Abstract In network communication systems, frequently messages are routed along a minimum diamete... more Abstract In network communication systems, frequently messages are routed along a minimum diameter spanning tree (MDST) of the network, to minimize the maximum delay in delivering a message. When a transient edge failure occurs, it is important to choose a temporary replacement edge which minimizes the diameter of the new spanning tree. Such an optimal replacement is called the best swap. As a natural extension, the all-best-swaps (ABS) problem is the problem of finding the best swap for every edge of the MDST.
Abstract In this paper we analyze the amortized cost of inserts and exact searches in a DRT*, an ... more Abstract In this paper we analyze the amortized cost of inserts and exact searches in a DRT*, an order preserving scalable distributed data structure able to manage both mono-dimensional and multi-dimensional data.
ABSTRACT The paper describes the certification mark promoted by the Italian Association of Comput... more ABSTRACT The paper describes the certification mark promoted by the Italian Association of Computer Science University Professors (GRIN) for undergraduate and graduate degree programs in Computer Science. The certification process yields a system of comparable and transparent curricula that facilitates student mobility across different Universities.
Abstract We present and discuss a novel architectural approach supporting the integration among l... more Abstract We present and discuss a novel architectural approach supporting the integration among legacy information systems of autonomous organizations. It is based on the use of a data warehouse in a new conceptual role. Namely, we propose to use it during design and implementation of a cooperative information system as a tool supporting the coherence maintenance of the underlying databases and the efficient management of accesses to them.
Abstract Whereas earlier work on spatiotemporal databases generally focused on geometries changin... more Abstract Whereas earlier work on spatiotemporal databases generally focused on geometries changing in discrete steps, the emerging area of moving objects databases supports geometries changing continuously. Two important abstractions are moving point and moving region, modelling objects for which only the time-dependent position, or also the shape and extent are relevant, respectively.
In an undirected, 2-node connected graph G=(V, E) with positive real edge lengths, the distance b... more In an undirected, 2-node connected graph G=(V, E) with positive real edge lengths, the distance between any two nodes r and s is the length of a shortest path between r and s in G. The removal of a node and its incident edges from G may increase the distance from r to s. A most vital node of a given shortest path from r to s is a node (other than r and s) whose removal from G results in the largest increase of the distance from r to s.
In this paper we consider two new cost measures related to the communication overhead and the spa... more In this paper we consider two new cost measures related to the communication overhead and the space requirements associated to virtual path layouts in ATM networks, that is the edge congestion and the node congestion. Informally, the edge congestion of a given edge e at an incident node u is defined as the number of VPs terminating or starting from e at u, while the node congestion of a node v is defined as the number of VPs having v as an endpoint.
In this paper we describe the overall process of deployment of the Italian Electronic Identity Ca... more In this paper we describe the overall process of deployment of the Italian Electronic Identity Card: the way it is issued, services it is used for, organizations involved in the process, and the Information Technology (IT) infrastructure enabling the effective management of the whole process while ensuring the mandatory security functions.
Methods We present a method for translating a gene network motif to a SC and we show how it overc... more Methods We present a method for translating a gene network motif to a SC and we show how it overcomes the limitations of the method proposed by Shin et Al., by applying it to a number of network motifs. Our method can be used for modeling GRN in an easy and intuitive way by taking advantage of the visual features of SC, and for interactively simulating the execution of the model even in the presence of perturbation by external events.
Identity management systems play a critical role in the field of e-Government and e-Business, as ... more Identity management systems play a critical role in the field of e-Government and e-Business, as they constitute the basic building blocks enabling secure and reliable access to online services. In this chapter, we highlight the main technical and organizational pitfalls of current approaches to identity management which are either based on a centralized architecture or require adoption of common (technological and organizational) standards.
In the delivery of e-government services to citizens it should be clear that the viewpoint cannot... more In the delivery of e-government services to citizens it should be clear that the viewpoint cannot simply be the standard one of client-supplier commonly used to provide services on the Internet. In a modern society it has rather to be the peer-to-peer approach which is typical of democracies, where institutions are equal to citizens in front of the law. But this is not yet a widely accepted standpoint in digital government efforts going on in many advanced countries in the world.
Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è s... more Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è stata data ai singoli Atenei nella specifica dei percorsi di studio espone alla responsabilità di proporre e gestire itinerari formativi di qualità, che sappiano confrontarsi sia con le attese culturali degli studenti, che con le esigenze di un mercato del lavoro sempre più attento ai contenuti e alla solidità delle competenze acquisite dai laureati.
ABSTRACT In this paper we propose and analyze a new meaningful branching sequence to generate ran... more ABSTRACT In this paper we propose and analyze a new meaningful branching sequence to generate random quadtrees representing binary images. In particular, we show that this sequence produces expected distributions of external and intemal nodes much closer to real data than all previous proposed approaches in the literature to model both random binary images and quadtrees. This new model provides a good compromise in representing images belonging to various classes, more or less structured.
Abstract In this paper we describe the architectural solution defined and implemented to ensure s... more Abstract In this paper we describe the architectural solution defined and implemented to ensure secure interoperability among information technology (IT) systems managing personal data registries in Italian municipalities and Ministry of Interior. The architecture features a clear separation between security services, provided at an infrastructure level, and application services, exposed on the Internet as Web services.
Abstract In network communication systems, frequently messages are routed along a minimum diamete... more Abstract In network communication systems, frequently messages are routed along a minimum diameter spanning tree (MDST) of the network, to minimize the maximum delay in delivering a message. When a transient edge failure occurs, it is important to choose a temporary replacement edge which minimizes the diameter of the new spanning tree. Such an optimal replacement is called the best swap. As a natural extension, the all-best-swaps (ABS) problem is the problem of finding the best swap for every edge of the MDST.
Abstract In this paper we analyze the amortized cost of inserts and exact searches in a DRT*, an ... more Abstract In this paper we analyze the amortized cost of inserts and exact searches in a DRT*, an order preserving scalable distributed data structure able to manage both mono-dimensional and multi-dimensional data.
ABSTRACT The paper describes the certification mark promoted by the Italian Association of Comput... more ABSTRACT The paper describes the certification mark promoted by the Italian Association of Computer Science University Professors (GRIN) for undergraduate and graduate degree programs in Computer Science. The certification process yields a system of comparable and transparent curricula that facilitates student mobility across different Universities.
Abstract We present and discuss a novel architectural approach supporting the integration among l... more Abstract We present and discuss a novel architectural approach supporting the integration among legacy information systems of autonomous organizations. It is based on the use of a data warehouse in a new conceptual role. Namely, we propose to use it during design and implementation of a cooperative information system as a tool supporting the coherence maintenance of the underlying databases and the efficient management of accesses to them.
Abstract Whereas earlier work on spatiotemporal databases generally focused on geometries changin... more Abstract Whereas earlier work on spatiotemporal databases generally focused on geometries changing in discrete steps, the emerging area of moving objects databases supports geometries changing continuously. Two important abstractions are moving point and moving region, modelling objects for which only the time-dependent position, or also the shape and extent are relevant, respectively.
In an undirected, 2-node connected graph G=(V, E) with positive real edge lengths, the distance b... more In an undirected, 2-node connected graph G=(V, E) with positive real edge lengths, the distance between any two nodes r and s is the length of a shortest path between r and s in G. The removal of a node and its incident edges from G may increase the distance from r to s. A most vital node of a given shortest path from r to s is a node (other than r and s) whose removal from G results in the largest increase of the distance from r to s.
In this paper we consider two new cost measures related to the communication overhead and the spa... more In this paper we consider two new cost measures related to the communication overhead and the space requirements associated to virtual path layouts in ATM networks, that is the edge congestion and the node congestion. Informally, the edge congestion of a given edge e at an incident node u is defined as the number of VPs terminating or starting from e at u, while the node congestion of a node v is defined as the number of VPs having v as an endpoint.
In this paper we describe the overall process of deployment of the Italian Electronic Identity Ca... more In this paper we describe the overall process of deployment of the Italian Electronic Identity Card: the way it is issued, services it is used for, organizations involved in the process, and the Information Technology (IT) infrastructure enabling the effective management of the whole process while ensuring the mandatory security functions.
Methods We present a method for translating a gene network motif to a SC and we show how it overc... more Methods We present a method for translating a gene network motif to a SC and we show how it overcomes the limitations of the method proposed by Shin et Al., by applying it to a number of network motifs. Our method can be used for modeling GRN in an easy and intuitive way by taking advantage of the visual features of SC, and for interactively simulating the execution of the model even in the presence of perturbation by external events.
Identity management systems play a critical role in the field of e-Government and e-Business, as ... more Identity management systems play a critical role in the field of e-Government and e-Business, as they constitute the basic building blocks enabling secure and reliable access to online services. In this chapter, we highlight the main technical and organizational pitfalls of current approaches to identity management which are either based on a centralized architecture or require adoption of common (technological and organizational) standards.
In the delivery of e-government services to citizens it should be clear that the viewpoint cannot... more In the delivery of e-government services to citizens it should be clear that the viewpoint cannot simply be the standard one of client-supplier commonly used to provide services on the Internet. In a modern society it has rather to be the peer-to-peer approach which is typical of democracies, where institutions are equal to citizens in front of the law. But this is not yet a widely accepted standpoint in digital government efforts going on in many advanced countries in the world.
Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è s... more Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è stata data ai singoli Atenei nella specifica dei percorsi di studio espone alla responsabilità di proporre e gestire itinerari formativi di qualità, che sappiano confrontarsi sia con le attese culturali degli studenti, che con le esigenze di un mercato del lavoro sempre più attento ai contenuti e alla solidità delle competenze acquisite dai laureati.
ABSTRACT In this paper we propose and analyze a new meaningful branching sequence to generate ran... more ABSTRACT In this paper we propose and analyze a new meaningful branching sequence to generate random quadtrees representing binary images. In particular, we show that this sequence produces expected distributions of external and intemal nodes much closer to real data than all previous proposed approaches in the literature to model both random binary images and quadtrees. This new model provides a good compromise in representing images belonging to various classes, more or less structured.
Abstract In this paper we describe the architectural solution defined and implemented to ensure s... more Abstract In this paper we describe the architectural solution defined and implemented to ensure secure interoperability among information technology (IT) systems managing personal data registries in Italian municipalities and Ministry of Interior. The architecture features a clear separation between security services, provided at an infrastructure level, and application services, exposed on the Internet as Web services.
Uploads
Papers by Enrico Nardelli