-
Saving temporary exhibitions in virtual environments: the Digital Renaissance of Ulisse Aldrovandi -- acquisition and digitisation of cultural heritage objects
Authors:
Roberto Balzani,
Sebastian Barzaghi,
Gabriele Bitelli,
Federica Bonifazi,
Alice Bordignon,
Luca Cipriani,
Simona Colitti,
Federica Collina,
Marilena Daquino,
Francesca Fabbri,
Bruno Fanini,
Filippo Fantini,
Daniele Ferdani,
Giulia Fiorini,
Elena Formia,
Anna Forte,
Federica Giacomini,
Valentina Alena Girelli,
Bianca Gualandi,
Ivan Heibi,
Alessandro Iannucci,
Rachele Manganelli Del Fà,
Arcangelo Massari,
Arianna Moretti,
Silvio Peroni
, et al. (8 additional authors not shown)
Abstract:
As per the objectives of Project CHANGES, particularly its thematic sub-project on the use of virtual technologies for museums and art collections, our goal was to obtain a digital twin of the temporary exhibition on Ulisse Aldrovandi called "The Other Renaissance", and make it accessible to users online. After a preliminary study of the exhibition, focussing on acquisition constraints and related…
▽ More
As per the objectives of Project CHANGES, particularly its thematic sub-project on the use of virtual technologies for museums and art collections, our goal was to obtain a digital twin of the temporary exhibition on Ulisse Aldrovandi called "The Other Renaissance", and make it accessible to users online. After a preliminary study of the exhibition, focussing on acquisition constraints and related solutions, we proceeded with the digital twin creation by acquiring, processing, modelling, optimising, exporting, and metadating the exhibition. We made hybrid use of two acquisition techniques to create new digital cultural heritage objects and environments, and we used open technologies, formats, and protocols to make available the final digital product. Here, we describe the process of collecting and curating bibliographical exhibition (meta)data and the beginning of the digital twin creation to foster its findability, accessibility, interoperability, and reusability. The creation of the digital twin is currently ongoing.
△ Less
Submitted 27 December, 2023; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Privacy Research with Marginalized Groups: What We Know, What's Needed, and What's Next
Authors:
Shruti Sannon,
Andrea Forte
Abstract:
People who are marginalized experience disproportionate harms when their privacy is violated. Meeting their needs is vital for develo** equitable and privacy-protective technologies. In response, research at the intersection of privacy and marginalization has acquired newfound urgency in the HCI and social computing community. In this literature review, we set out to understand how researchers h…
▽ More
People who are marginalized experience disproportionate harms when their privacy is violated. Meeting their needs is vital for develo** equitable and privacy-protective technologies. In response, research at the intersection of privacy and marginalization has acquired newfound urgency in the HCI and social computing community. In this literature review, we set out to understand how researchers have investigated this area of study. What topics have been examined, and how? What are the key findings and recommendations? And, crucially, where do we go from here? Based on a review of papers on privacy and marginalization published between 2010-2020 across HCI, Communication, and Privacy-focused venues, we make three main contributions: (1) we identify key themes in existing work and introduce the Privacy Responses and Costs framework to describe the tensions around protecting privacy in marginalized contexts, (2) we identify understudied research topics (e.g., race) and other avenues for future work, and (3) we characterize trends in research practices, including the under-reporting of important methodological choices, and provide suggestions for establishing shared best practices for this growing research area.
△ Less
Submitted 30 June, 2022;
originally announced June 2022.
-
MuA-Ori: Multimodal Actuated Origami
Authors:
Antonio Elia Forte,
David Melancon,
Leon M. Kamp,
Benjamin Gorissen,
Katia Bertoldi
Abstract:
Recently, inflatable elements integrated in robotics systems have enabled complex motions as a result of simple inputs. However, these fluidic actuators typically exhibit unimodal deformation upon inflation. Here, we present a new design concept for modular, fluidic actuators that can switch between deformation modes as a response to an input threshold. Our system comprises bistable origami module…
▽ More
Recently, inflatable elements integrated in robotics systems have enabled complex motions as a result of simple inputs. However, these fluidic actuators typically exhibit unimodal deformation upon inflation. Here, we present a new design concept for modular, fluidic actuators that can switch between deformation modes as a response to an input threshold. Our system comprises bistable origami modules in which snap** breaks rotational symmetry, giving access to a bending deformation. By tuning geometry, the modules can be designed to snap at different pressure thresholds, rotate clockwise or counterclockwise when actuated, and bend in different planes. Due to their ability to assume multiple deformation modes as response to a single pressure input we call our system MuA-Ori, or Multimodal Actuated Origami. MuA-Ori provides an ideal platform to design actuators that can switch between different configurations, reach multiple, pre-defined targets in space, and move along complex trajectories.
△ Less
Submitted 5 November, 2021;
originally announced December 2021.
-
"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers
Authors:
Periwinkle Doerfler,
Andrea Forte,
Emiliano De Cristofaro,
Gianluca Stringhini,
Jeremy Blackburn,
Damon McCoy
Abstract:
While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We pr…
▽ More
While the Internet has dramatically increased the exposure that research can receive, it has also facilitated harassment against scholars. To understand the impact that these attacks can have on the work of researchers, we perform a series of systematic interviews with researchers including academics, journalists, and activists, who have experienced targeted, Internet-facilitated harassment. We provide a framework for understanding the types of harassers that target researchers, the harassment that ensues, and the personal and professional impact on individuals and academic freedom. We then study preventative and remedial strategies available, and the institutions that prevent some of these strategies from being more effective. Finally, we discuss the ethical structures that could facilitate more equitable access to participating in research without serious personal suffering.
△ Less
Submitted 22 April, 2021; v1 submitted 22 April, 2021;
originally announced April 2021.
-
Inverse deformation analysis: an experimental and numerical assessment using the FEniCS Project
Authors:
Arnaud Mazier,
Alexandre Bilger,
Antonio E. Forte,
Igor Peterlik,
Jack S. Hale,
Stéphane P. A. Bordas,
.,
Institute of Computational Engineering,
Department of Engineering,
University of Luxembourg,
Esch-sur-Alzette,
Luxembourg.,
Harvard University,
Cambridge,
USA.,
Department of Electronics,
Information,
Bioengineering,
Politecnico di Milano,
Milan,
Italy.,
Institute of Computer Science,
Masaryk University,
Czech Republic.,
Institute of Research
, et al. (3 additional authors not shown)
Abstract:
In this paper, we develop a framework for solving inverse deformation problems using the FEniCS Project finite element software. We validate our approach with experimental imaging data acquired from a soft silicone beam under gravity. In contrast with inverse iterative algorithms that require multiple solutions of a standard elasticity problem, the proposed method can compute the undeformed config…
▽ More
In this paper, we develop a framework for solving inverse deformation problems using the FEniCS Project finite element software. We validate our approach with experimental imaging data acquired from a soft silicone beam under gravity. In contrast with inverse iterative algorithms that require multiple solutions of a standard elasticity problem, the proposed method can compute the undeformed configuration by solving only one modified elasticity problem. This modified problem has a complexity comparable to the standard one. The framework is implemented within an open-source pipeline enabling the direct and inverse deformation simulation directly from imaging data. We use the high-level Unified Form Language (UFL) of the FEniCS Project to express the finite element model in variational form and to automatically derive the consistent Jacobian. Consequently, the design of the pipeline is flexible: for example, it allows the modification of the constitutive models by changing a single line of code. We include a complete working example showing the inverse deformation of a beam deformed by gravity as supplementary material.
△ Less
Submitted 26 February, 2021;
originally announced February 2021.
-
A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users
Authors:
Kaylea Champion,
Nora McDonald,
Stephanie Bankes,
Joseph Zhang,
Rachel Greenstadt,
Andrea Forte,
Benjamin Mako Hill
Abstract:
By choice or by necessity, some contributors to commons-based peer production sites use privacy-protecting services to remain anonymous. As anonymity seekers, users of the Tor network have been cast both as ill-intentioned vandals and as vulnerable populations concerned with their privacy. In this study, we use a dataset drawn from a corpus of Tor edits to Wikipedia to uncover the character of Tor…
▽ More
By choice or by necessity, some contributors to commons-based peer production sites use privacy-protecting services to remain anonymous. As anonymity seekers, users of the Tor network have been cast both as ill-intentioned vandals and as vulnerable populations concerned with their privacy. In this study, we use a dataset drawn from a corpus of Tor edits to Wikipedia to uncover the character of Tor users' contributions. We build in-depth narrative descriptions of Tor users' actions and conduct a thematic analysis that places their editing activity into seven broad groups. We find that although their use of a privacy-protecting service marks them as unusual within Wikipedia, the character of many Tor users' contributions is in line with the expectations and norms of Wikipedia. However, our themes point to several important places where lack of trust promotes disorder, and to contributions where risks to contributors, service providers, and communities are unaligned.
△ Less
Submitted 17 September, 2019;
originally announced September 2019.
-
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor
Authors:
Chau Tran,
Kaylea Champion,
Andrea Forte,
Benjamin Mako Hill,
Rachel Greenstadt
Abstract:
User-generated content sites routinely block contributions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse. Although these blocks might be effective, collateral damage in the form of unrealized valuable contributions from anonymity seekers is invisible. One of the largest and most important user-generated content site…
▽ More
User-generated content sites routinely block contributions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse. Although these blocks might be effective, collateral damage in the form of unrealized valuable contributions from anonymity seekers is invisible. One of the largest and most important user-generated content sites, Wikipedia, has attempted to block contributions from Tor users since as early as 2005. We demonstrate that these blocks have been imperfect and that thousands of attempts to edit on Wikipedia through Tor have been successful. We draw upon several data sources and analytical techniques to measure and describe the history of Tor editing on Wikipedia over time and to compare contributions from Tor users to those from other groups of Wikipedia users. Our analysis suggests that although Tor users who slip through Wikipedia's ban contribute content that is more likely to be reverted and to revert others, their contributions are otherwise similar in quality to those from other unregistered participants and to the initial contributions of registered users.
△ Less
Submitted 15 February, 2020; v1 submitted 8 April, 2019;
originally announced April 2019.
-
Cooperation Between Stations in Wireless Networks
Authors:
Andrea G. Forte,
Henning Schulzrinne
Abstract:
In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, particularly for real-time applications such as VoIP. We propose a novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate with each other and share useful information about the network in which they move. We sho…
▽ More
In a wireless network, mobile nodes (MNs) repeatedly perform tasks such as layer 2 (L2) handoff, layer 3 (L3) handoff and authentication. These tasks are critical, particularly for real-time applications such as VoIP. We propose a novel approach, namely Cooperative Roaming (CR), in which MNs can collaborate with each other and share useful information about the network in which they move. We show how we can achieve seamless L2 and L3 handoffs regardless of the authentication mechanism used and without any changes to either the infrastructure or the protocol. In particular, we provide a working implementation of CR and show how, with CR, MNs can achieve a total L2+L3 handoff time of less than 16 ms in an open network and of about 21 ms in an IEEE 802.11i network. We consider behaviors typical of IEEE 802.11 networks, although many of the concepts and problems addressed here apply to any kind of mobile network.
△ Less
Submitted 8 January, 2007;
originally announced January 2007.