Skip to main content

Showing 1–8 of 8 results for author: Forte, A

Searching in archive cs. Search in all archives.
.
  1. Saving temporary exhibitions in virtual environments: the Digital Renaissance of Ulisse Aldrovandi -- acquisition and digitisation of cultural heritage objects

    Authors: Roberto Balzani, Sebastian Barzaghi, Gabriele Bitelli, Federica Bonifazi, Alice Bordignon, Luca Cipriani, Simona Colitti, Federica Collina, Marilena Daquino, Francesca Fabbri, Bruno Fanini, Filippo Fantini, Daniele Ferdani, Giulia Fiorini, Elena Formia, Anna Forte, Federica Giacomini, Valentina Alena Girelli, Bianca Gualandi, Ivan Heibi, Alessandro Iannucci, Rachele Manganelli Del Fà, Arcangelo Massari, Arianna Moretti, Silvio Peroni , et al. (8 additional authors not shown)

    Abstract: As per the objectives of Project CHANGES, particularly its thematic sub-project on the use of virtual technologies for museums and art collections, our goal was to obtain a digital twin of the temporary exhibition on Ulisse Aldrovandi called "The Other Renaissance", and make it accessible to users online. After a preliminary study of the exhibition, focussing on acquisition constraints and related… ▽ More

    Submitted 27 December, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

  2. arXiv:2206.15037  [pdf, other

    cs.HC

    Privacy Research with Marginalized Groups: What We Know, What's Needed, and What's Next

    Authors: Shruti Sannon, Andrea Forte

    Abstract: People who are marginalized experience disproportionate harms when their privacy is violated. Meeting their needs is vital for develo** equitable and privacy-protective technologies. In response, research at the intersection of privacy and marginalization has acquired newfound urgency in the HCI and social computing community. In this literature review, we set out to understand how researchers h… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

    Comments: This paper has been accepted for publication in the Proceedings of the ACM on Human-Computer Interaction and will be presented at CSCW 2022

    ACM Class: J.4; K.4

  3. arXiv:2112.01366  [pdf, other

    cs.RO

    MuA-Ori: Multimodal Actuated Origami

    Authors: Antonio Elia Forte, David Melancon, Leon M. Kamp, Benjamin Gorissen, Katia Bertoldi

    Abstract: Recently, inflatable elements integrated in robotics systems have enabled complex motions as a result of simple inputs. However, these fluidic actuators typically exhibit unimodal deformation upon inflation. Here, we present a new design concept for modular, fluidic actuators that can switch between deformation modes as a response to an input threshold. Our system comprises bistable origami module… ▽ More

    Submitted 5 November, 2021; originally announced December 2021.

  4. arXiv:2104.11145  [pdf, other

    cs.CY

    "I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers

    Authors: Periwinkle Doerfler, Andrea Forte, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn, Damon McCoy

    Abstract: While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We pr… ▽ More

    Submitted 22 April, 2021; v1 submitted 22 April, 2021; originally announced April 2021.

  5. arXiv:2102.13455  [pdf, other

    cs.CE

    Inverse deformation analysis: an experimental and numerical assessment using the FEniCS Project

    Authors: Arnaud Mazier, Alexandre Bilger, Antonio E. Forte, Igor Peterlik, Jack S. Hale, Stéphane P. A. Bordas, ., Institute of Computational Engineering, Department of Engineering, University of Luxembourg, Esch-sur-Alzette, Luxembourg., Harvard University, Cambridge, USA., Department of Electronics, Information, Bioengineering, Politecnico di Milano, Milan, Italy., Institute of Computer Science, Masaryk University, Czech Republic., Institute of Research , et al. (3 additional authors not shown)

    Abstract: In this paper, we develop a framework for solving inverse deformation problems using the FEniCS Project finite element software. We validate our approach with experimental imaging data acquired from a soft silicone beam under gravity. In contrast with inverse iterative algorithms that require multiple solutions of a standard elasticity problem, the proposed method can compute the undeformed config… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

    Comments: 33 pages, 12 figures, submitted to Elsevier

  6. A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users

    Authors: Kaylea Champion, Nora McDonald, Stephanie Bankes, Joseph Zhang, Rachel Greenstadt, Andrea Forte, Benjamin Mako Hill

    Abstract: By choice or by necessity, some contributors to commons-based peer production sites use privacy-protecting services to remain anonymous. As anonymity seekers, users of the Tor network have been cast both as ill-intentioned vandals and as vulnerable populations concerned with their privacy. In this study, we use a dataset drawn from a corpus of Tor edits to Wikipedia to uncover the character of Tor… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Journal ref: Proc. ACM Hum.-Comput. Interact. 3, CSCW, Article 53 (November 2019)

  7. Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor

    Authors: Chau Tran, Kaylea Champion, Andrea Forte, Benjamin Mako Hill, Rachel Greenstadt

    Abstract: User-generated content sites routinely block contributions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse. Although these blocks might be effective, collateral damage in the form of unrealized valuable contributions from anonymity seekers is invisible. One of the largest and most important user-generated content site… ▽ More

    Submitted 15 February, 2020; v1 submitted 8 April, 2019; originally announced April 2019.

    Comments: To appear in the IEEE Symposium on Security & Privacy, May 2020

  8. arXiv:cs/0701046  [pdf, ps, other

    cs.NI

    Cooperation Between Stations in Wireless Networks

    Authors: Andrea G. Forte, Henning Schulzrinne

    Abstract: In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, particularly for real-time applications such as VoIP. We propose a novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate with each other and share useful information about the network in which they move. We sho… ▽ More

    Submitted 8 January, 2007; originally announced January 2007.

    Comments: 16 pages, 49 references, 12 figures, 3 tables

    Report number: cucs-044-06