101 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
Language operator: and / or
Date operator: and / or
more
Rights operator: and / or
2006 Conference article Unknown
A new motion activity measure in temporal video transcoding
Lonetti F., Martelli F.
Transcoding is an important technique for adapting the bit rate of previously compressed video sequences to different network bandwidths. Frame skipping is the type of transcoding often used to reduce the frame rate and to allocate more bits to more representative frames in order to guarantee an acceptable quality of the whole video sequence. The motion activity is the most important factor in the choice of frames to be skipped. Traditionally, usual schemes consider the sum of motion vectors of the current frame as measure of motion activity. Frames with a large motion activity are transcoded to preserve a smooth motion. In this paper, we propose a new way to compute the motion activity measure able to consider different kinds of motion in each frame. Simulation results show that this new measure achieves a better performance than the standard one.Source: 13th International Conference on Systems, Signals and Image Processings and Semantic Multimodal Analysis of Digital Media. IWSSIP 2006 and COST 292, pp. 451–455, Budapest, Hungary, 21-23/09/2006

See at: CNR ExploRA


2007 Conference article Restricted
Motion vector composition algorithm in H.264 transcoding
Lonetti F., Martelli F.
In temporal transcoding, motion vector composition algorithms are used to reduce the computation time of the transcoding process. In this paper, we propose a multi-level motion vector composition scheme for H.264 transcoding, with the Bilinear Interpolation (BI) function. Simulation results show that the proposed algorithm achieves a video quality comparable with that of the motion estimation process with the advantage of greatly reducing the computation time of transcoding.Source: 14th International Conference on Systems, Signals and Image Processing (IWSSIP07) and 6th EURASIP Conference Focused on Speech and Image Processing, Multimedia Communications and Services. EC-SIPMCS 2007, Maribor, Slovenia, 27-30 giugno 2007
DOI: 10.1109/iwssip.2007.4381126
Metrics:


See at: doi.org Restricted | CNR ExploRA


2007 Conference article Unknown
Exploiting ID Knowledge for Tag Identification in RFID Networks
Bonuccelli A. M., Lonetti F., Martelli F.
In this paper, we consider the problem of identifying a set of objects in an RFID network. We propose a query tree based protocol to reduce the number of transmission collisions. The key idea of our protocol is to take advantage of the (partial) knowledge about the set of tags to be identified: in particular, their approximated number, and above all their distribution. More specifically, we show how much gain in performance can be achieved by having information about the set of IDs to be identified. Such information can be obtained from statistical data, or from other features, depending on the application. Of course, a perfect knowledge makes useless the identification process: the aim of this work is to show how query tree protocols improve, by taking into account of the information about the tags. Simulation results show that our approach performs better than classical query tree protocols, in terms of number of queries needed to identify all tags, which is a commonly used metric, strictly related to delay. Moreover, our approach outperforms also Aloha-based protocols that for their randomized nature, are independent from the IDs distributions: in such protocols, tags randomly choose a slot in which transmit, that is equivalent to "re-naming" the IDs, so they do not take any advantage from the knowledge of the original ID distribution.Source: 4th ACM workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PE-WASUN), pp. 70–77, Chania, Crete Island, Greece, 22-26 October 2007

See at: CNR ExploRA


2009 Conference article Restricted
Exploiting signal strength detection and collision cancellation for tag identification in RFID systems
Bonuccelli M., Lonetti F., Martelli F.
Radio Frequency IDentification (RFID) systems are becoming more and more popular in the field of ubiquitous computing, in particular for objects identification. An RFID system is composed by one or more readers and a number of tags. One of the main issues in an RFID network is the fast and reliable identification of all tags in the reader range. The reader issues some queries, and tags properly answer. Then, the reader must identify the tags from such answers. This is crucial for most applications. Since the transmission medium is shared, the typical problem to be faced is a MAC-like one, i.e, to avoid or limit the number of tags transmission collisions. We propose a protocol which, under some assumptions about transmission techniques, achieves a 60% perfomance on the average (in terms of transmitted bits). It is based on a proper recursive splitting of the concurrent tags sets and on signal storing and later cancellation, until all tags have been identified.Source: IEEE Symposium on Computers and Communications, pp. 499–505, Sousse, Tunisia, 5-8 July 2009
DOI: 10.1109/iscc.2009.5202281
Metrics:


See at: doi.org Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA


2007 Contribution to book Unknown
Temporal video transcoding for multimedia services
Lonetti F., Martelli F.
Advanced types of interactive and multimedia services are used in everyday life, for working or practical purposes. The great development of these services in the last years is due to the following two important factors: improved digital video technologies in compression (encoding) and decompression (decoding), and advances in network topology deployment. Large diffusion of infrastructured (cellular networks, UMTS) and ad hoc networks (Wi-Fi, vehicular networks) allows a rapid and easy access to media content and offers to users mobile access to internet. In heterogeneous network setting, adapting the media content to different device and network characteristics is required to guarantee the quality of multimedia services. Transcoding is a typical strategy to approach this problem. Video transcoding is used to perform conversion of a compressed video stream to another one with different features, without performing the total decoding and re-encoding process. To enable interoperability among devices with different bandwith constraints and computational capacities, different kinds of transcoding are dinamically required, depending on network resources and device features. Among them, temporal transcoding, is a process that skips some frames in order to change the frame rate of the video sequence, without decreasing the video quality of not-skipped frames. In this chapter we investigate the main issues of temporal transcoding. After describing the features of existing temporal transcoding architectures, we address the main problem of motion vector computation when a frame is skipped. Motion Vector Composition (MVC) is a well know technique adopted to greatly reduce computation time of heavy Motion Estimation processes. We present the most popular motion vectors composition algorithms. Then, we investigate several strategies for choosing frames to be skipped (called frame skipping policies) in order to minimize the jerky effect in the transcoded video sequence.Source: Multimedia Services in Intelligent Environments, edited by G. A. Tsihrintzis and L. Jain Eds. Berlin: Springer-Verlag, 2007

See at: CNR ExploRA


2007 Doctoral thesis Unknown
Temporal Video Transcoding in Mobile Systems
Lonetti F.
This thesis approaches the problem of temporal video transcoding in wireless networks. The general aim is to investigate temporal transcoding for improving real-time video communication of multimedia services, by considering peculiar features of infrastructured and ad hoc wireless networks. We address the main issues of temporal transcoding, pointing out their characteristic problems and presenting our original proposals (motion vector composition algorithm and frame skipping policies). We focus on IEEE 802.11 vehicular networks, for presenting a temporal transcoding system able to improve real-time video communication, overcoming the typical network congestion and reducing late frames.

See at: CNR ExploRA


2018 Contribution to journal Open Access OPEN
Special issue on automation of software testing: improving practical applicability
Budnik C., Fraser G., Lonetti F., Zhu H.
Source: Software quality journal 26 (2018): 1415–1419. doi:10.1007/s11219-018-9410-1
DOI: 10.1007/s11219-018-9410-1
Metrics:


See at: ISTI Repository Open Access | Software Quality Journal Restricted | link.springer.com Restricted | CNR ExploRA


2023 Conference article Open Access OPEN
Automated derivation of test requirements for systems of systems
Azevedo Gonçalves J., Lonetti F., De Oliveira Neves V.
Testing of Systems of Systems (SoS) is challenging and improving its cost-effectiveness is a relevant research topic. In this paper, we propose TESoS (Test Engine for Systems of Systems), a systematic approach that selects from SoS models, defined in mKAOS language, the functionalities to be tested and then automatically derives a set of test requirements. TESoS allows to classify test requirements according to unit, integration, and system testing levels. Moreover, it helps test planning by providing the tester with automated facilities for supporting the unit testing of constituent systems and computing the percentage of test requirements that are satisfied with a given test suite. We illustrate the TESoS application on an SoS case study in the educational domainSource: SoSe 2023 - 18th Annual System of Systems Engineering Conference, Lille, France, 14-16/06/2023
DOI: 10.1109/sose59841.2023.10178516
Metrics:


See at: ISTI Repository Open Access | ieeexplore.ieee.org Restricted | CNR ExploRA


2003 Journal article Open Access OPEN
Integrating GSM Networks and Internet: New Unstructured Services
Arrighi R., Bonuccelli M. A., Lonetti F., Martelli F.
Three communication networks, namely the emerging 'mobile' wireless, the classical 'fixed' wireline, and the alternative 'computer-centric' internet, are evolving in a relatively independent way. However, their interactions increase day by day. It is of paramount importance to investigate how these three systems could be integrated in order to form a common communication space, in which the users of any one of the networks can easily and 'transparently' access the other two. The main purpose of a project currently under way at PisaTel is to investigate the feasibility of such an integration. The work is being carried out within the java JAIN MAP API international project.Source: ERCIM news 54 (2003): 27–28.

See at: www.ercim.org Open Access | CNR ExploRA


2007 Conference article Restricted
Real-time video transmission in vehicular networks
Bonuccelli M., Giunta G., Lonetti F., Martelli F.
This paper addresses the problem of real-time video transmission in vehicular networks. We show that the video quality of real-time services is greatly decreased when there is network congestion in different traffic situations. We propose a solution that applies frame skipping and transcoding together with frame rate reduction techniques over IEEE 802.11 based vehicular networks. Our approach improves the quality of video transmission while reducing the bandwidth consumption.Source: MObile Networking for Vehicular Environments (Move 2007), pp. 115–120, Anchorage, Alaska, USA, 11 May 2007
DOI: 10.1109/move.2007.4300815
Metrics:


See at: doi.org Restricted | CNR ExploRA


2009 Conference article Unknown
Dynamic frame rate adjustment for real-time video in vehicular networks
Bonuccelli M. A., Giunta G., Lonetti F., Martelli F.
In ad-hoc networks, the video quality of real-time services is greatly decreased when bandwidth reduction and channel access delay occur. In this paper, a dynamic frame rate adjustment of video transmissions is proposed in case of network congestion. Simulation results show that our approach improves the quality of real-time video over IEEE 802.11 based vehicular networks by guaranteeing a better bandwidth usage.Source: 16th International Conference on Systems, Signals and Image Processing, Chalkida, Greece, 18-20 June 2009

See at: CNR ExploRA


2010 Conference article Restricted
X-MuT: a tool for the generation of XSLT mutants
Lonetti F., Marchetti E.
Mutation testing has been historically applied to many programming languages as a white box testing technique. In this paper, we propose a set of mutation operator classes for XSLT language, and we implement them into a tool called X-MuT. The tool automatically generates the set of mutants and provides facilities to run a given test suite on the mutants and to compute the test suite effectiveness in terms of mutation score. We provide an example of X-MuT application to evaluate the effectiveness of an existing test suite for a XSLT stylesheet transforming the standard MARCXML to the Dublin Core format.Source: Seventh International Conference on the Quality of Information and Communications Technology, pp. 280–285, Porto, Portugal, 29 September-2 October 2010
DOI: 10.1109/quatic.2010.52
Project(s): TAS3 via OpenAIRE, TAS3 via OpenAIRE
Metrics:


See at: doi.org Restricted | CNR ExploRA


2003 Report Unknown
Integrating GSM networks and internet: new unstructured services
Arrighi R., Bonuccelli S., Lonetti F., Martelli F.
Three communication networks, namely the emerging 'mobile' wireless, the classical 'fixed' wireline, and the alternative 'computer-centric' internet, are evolving in a relatively independent way. However, their interactions increase day by day. It is of paramount importance to investigate how these three systems could be integrated in order to form a common communication space, in which the users of any one of the networks can easily and 'transparently' access the other two. The main purpose of a project currently under way at PisaTel is to investigate the feasibility of such an integration. The work is being carried out within the java JAIN MAP API international project.Source: ISTI Technical reports, 2003

See at: CNR ExploRA


2012 Software Unknown
Property meta model.
Bertolino A., Di Marco A., Lonetti F.
PMM is a generic and comprehensive Property Meta- Model. It implements a model-driven approach for defining non-functional properties and metrics.Project(s): CONNECT via OpenAIRE

See at: labsedc.isti.cnr.it | CNR ExploRA


2012 Contribution to conference Restricted
Property-driven software engineering approach.
Di Marco A., Lonetti F., De Angelis G.
We present a research roadmap that defines an enhanced model-driven software engineering approach focused on non-functional properties models. Currently, we have implemented two sub-processes of this roadmap: Property Modeling and Monitoring. We provide a property-driven approach to runtime monitoring based on a comprehensive Property Meta-Model (PMM) and on a generic configurable event-based monitoring infrastructure.Source: Fifth International Conference on Software Testing, Verification and Validation, pp. 966–967, Montreal, Canada, 17-21 April 2012
DOI: 10.1109/icst.2012.207
Project(s): CONNECT via OpenAIRE
Metrics:


See at: doi.org Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA


2012 Conference article Restricted
Complex events specification for properties validation
Bertolino A., Di Marco A., Lonetti F.
Run-time validation of non-functional properties becomes very important to evaluate and keep under control dynamic and evolving systems. Event-driven monitoring is a commonly adopted approach for observing and analyzing that these properties are satisfied. As the events to be observed become more and more complex, a powerful events specification language is needed. In this paper we present a complex events specification language that is included into the Property Meta-Model (PMM). It is intuitive and easy to use and at the same time machine processable, thus allowing for the automated run-time configuration of a model-driven event-based monitoring system. The PMM complex events specification language combines features of two existing and well-known event specification languages that are GEM and Drools Fusion, and in addition presents new features not included in the considered languages. As a proof of concept we present how the PMM complex events specification language can be used for modeling complex events excerpted from the scenarios of the CONNECT European Project.Source: 8th International Conference on the Quality of Information and Communications Technology, pp. 85–94, Lisbon, Portugal, 3 - 6 September 2012
Project(s): CONNECT via OpenAIRE

See at: hal.archives-ouvertes.fr Restricted | CNR ExploRA


2013 Report Unknown
Meta-modeling of non-functional properties
Lonetti F., Bertolino A., Di Marco A., Sabetta A.
Modern software systems demand to automatically take care of non-functional properties in all software life-cycle. To respond to this demand, Model Driven Engineering (MDE) contributes to ensure non-functional properties with reduced effort. In this paper, we present a generic, comprehensive and flexible Property Meta-Model (PMM) for defining non-functional properties spanning over dependability, performance and security. PMM also allows for specifying metrics and provides a complex events specification language that takes into account and enhances the composition operators of existing events specification languages. We give examples of using PMM for modeling different properties and in different phases of a MDE process. Furthermore, to evaluate the comprehensiveness and flexibility of PMM with respect to similar approaches, we include results from a systematic survey on MDE approaches dealing with non-functional properties, metrics and complex events.Source: ISTI Technical reports, 2013
Project(s): CONNECT via OpenAIRE

See at: CNR ExploRA


2013 Report Unknown
Extending the non-functional modeling of UML-TP
Rodríguez F. T., Lonetti F., Bertolino A., Usaola M. P., Lamancha B. P.
The importance of the validation of non-functional properties such as performance and dependability has been broadly recognized by the research community. However, the results of a systematic survey we carried out evidenced the lack of a standard notation for designing non-functional test cases. Model-based testing (MBT) is an emerging testing paradigm for the automatic derivation of concrete test cases starting from the abstract models of a system under test and/or its environment. For some time, the greatest attention of MBT research has focused on functional aspects. The only exception is represented by the UML Testing Profile (UML-TP) that is a lightweight extension of UML to support the design of testing artifacts, but it only provides limited support for non-functional testing. In this paper we propose an extended version of UML-TP aimed at improving the design of non-functional tests. The proposed extension deals with some important concepts of non-functional testing such as the workload and the global verdicts. As a proof of concept we show how the extended UML-TP can be used for modeling non-functional test cases of an application example. Also, the planning and results of the survey are presented.Source: ISTI Technical reports, 2013

See at: CNR ExploRA


2013 Contribution to book Restricted
Tag Identification Protocols in RFID Systems
Lonetti F., Martelli F.
Fast and reliable identification of multiple objects that are present at the same time is very important in many applications. A very promising technology for this purpose is Radio Frequency Identification (RFID), which is fast pervading many application fields, like public transportation and ticketing, access control, production control, animal identification, and localization of objects and people. The problem approached in this chapter is the tag identification in RFID systems. This problem occurs when several tags try to answer at the same time to a reader query. If more than one tag answers, their messages will collide on the RF communication channel, and the reader cannot identify these tags. There are two families of protocols for approaching the tag collision problem: a family of probabilistic protocols, and a family of deterministic ones. In this chapter, the authors give an overview of the most important approaches and trends for tag identification in RFID systems and provide the results of a deep comparison of the presented tag identification protocols in terms of complexity and performance.Source: Security and Trends in Wireless Identification and Sensing Platform Tags: Advancements in RFID, edited by Pedro Peris Lopez, Julio C. Hernandez-Castro, Tieyan Li, pp. 1–33, 2013
DOI: 10.4018/978-1-4666-1990-6.ch001
Metrics:


See at: doi.org Restricted | www.igi-global.com Restricted | CNR ExploRA


2014 Conference article Unknown
Extending UML testing profile towards non-functional test modeling
Toledo Rodríguez F., Lonetti F., Bertolino A., Polo Usaola M., Pérez L. B.
The research community has broadly recognized the importance of the validation of non-functional properties including performance and dependability requirements. However, the results of a systematic survey we carried out evidenced the lack of a standard notation for designing non-functional test cases. For some time, the greatest attention of Model-Based Testing (MBT) research has focused on functional aspects. The only exception is represented by the UML Testing Profile (UML-TP) that is a lightweight extension of UML to support the design of testing artifacts, but it only provides limited support for non-functional testing. In this paper we provide a first attempt to extend UML-TP for improving the design of non-functional tests. The proposed extension deals with some important concepts of non-functional testing such as the workload and the global verdicts. As a proof of concept we show how the extended UML-TP can be used for modeling non-functional test cases of an application example.Source: Second International Conference on Model-Driven Engineering and Software Development, pp. 488–497, Lisbon, 7 - 9 January 2014

See at: CNR ExploRA