SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Villari Massimo) "

Sökning: WFRF:(Villari Massimo)

  • Resultat 1-12 av 12
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Al-Dulaimy, Auday, et al. (författare)
  • TOLERANCER : A fault tolerance approach for cloud manufacturing environments
  • 2022
  • Ingår i: IEEE International Conference on Emerging Technologies and Factory Automation, ETFA. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665499965
  • Konferensbidrag (refereegranskat)abstract
    • The paper presents an approach to solve the software and hardware related failures in edge-cloud environments, more precisely, in cloud manufacturing environments. The proposed approach, called TOLERANCER, is composed of distributed components that continuously interact in a peer to peer fashion. Such interaction aims to detect stress situations or node failures, and accordingly, TOLERANCER makes decisions to avoid or solve any potential system failures. The efficacy of the proposed approach is validated through a set of experiments, and the performance evaluation shows that it responds effectively to different faults scenarios.
  •  
2.
  • Battistoni, Giuseppe, et al. (författare)
  • Applications of FLUKA Monte Carlo code for nuclear and accelerator physics
  • 2011
  • Ingår i: Nuclear Instruments and Methods in Physics Research Section B. - : Elsevier BV. - 0168-583X .- 1872-9584. ; 269:24, s. 2850-2856
  • Tidskriftsartikel (refereegranskat)abstract
    • FLUKA is a general purpose Monte Carlo code capable of handling all radiation components from thermal energies (for neutrons) or 1 keV (for all other particles) to cosmic ray energies and can be applied in many different fields. Presently the code is maintained on Linux. The validity of the physical models implemented in FLUKA has been benchmarked against a variety of experimental data over a wide energy range, from accelerator data to cosmic ray showers in the Earth atmosphere. FLUKA is widely used for studies related both to basic research and to applications in particle accelerators, radiation protection and dosimetry, including the specific issue of radiation damage in space missions, radiobiology (including radiotherapy) and cosmic ray calculations.After a short description of the main features that make FLUKA valuable for these topics, the present paper summarizes some of the recent applications of the FLUKA Monte Carlo code in the nuclear as well high energy physics. In particular it addresses such topics as accelerator related applications.
  •  
3.
  • Battistoni, Giuseppe, et al. (författare)
  • FLUKA Capabilities and CERN Applications for the Study of Radiation Damage to Electronics at High-Energy Hadron Accelerators
  • 2011
  • Konferensbidrag (refereegranskat)abstract
    • The assessment of radiation damage to electronics is a complex process and requires a detailed description of the full particle energy spectra, as well as a clear characterization of the quantities used to predict radiation damage. FLUKA, a multi-purpose particle interaction and transport code, is capable of calculating proton-proton and heavy ion collisions at LHC energies and beyond. It correctly describes the entire hadronic and electromagnetic particle cascade initiated by secondary particles from TeV energies down to thermal neutrons, and provides direct scoring capabilities essential to estimate in detail the possible risk of radiation damage to electronics. This paper presents the FLUKA capabilities for applications related to radiation damage to electronics, providing benchmarking examples and showing the practical applications of FLUKA at CERN facilities such as CNGS and LHC. Related applications range from the study of device effects, the detailed characterization of the radiation field and radiation monitor calibration, to the input requirements for important mitigation studies including shielding, relocation or other options.
  •  
4.
  • Battistoni, Giuseppe, et al. (författare)
  • The Application of the Monte Carlo Code FLUKA in Radiation Protection Studies for the Large Hadron Collider
  • 2011
  • Konferensbidrag (refereegranskat)abstract
    • The multi-purpose particle interaction and transport code FLUKA is integral part of all radiation protection studies for the design and operation of the Large Hadron Collider (LHC) at CERN. It is one of the very few codes available for this type of calculations which is capable to calculate in one and the same simulation proton-proton and heavy ion collisions at LHC energies as well as the entire hadronic and electromagnetic particle cascade initiated by secondary particles in detectors and beam-line components from TeV energies down to energies of thermal neutrons. The present paper reviews these capabilities of FLUKA in sketching the relevant physics models along with examples ofradiation protection studies for the LHC such as shielding studies for underground areas occupied by personnel during LHC operation and the simulation of induced radioactivity around beam loss points. Integral part of the FLUKA development is a careful benchmarking of specific models as well as the code performance in actual, complex applications which is demonstrated with examples of studies relevant to radiation protection at the LHC.
  •  
5.
  • Catalfamo, Alessio, et al. (författare)
  • Machine learning workflows in the computing continuum for environmental monitoring
  • 2024
  • Ingår i: Computational science – ICCS 2024. - Cham : Springer. - 9783031637742 - 9783031637759 ; , s. 368-382
  • Konferensbidrag (refereegranskat)abstract
    • Cloud-Edge Continuum is an innovative approach that exploits the strengths of the two paradigms: Cloud and Edge computing. This new approach gives us a holistic vision of this environment, enabling new kinds of applications that can exploit both the Edge computing advantages (e.g., real-time response, data security, and so on) and the powerful Cloud computing infrastructure for high computational requirements. This paper proposes a Cloud-Edge computing Workflow solution for Machine Learning (ML) inference in a hydrogeological use case. Our solution is designed in a Cloud-Edge Continuum environment thanks to Pegasus Workflow Management System Tools that we use for the implementation phase. The proposed work splits the inference tasks, transparently distributing the computation performed by each layer between Cloud and Edge infrastructure. We use two models to implement a proof-of-concept of the proposed solution.
  •  
6.
  • Fazio, Maria, et al. (författare)
  • A Note on the Convergence of IoT, Edge, and Cloud Computing in Smart Cities
  • 2018
  • Ingår i: IEEE Cloud Computing. - : IEEE. - 2325-6095. ; 5:5, s. 22-24
  • Tidskriftsartikel (refereegranskat)abstract
    • The purpose of the special issue is to cover all aspects of design and implementation, as well as deployment and evaluation of solutions aimed at the osmotic convergence of IoT, edge, and cloud computing, with specific reference to the smart cities application scenario.
  •  
7.
  • Galletta, Antonino, et al. (författare)
  • Investigating the Applicability of Nested Secret Share for Drone Fleet Photo Storage
  • 2024
  • Ingår i: IEEE Transactions on Mobile Computing. - : Institute of Electrical and Electronics Engineers (IEEE). - 1536-1233 .- 1558-0660. ; 23:4, s. 2671-2683
  • Tidskriftsartikel (refereegranskat)abstract
    • Military drones can be used for surveillance or spying on enemies. They, however, can be either destroyed or captured, therefore photos contained inside them can be lost or revealed to the attacker. A possible solution to solve such a problem is to adopt Secret Share (SS) techniques to split photos into several sections/chunks and distribute them among a fleet of drones. The advantages of using such a technique are two folds. First, no single drone contains any photo in its entirety; thus even when a drone is captured, the attacker cannot discover any photos. Second, the storage requirements of drones can be simplified, and thus cheaper drones can be produced for such missions. In this scenario, a fleet of drones consists of t+r drones, where t (threshold) is the minimum number of drones required to reconstruct the photos, and r (redundancy) is the maximum number of lost drones the system can tolerate. The optimal configuration of t+r is a formidable task. This configuration is typically rigid and hard to modify in order to fit the requirements of specific missions. In this work, we addressed such an issue and proposed the adoption of a flexible Nested Secret Share (NSS) technique. In our experiments, we compared two of the major SS algorithms (Shamir's schema and the Redundant Residue Number System (RRNS)) with their Two-Level NSS (2NSS) variants to store/retrieve photos. Results showed that Redundant Residue Number System (RRNS) is more suitable for a drone fleet scenario.
  •  
8.
  • Galletta, Antonino, et al. (författare)
  • Overcoming security limitations of Secret Share techniques : The Nested Secret Share
  • 2021
  • Ingår i: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). - 9781665416580 ; , s. 289-296
  • Konferensbidrag (refereegranskat)abstract
    • Secret Share (SS) is becoming a very hot topic within the scientific community. It allows us to split a secret into fragments and to share them among parties in such a way that a subset can recompose the original information. SS techniques assure a high redundancy degree, but the security level is fixed. Therefore, if a minimum number of peers collude then attackers can recompose the secret easily. A possible approach to improve the security of SS is designing nest fragment sharing techniques. In this paper, we propose the Nested Secret Share (NSS) as a more reliable and scalable strategy. In particular, we discuss the security of NSS considering the number of recomposition attempts that an attacker has to perform to retrieve the secret and then we deeply analyse the impact of the redundancy and the number of peers on the secret management against the percentage of compromised nodes. Experiments were promising and showed that the redundancy degree of SS can be highly improved by NSS.
  •  
9.
  • Galletta, Antonino, et al. (författare)
  • Smart Hospitals Enabled by Edge Computing
  • 2020
  • Ingår i: Edge Computing. - : The Institution of Engineering and Technology (IET). - 9781785619403 - 9781785619410 ; , s. 357-380
  • Bokkapitel (övrigt vetenskapligt/konstnärligt)abstract
    • The development of smart cities is inseparable from the application of edge computing technology. The value of edge computing in smart cities is reflected in specific application scenarios. So, this chapter mainly introduces the definition of smart cities and their architecture, and enumerates some applications with edge computing technology. It also introduces how edge computing technology is applied in dealing with urban traffic congestion. Next, the computation offloading, resource allocation and task scheduling problems in edge computing -enabled smart city are discussed according to the academic research. Finally, we discuss the security and privacy problem in edge computing -based smart city. The application of edge computing in smart cities is much more than that mentioned in this chapter. With experts and scholars in different domain investing in edge computing research, the role of edge computing in smart cities will be further enhanced.
  •  
10.
  • Preface
  • 2023
  • Proceedings (redaktörskap) (övrigt vetenskapligt/konstnärligt)
  •  
11.
  • Rochwerger, Benny, et al. (författare)
  • An architecture for federated cloud computing
  • 2011
  • Ingår i: Cloud computing. - Hoboken, N. J. : John Wiley & Sons. - 9780470887998 - 9780470940105 ; , s. 393-412
  • Bokkapitel (refereegranskat)
  •  
12.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-12 av 12

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy