Error message

The content access permissions need to be rebuilt. Rebuild permissions.

Web and Social Networks

Recommendation and Reputation Systems

Recommender systems (e.g., Amazon, LinkedIn, ...) and reputation systems (e.g., Tripadvisor, Booking.com, ...) have the purpose of providing advices for decision making in e-commerce and online service environments. They are similar in the sense that both collect data of members in a community in order to provide advice to those members. However, there are also fundamental differences. The purpose of recommender systems is mainly to generate suggestions about resources that a user a priori is not aware of but is possibly interest in.

Computer engineering for music and multimedia

Music is a transcultural language, and, taking advantage of this, CSC group aims at facilitating the inclusion of people with disabilities (e.g., multimodal interaction for learning and well-being, acoustic analysis for safety and security in the workplace) and the dialogue among different cultures and populations (production of new multimedia cultural events, computing and cultural heritage, preservation and valorization of audio documents, computational creativity, speech technolo

Musical Cultural Heritage

Research activities:

Affective computing

Computational models for expression communication can contribute to the definition of innovative human-computer interfaces, based on devices capable of understanding and responding to the user’s affective state and behavior.

Research activities:

Multimodal interaction for learning and well-being

Research activities:

3D Audio

  • Development of innovative techniques for spatial audio synthesis with particular attention to binaural audio synthesis based on Head-Related Transfer Functions (HRTFs) and real-time audio rendering.
  • Development of the "Mixed Structural Modeling (MSM)" framework for the design of HRTFs, combining synthetic modeling paradigms with HRTF selection techniques.
  • Customization of HRTFs, based on individual anthropometric data, which are used to either fit model parameters or to select recorded components within a dataset of available responses.

Cybersecurity

Our modern society is becoming every day more reliant on its capability to store, transmit and process digital data, the goal of cybersecurity is to guarantee both the data and the infrastructures in terms of integrity, availability and confidentiality.

 

Specific fields:

  • Pervasive and Mobile System Security
  • Energy-Aware Security
  • IoT Security

 

People:

Carlo Ferrari

P2P and Ad-hoc Network Security

The distributed nature of peer-to-peer and ad-hoc networks makes "securing" them against the activities of even a small fraction of malicious users particularly challenging.

  • Time coordination in P2P and ad-hoc networks
  • "Physical" information transport in mobile networks
  • Secure Distributed Hash Tables (DHTs)
  • Secure distributed voting systems

People: Enoch Peserico (contact person)

Pervasive and Mobile System Security, Energy-Aware Security

The proliferation of wideband connections, while opening the market to a large number of innovative web-based applications, also turns any home PC into a target for intrusions and drafting into botnets. Furthermore, the "Connected World" vision at the very base of both the Internet of Things and the Cyber-Physical systems makes every object both a target for an attack and a possible injection point for malware. Thus, the capability to exchange electronic data in a secure framework is a basic requirement of the economy of our modern society, and impacts on several other fields (e.g.

Pages

Subscribe to DEI RSS