Marco Picone

Learn More
Application markets have revolutionized the software download model of mobile phones: third-party application developers offer software on the market that users can effortlessly install on their phones. This great step forward, however, also imposes some threats to user privacy: applications often ask for permissions that reveal private information such as(More)
The Internet of Things (IoT) aims at connecting billions of devices in an Internet-like structure. This gigantic information exchange enables new opportunities and new forms of interactions among things and people. A crucial enabler of robust applications and easy smart objects' deployment is the availability of mechanisms that minimize (ideally, cancel)(More)
Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and standardized way from third-party applications accessing online services, based on the representational state transfer (REST) web architecture. OAuth has been designed to provide an authorization layer, typically on top of a secure transport layer such as(More)
The increasing popularity of location based social services such as Facebook Places, Foursquare and Google Latitude, solicits a new trend in fusing social networking with real world sensing. The availability of a wide range of sensing technologies in our everyday environment presents an opportunity to further enrich social networking systems with(More)
The Internet of Things (IoT) will interconnect billions of devices, denoted as “smart objects,” deployed pervasively, which will be extremely heterogeneous, in terms of hardware (i.e., computational power and available memory), software (i.e., operating systems, applications), and communication interfaces. Traditional Internet actors, such as(More)
This work reports some considerations on the possible contribution of sulfide and ammonia to the toxicity of elutriate samples of sediments from the Venice lagoon, tested with a battery of bioassays using early life stages of the sea urchin Paracentrotus lividus and the oyster Crassostrea gigas. A comparison of ammonia or sulfide concentration in the test(More)
Bioassays are routinely employed for sediment quality assessment. In order to be able to effectively use Bioassays responses in regulatory and management frameworks, toxicity scores, which rank toxicity data in defined classes that are continuous and difficult to interpret, should be reliable and suitable tools to support decisions about the presence or(More)
The 96-h water-only exposure and 10-d sediment toxicity tests with the amphipod Corophium orientale were performed in order to enhance the knowledge about its overall sensitivity and its applicability to Venice Lagoon sediments. The values obtained with cadmium as reference toxicant demonstrated a certain variability of the LC(50); the higher value was(More)
Mobile and distributed systems are characterized by decentralized goals and control, with high levels of concurrency and asynchronous interaction. Their qualitative and quantitative analysis is usually based on discrete event modeling and simulation. As most simulation tools target a specific class of problems, only a few of them may be considered truly(More)