University Telematica Internazionale

Rome, Italy

University Telematica Internazionale

Rome, Italy
SEARCH FILTERS
Time filter
Source Type

D'Acquisto G.,Garante Per la Protezione dei Dati Personali | Flamini M.,University Telematica Internazionale | Naldi M.,University of Rome Tor Vergata
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

Data breaches, occurring either on the customer's PCs or on the service provider's equipment, expose customers to significant economic losses. An ex-ante regulation policy that apportions a fraction of the losses to the service provider (a damage-sharing policy) may reduce the burden for the customer and lead the service provider to invest more in security. We analyse this regulation policy through a game-theoretic approach, where the customer acts on the amount of personal information it reveals, and the service provider acts on the amount of security investments. We show that the game exhibits a single Nash equilibrium in a realistic scenario. In order to optimize the social welfare, the regulator has to choose the fraction of damage apportioned to the service provider. We show that the policy is relatively ineffective unless the fraction of damage charged to the service provider is quite large, beyond 60%. On the other hand, if the policy is applied with a large damage-sharing factor, the overall social welfare falls heavily. © 2012 Springer-Verlag.


Sgrigna V.,Third University of Rome | Conti L.,University Telematica Internazionale
International Journal of Geophysics | Year: 2012

The paper aims at giving suggestions for a deterministic approach to investigate possible earthquake prediction and warning. A fundamental contribution can come by observations and physical modeling of earthquake precursors aiming at seeing in perspective the phenomenon earthquake within the framework of a unified theory able to explain the causes of its genesis, and the dynamics, rheology, and microphysics of its preparation, occurrence, postseismic relaxation, and interseismic phases. Studies based on combined ground and space observations of earthquake precursors are essential to address the issue. Unfortunately, up to now, what is lacking is the demonstration of a causal relationship (with explained physical processes and looking for a correlation) between data gathered simultaneously and continuously by space observations and ground-based measurements. In doing this, modern and/or new methods and technologies have to be adopted to try to solve the problem. Coordinated space- and ground-based observations imply available test sites on the Earth surface to correlate ground data, collected by appropriate networks of instruments, with space ones detected on board of Low-Earth-Orbit (LEO) satellites. Moreover, a new strong theoretical scientific effort is necessary to try to understand the physics of the earthquake. © 2012 Vittorio Sgrigna and Livio Conti.


Adacher L.,Third University of Rome | Flamini M.,University Telematica Internazionale
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2011

In this paper we deal with the problem of scheduling aircrafts maneuvering on ground in the specific case study of Malpensa Airport. Given a fixed route and a landing/take off time instant for each landing/departing aircraft, we consider three objective functions in the following lexicographical order: (i) the minimization of the number of tardy aircrafts; (ii) the maximization of the safety; (iii) the minimization of pollution and noise. Problem constraints are related to the safety rules. We model the problem as a job-shop scheduling problem. We develop heuristic procedures based on an alternative graph formulation of the problem to construct and improve feasible solutions. Experimental results based on real data and analysis are reported. © 2011 Springer-Verlag.


Adacher L.,Third University of Rome | Flamini M.,University Telematica Internazionale
Proceedings - UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, UKSim 2014 | Year: 2014

In this paper we deal with the ground optimization problem, that is the problem of routing and scheduling airplanes surface maneuvering operations. We consider the specific case study of Malpensa Terminal Maneuvering Area (Italy). Our objective function is the minimization of total tardiness. At first a routing problem is solved to assign a path to each aircraft in the terminal, then the scheduling problem of minimizing the average tardiness is addressed. We model the scheduling problem as a job-shop scheduling problem. We develop heuristic procedures based on the alternative graph formulation of the problem to construct and improve feasible solutions. Experimental results based on real data and analysis are reported. © 2014 IEEE.


Assante D.,University Telematica Internazionale | Tronconi M.,University Telematica Internazionale
IEEE Global Engineering Education Conference, EDUCON | Year: 2015

With the involvement of graduating engineering students, a remotely accessible solar energy laboratory has been developed, in order to simulate a small photovoltaic system. The laboratory includes two photovoltaic cells, a charge controller, batteries and a dummy load. A Raspberry PI microcontroller enables to control the different inputs, measures the voltages and the currents in the circuit and provides a remote access through the web. The lab intends to be a prototype of remote lab for the University, in terms of realization costs, communication protocols and software interface. It will be used by graduate students in the Electrical Engineering courses, enabling them to perform some experiments at distance. © 2015 IEEE.


Assante D.,University Telematica Internazionale | Fornaro C.,University Telematica Internazionale
IEEE Global Engineering Education Conference, EDUCON | Year: 2015

Engineering students have a natural strong desire to see how their laboriously acquired knowledge has effective application in real life. A small group of students were involved to apply their knowledge of computer science, electronics, and electrical engineering to something unusual and with a social impact: driving a wheelchair by using brain-computer interfaces. Today's development of these interfaces are not yet so advanced to be effectively used in health devices and must be considered very carefully. This led to a pilot experiment that kept all the charm of the original goal, but would have no drawbacks if something should go wrong: moving a small cart, based on Arduino boards, interfaced with a normal laptop to a commercial and affordable brainwave sensing headset. Being the driver not onboard, a Bluetooth connection has been used to send commands to the cart. Results are twofold. The cart actually moved where requested, and this is even more noticeable after considering that the people involved had limited time training and had no reduced mobility, which means less psychological involvement, otherwise recognized as an important factor of success. The group manifested a strong interest in every part of the project, giving them awareness of their actual skills and their actual ability to autonomously acquire new skills as needed. This study is the outcome of the International Telematic University Uninettuno and Helwan University (Cairo, Egypt) in a four year long cooperation for a double degree (one recognized in Italy and all Europe and the other in Egypt). The students involved had completed all the exams and were going to graduate. This project was devised for one of their MS thesis. © 2015 IEEE.


Naldi M.,University of Rome Tor Vergata | Flamini M.,University Telematica Internazionale | D'Acquisto G.,University of Rome Tor Vergata
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013

Data breaches are a rising concern in personal data management. While the damages due to data breaches fall primarily on the end customer, the service provider should be held liable. A sanctioning approach is proposed to promote a greater responsibility by the service provider, where sanctions are proportional to the service providers revenues. The interactions between the customer and the service provider are modelled as a game, where the customer decides the amount of tolerable loss (a proxy for the amount of information released) and the service provider decides the amount of security investment. The solution of the game for a typical scenario shows that sanctions effectively spur the service provider to invest more in security and lead to a reduced data breach probability. © 2013 Springer-Verlag.


Naldi M.,University of Rome Tor Vergata | Flamini M.,University Telematica Internazionale
Proceedings - UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, UKSim 2014 | Year: 2014

An interval estimate is provided for the Herfindahl-Hirschman Index (HHI) when the knowledge about the market is incomplete, and we know just the largest market shares. Two rigorous bounds are provided for the HHI, without any further assumptions. Though the interval gets wider as the sum of the known market shares gets smaller, the estimate proves to be quite tight even when the fraction of the market that we do not know in detail is as high as 30%. This robustness is shown through three examples, considering respectively a set of real data and two sets of synthetic data, with the company sizes (a proxy for market shares) following respectively a Zipf law and a Pareto distribution. © 2014 IEEE.


Naldi M.,University of Rome Tor Vergata | Flamini M.,University Telematica Internazionale | D'Acquisto G.,University of Rome Tor Vergata
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013

The Learned Hand's rule, comparing security investments against the expected loss from data breaches, can be used as a simple tool to determine the negligence of the company holding the data. On the other hand, companies may determine their investments in security by maximizing their own net profit. We consider the well known Gordon-Loeb models as well as the more recent Huang-Behara models for the relationship between investments and the probability of money loss due to malicious attacks to determine the outcome of the application of three forms of Hand's rule: status quo (loss under no investments), ex-post (loss after investment), transitional (loss reduction due to investment). The company is always held negligent if it does not invest in both the status quo and the transitional form. In the ex-post form, it is instead held negligent just if the potential loss is below a threshold, for which we provide the exact expression. © 2013 Springer International Publishing.


Assante D.,University Telematica Internazionale | Tronconi M.,University Telematica Internazionale
International Journal of Online Engineering | Year: 2015

Remote laboratories are increasingly being used in academic courses, especially in science and engineering. New control systems allow the development of even complex experiments with a low cost. In this paper we present a remote laboratory that reproduces a small-scale photovoltaic system, including a solar panels and lights, a charge controller, a battery and a dummy load. A Raspberry PI microcontroller is used to send the different inputs to the laboratory, handling commands, measuring some electrical quantities and provide remote access via the web. The laboratory, developed with the involvement of graduating students, will be used in the Master courses of electrical engineering. Particular attention has been paid on the development of hardware and software, to use the developed laboratory as a model for the realization of other experiments.

Loading University Telematica Internazionale collaborators
Loading University Telematica Internazionale collaborators