Web and Social Networks
Submitted by zennaro2 on
Submitted by zennaro2 on
Submitted by zennaro2 on
Recommender systems (e.g., Amazon, LinkedIn, ...) and reputation systems (e.g., Tripadvisor, Booking.com, ...) have the purpose of providing advices for decision making in e-commerce and online service environments. They are similar in the sense that both collect data of members in a community in order to provide advice to those members. However, there are also fundamental differences. The purpose of recommender systems is mainly to generate suggestions about resources that a user a priori is not aware of but is possibly interest in.
Submitted by zennaro2 on
Music is a transcultural language, and, taking advantage of this, CSC group aims at facilitating the inclusion of people with disabilities (e.g., multimodal interaction for learning and well-being, acoustic analysis for safety and security in the workplace) and the dialogue among different cultures and populations (production of new multimedia cultural events, computing and cultural heritage, preservation and valorization of audio documents, computational creativity, speech technolo
Submitted by zennaro2 on
Research activities:
Submitted by zennaro2 on
Computational models for expression communication can contribute to the definition of innovative human-computer interfaces, based on devices capable of understanding and responding to the user’s affective state and behavior.
Research activities:
Submitted by zennaro2 on
Research activities:
Submitted by zennaro2 on
Submitted by zennaro2 on
Our modern society is becoming every day more reliant on its capability to store, transmit and process digital data, the goal of cybersecurity is to guarantee both the data and the infrastructures in terms of integrity, availability and confidentiality.
Specific fields:
People:
Submitted by zennaro2 on
The distributed nature of peer-to-peer and ad-hoc networks makes "securing" them against the activities of even a small fraction of malicious users particularly challenging.
People: Enoch Peserico (contact person)
Submitted by zennaro2 on
The proliferation of wideband connections, while opening the market to a large number of innovative web-based applications, also turns any home PC into a target for intrusions and drafting into botnets. Furthermore, the "Connected World" vision at the very base of both the Internet of Things and the Cyber-Physical systems makes every object both a target for an attack and a possible injection point for malware. Thus, the capability to exchange electronic data in a secure framework is a basic requirement of the economy of our modern society, and impacts on several other fields (e.g.