Annamaria Chiasera

Learn More
Disorders of sleep and circadian rhythmicity are characteristic of both advancing age and manned spaceflight. Sleep fragmentation, reduced nocturnal sleep tendency and sleep efficiency, reduced daytime alertness, and increased daytime napping are common to both of these conditions. Recent research on the pathophysiology and treatment of disrupted sleep in(More)
Processes in healthcare and socio-assistive domains typically span multiple institutions and require cooperation and information exchange among multiple IT systems. In most cases this cooperation today is handled " manually " via document exchange (by email, post, or fax) and in a point-to-point fashion. One of the reasons that makes it difficult to(More)
Assistive processes in healthcare and socio-assistive domains typically span multiple institutions which usually communicate manually with the exchange of documents. Despite the needs of cooperation it is difficult to provide an integrated solution to improve data exchange and allow comprehensive monitoring of the processes due to the complexity of the(More)
In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this(More)
Planning effective and well targeted actions to manage and improve the local and national healthcare services requires institutions to understand and analyse the real needs of the population based on reliable and timely statistical analysis on citizens' health state. This is particularly important in developing countries in which healthcare facilities lack(More)
Defining access control policies in a data integration scenario is a challenging task. In such a scenario typically each source specifies its local access control policy and cannot anticipate data inferences that can arise when data is integrated at the mediator level. Inferences, e.g., using functional dependencies, can allow malicious users to obtain, at(More)
The emergence of mobile devices brings high potential of business value. These devices include sensors, actuators, smartphones, tablets, and other complex devices. They have various computational resources, and are usually connected by wireless connections. On top of the available resources and provided services, complex tasks can be performed. Researches(More)