Learn More
The paper proposes a method of deconvolution in a periodic setting which combines two important ideas, the fast wavelet and Fourier transform-based estimation procedure of Johnstone et al. An unknown function is estimated by a wavelet series where the empirical wavelet coefficients are filtered in an adapting non-linear fashion. It is shown theoretically(More)
Application markets have revolutionized the software download model of mobile phones: third-party application developers offer software on the market that users can effortlessly install on their phones. This great step forward, however, also imposes some threats to user privacy: applications often ask for permissions that reveal private information such as(More)
The increasing popularity of location based social services such as Facebook Places, Foursquare and Google Latitude, solicits a new trend in fusing social networking with real world sensing. The availability of a wide range of sensing technologies in our everyday environment presents an opportunity to further enrich social networking systems with(More)
The Internet of Things (IoT) aims at connecting billions of devices in an Internet-like structure. This gigantic information exchange enables new opportunities and new forms of interactions among things and people. A crucial enabler of robust applications and easy smart objects' deployment is the availability of mechanisms that minimize (ideally, cancel)(More)
Bioassays are routinely employed for sediment quality assessment. In order to be able to effectively use Bioassays responses in regulatory and management frameworks, toxicity scores, which rank toxicity data in defined classes that are continuous and difficult to interpret, should be reliable and suitable tools to support decisions about the presence or(More)
This work reports some considerations on the possible contribution of sulfide and ammonia to the toxicity of elutriate samples of sediments from the Venice lagoon, tested with a battery of bioassays using early life stages of the sea urchin Paracentrotus lividus and the oyster Crassostrea gigas. A comparison of ammonia or sulfide concentration in the test(More)
— Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and standardized way from third-party applications accessing online services, based on the representational state transfer (REST) web architecture. OAuth has been designed to provide an authorization layer, typically on top of a secure transport layer such as(More)
Real-time tracking of massive numbers of mobile devices, either carried by humans or embedded into vehicles, is a challenging problem whose solution may pave the way for a large set of valuable applications, ranging from social networking to ambient intelligence. A centralized approach, i.e. a server collects position data and provides it to interested(More)
The widespread use of tracking and localization systems may be hindered by centralized server platforms whose performance can hardly scale up to the needs of very large numbers of concurrent mobile users. In this paper we introduce GeoKad, a peer-to-peer localization protocol based on the new concept of Distributed Geographic Table, that allows to retrieve(More)
In this work, we present an innovative approach for effective cross-network information dissemination, with applications to vehicular ad hoc networks (VANETs). The proposed approach, denoted as " Cross-Network Effective Traffic Alert Dissemination " (X-NETAD), leverages on the spontaneous formation of local WiFi (IEEE 802.11b) VANETs, with direct(More)