Skip to main content

Showing 1–12 of 12 results for author: Rovatti, R

.
  1. arXiv:2308.04416  [pdf, other

    cs.CL

    Legal Summarisation through LLMs: The PRODIGIT Project

    Authors: Thiago Dal Pont, Federico Galli, Andrea Loreggia, Giuseppe Pisano, Riccardo Rovatti, Giovanni Sartor

    Abstract: We present some initial results of a large-scale Italian project called PRODIGIT which aims to support tax judges and lawyers through digital technology, focusing on AI. We have focused on generation of summaries of judicial decisions and on the extraction of related information, such as the identification of legal issues and decision-making criteria, and the specification of keywords. To this end… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2303.09136 by other authors

  2. arXiv:2110.02579  [pdf, other

    cs.IT eess.SP

    Anomaly Detection based on Compressed Data: an Information Theoretic Characterization

    Authors: Alex Marchioni, Andriy Enttsel, Mauro Mangia, Riccardo Rovatti, Gianluca Setti

    Abstract: We analyze the effect of lossy compression in the processing of sensor signals that must be used to detect anomalous events in the system under observation. The intuitive relationship between the quality loss at higher compression and the possibility of telling anomalous behaviours from normal ones is formalized in terms of information-theoretic quantities. Some analytic derivations are made withi… ▽ More

    Submitted 30 April, 2022; v1 submitted 6 October, 2021; originally announced October 2021.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  3. arXiv:1512.09263  [pdf, ps, other

    cs.CR

    On the security of a class of diffusion mechanisms for image encryption

    Authors: Leo Yu Zhang, Yuansheng Liu, Kwok-Wo Wong, Fabio Pareschi, Yushu Zhang, Riccardo Rovatti, Gianluca Setti

    Abstract: The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex ynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assu… ▽ More

    Submitted 31 December, 2015; originally announced December 2015.

    Comments: 16 pages, 7 figures

  4. arXiv:1507.00196  [pdf, other

    nlin.CD

    Interleaving techniques for high-throughput chaotic noise generation in CMOS

    Authors: Sergio Callegari, Riccardo Rovatti, Gianluca Setti

    Abstract: An interleaving technique is proposed to enhance the throughput of current-mode CMOS discrete time chaotic sources based on the iteration of unidimensional maps. A discussion of the reasons and the advantages offered by the approach is provided, together with analytical results about the conservation of some major statistical features. As an example, application to an FM-DCSK communication system… ▽ More

    Submitted 1 July, 2015; originally announced July 2015.

    Comments: 6 pages, 13 figures, post-print from conference submission

    Journal ref: Proceedings of the 7th International Conference Mixed Design of Integrated Circuits and Systems (MIXDES 2000), Gdynia, Poland, Jun. 2000, pp. 139-144

  5. arXiv:1506.08327  [pdf, other

    nlin.CD

    A Tailed Tent Map Chaotic Circuit Exploiting S$^2$I Memory Elements

    Authors: Sergio Callegari, Riccardo Rovatti, Gianluca Setti

    Abstract: In the implementation of discrete time chaotic systems, designers have mostly focused on the choice and synthesis of suitable nonlinear blocks, while correct and fast operation cannot neglect analog memory elements. Herein, a realization exploiting the Tailed Tent Map coupled with S$^2$I sample and hold stages is proposed. Interfacing problems between the memory and the processing sub-circuits are… ▽ More

    Submitted 27 June, 2015; originally announced June 2015.

    Comments: 4 pages, 11 figures

    Journal ref: Proc. of ECCTD'99, vol. 1, Stresa, IT, Sep. 1999, pp. 193-196

  6. On Known-Plaintext Attacks to a Compressed Sensing-based Encryption: A Quantitative Analysis

    Authors: Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti

    Abstract: Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts). In this paper we quantify by theoretical means the resistance of the least complex form of this kind of encoding against known-plaintext attacks. For both standard compressed sensing… ▽ More

    Submitted 25 June, 2015; v1 submitted 6 November, 2013; originally announced November 2013.

    Comments: IEEE Transactions on Information Forensics and Security, accepted for publication. Article in press

  7. From Chirps to Random-FM Excitations in Pulse Compression Ultrasound Systems

    Authors: Sergio Callegari, Marco Ricci, Salvatore Caporale, Marcello Monticelli, Massimiliano Eroli, Luca Senni, Riccardo Rovatti, Gianluca Setti, Pietro Burrascano

    Abstract: Pulse compression is often practiced in ultrasound Non Destructive Testing (NDT) systems using chirps. However, chirps are inadequate for setups where multiple probes need to operate concurrently in Multiple Input Multiple Output (MIMO) arrangements. Conversely, many coded excitation systems designed for MIMO miss some chirp advantages (constant envelope excitation, easiness of bandwidth control,… ▽ More

    Submitted 24 October, 2013; originally announced October 2013.

    Comments: 4 pages, 4 figures. Post-print from conference proceedings. Note that paper in conference proceedings at http://dx.doi.org/10.1109/ULTSYM.2012.0117 has some rendering issues

    Journal ref: IEEE International Ultrasonics Symposium (IUS), 2012 pp.471-474, 7-10 Oct. 2012

  8. arXiv:1310.4700  [pdf, other

    nlin.CD

    Sample and Hold Errors in the Implementation of Chaotic Maps

    Authors: Sergio Callegari, Riccardo Rovatti

    Abstract: Though considerable effort has recently been devoted to hardware realization of chaotic maps, the analysis generally neglects the influence of implementation inaccuracies. Here we investigate the consequences of S/H errors on Bernoulli shift, tent map and tailed tent map systems: an error model is proposed and implementations are characterized under its assumptions.

    Submitted 24 October, 2013; v1 submitted 17 October, 2013; originally announced October 2013.

    Comments: 4 pages, 7 figures, appeared at NOLTA 1998

    Journal ref: Proceedings of the 1998 International Symposium on Nonlinear Theory and its Applications (NOLTA), vol. 1, pp. 199-202, Crans Montana (CH), Sept. 1998

  9. Low-complexity Multiclass Encryption by Compressed Sensing

    Authors: Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti

    Abstract: The idea that compressed sensing may be used to encrypt information from unauthorised receivers has already been envisioned, but never explored in depth since its security may seem compromised by the linearity of its encoding process. In this paper we apply this simple encoding to define a general private-key encryption scheme in which a transmitter distributes the same encoded measurements to rec… ▽ More

    Submitted 17 February, 2015; v1 submitted 12 July, 2013; originally announced July 2013.

    Comments: IEEE Transactions on Signal Processing, accepted for publication. Article in press

  10. Rakeness in the design of Analog-to-Information Conversion of Sparse and Localized Signals

    Authors: Mauro Mangia, Riccardo Rovatti, Gianluca Setti

    Abstract: Design of Random Modulation Pre-Integration systems based on the restricted-isometry property may be suboptimal when the energy of the signals to be acquired is not evenly distributed, i.e. when they are both sparse and localized. To counter this, we introduce an additional design criterion, that we call rakeness, accounting for the amount of energy that the measurements capture from the signal to… ▽ More

    Submitted 5 May, 2012; originally announced May 2012.

    Journal ref: IEEE Transactions on Circuits and Systems, Part I, vol. 59, n. 5, pp. 1001-1014, 2012

  11. arXiv:1012.3638  [pdf, other

    cs.IT

    Determination of the Integrated Sidelobe Level of Sets of Rotated Legendre Sequences

    Authors: Salvador Javier Haboba, Riccardo Rovatti, Gianluca Setti

    Abstract: Sequences sets with low aperiodic auto- and cross-correlations play an important role in many applications like communications, radar and other active sensing applications. The use of antipodal sequences reduces hardware requirements while increases the difficult of the task of signal design. In this paper we present a method for the computation of the Integrated Sidelobe Level (ISL), and we use i… ▽ More

    Submitted 14 February, 2011; v1 submitted 16 December, 2010; originally announced December 2010.

    Comments: 6 pages

  12. arXiv:0912.2523  [pdf, ps, other

    cs.DM

    Markov Modeling of Cooperative Multiplayer Coupon Collectors' Problems

    Authors: R. Rovatti, C. Passerini, G. Mazzini

    Abstract: The paper introduces a modified version of the classical Coupon Collector's Problem entailing exchanges and cooperation between multiple players. Results of the development show that, within a proper Markov framework, the complexity of the Cooperative Multiplayer Coupon Collectors' Problem can be attacked with an eye to the modeling of resource harvesting and sharing within the context of Next G… ▽ More

    Submitted 13 December, 2009; originally announced December 2009.

    Comments: 14 pages, 5 figures