E., Orlando A., Papuzzo G.
Modern ICT infrastructures, i.e., cyber-physical systems and critical infrastructures relying on interconnected IT (Information Technology)- and OT (Operational Technology)-based components and (sub-)systems, raise complex challenges in tackling security and safety issues. Nowadays, many security controls and mechanisms have been made available and exploitable to solve specific security needs, but, when dealing with very complex and multifaceted heterogeneous systems, a methodology is needed on top of the selection of each security control that will allow the designer/maintainer to drive her/his choices to build and keep the system secure as a whole, leaving the choice of the security controls to the last step of the system design/development. This paper aims at providing a comprehensive methodological approach to design and preliminarily implement an Open Platform Architecture (OPA) to secure the cyber-physical systems of critical infrastructures. Here, the Open Platform Architecture (OPA) depicts how an already existing or under-design target system (TS) can be equipped with technologies that are modern or currently under development, to monitor and timely detect possibly dangerous situations and to react in an automatic way by putting in place suitable countermeasures. A multifaceted use case (UC) that is able to show the OPA, starting from the security and safety requirements to the fully designed system, will be developed step by step to show the feasibility and the effectiveness of the proposed methodology.Source: FUTURE INTERNET, vol. 16 (issue 11)
Project(s): SEcurity and RIghts in the CyberSpace

See at: CNR IRIS Open Access | www.mdpi.com Open Access | CNR IRIS Restricted