Skip to main content

Showing 1–44 of 44 results for author: Luna, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.08979  [pdf, other

    cs.LG q-bio.MN q-bio.QM

    drGAT: Attention-Guided Gene Assessment of Drug Response Utilizing a Drug-Cell-Gene Heterogeneous Network

    Authors: Yoshitaka Inoue, Hunmin Lee, Tianfan Fu, Augustin Luna

    Abstract: Drug development is a lengthy process with a high failure rate. Increasingly, machine learning is utilized to facilitate the drug development processes. These models aim to enhance our understanding of drug characteristics, including their activity in biological contexts. However, a major challenge in drug response (DR) prediction is model interpretability as it aids in the validation of findings.… ▽ More

    Submitted 14 May, 2024; originally announced May 2024.

  2. arXiv:2404.18944  [pdf

    cs.SI cs.CY cs.LG

    Investigating the dissemination of STEM content on social media with computational tools

    Authors: Oluwamayokun Oshinowo, Priscila Delgado, Meredith Fay, C. Alessandra Luna, Anjana Dissanayaka, Rebecca Jeltuhin, David R. Myers

    Abstract: Social media platforms can quickly disseminate STEM content to diverse audiences, but their operation can be mysterious. We used open-source machine learning methods such as clustering, regression, and sentiment analysis to analyze over 1000 videos and metrics thereof from 6 social media STEM creators. Our data provide insights into how audiences generate interest signals(likes, bookmarks, comment… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: 17 pages, 3 figures, 3 supplemental figures

  3. arXiv:2404.15132  [pdf, other

    cs.DC

    Black Hole Search by a Set of Scattered Agents in Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro

    Abstract: In this paper we investigate the problem of searching for a black hole in a dynamic graph by a set of scattered agents (i.e., the agents start from arbitrary locations of the graph). The black hole is a node that silently destroys any agent visiting it. This kind of malicious node nicely models network failures such as a crashed host or a virus that erases the visiting agents. The black hole searc… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2005.07453

  4. Multi-Scenario Empirical Assessment of Agile Governance Theory: A Technical Report

    Authors: Alexandre J. H. de O. Luna, Marcelo L. M. Marinho

    Abstract: Context: Agile Governance Theory (AGT) has emerged as a potential model for organizational chains of responsibility across business units and teams. Objective: This study aims to assess how AGT is reflected in practice. Method: AGT was operationalized down into 16 testable hypotheses. All hypotheses were tested by arranging eight theoretical scenarios with 118 practitioners from 86 organizations a… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Comments: The full paper, "Agile governance theory: a multi-scenario empirical assessment", derived from this Technical Report, is published in the Revista Observatorio de La Economia Latinoamericana, ISSN 1696-8352. DOI: https://doi.org/10.55905/oelv21n6-135

    Journal ref: Observatorio de la Economia Latinoamericana, 21(6), 5767 5800 (2023)

  5. arXiv:2303.11143  [pdf, other

    cs.CR cs.LG

    Adversarial Attacks against Binary Similarity Systems

    Authors: Gianluca Capozzi, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: In recent years, binary analysis gained traction as a fundamental approach to inspect software and guarantee its security. Due to the exponential increase of devices running software, much research is now moving towards new autonomous solutions based on deep learning models, as they have been showing state-of-the-art performances in solving binary analysis problems. One of the hot topics in this c… ▽ More

    Submitted 3 November, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  6. arXiv:2301.07849  [pdf, other

    cs.DC cs.DM

    Efficient Computation in Congested Anonymous Dynamic Networks

    Authors: Giuseppe A. Di Luna, Giovanni Viglietta

    Abstract: An anonymous dynamic network is a network of indistinguishable processes whose communication links may appear or disappear unpredictably over time. Previous research has shown that deterministically computing an arbitrary function of a multiset of input values given to these processes takes only a linear number of communication rounds (Di Luna-Viglietta, FOCS 2022). However, fast algorithms for… ▽ More

    Submitted 29 June, 2024; v1 submitted 18 January, 2023; originally announced January 2023.

    Comments: 26 pages, 2 figures

  7. arXiv:2211.09568  [pdf, other

    cs.PL cs.SE

    Where Did My Variable Go? Poking Holes in Incomplete Debug Information

    Authors: Cristian Assaiante, Daniele Cono D'Elia, Giuseppe Antonio Di Luna, Leonardo Querzoni

    Abstract: The availability of debug information for optimized executables can largely ease crucial tasks such as crash analysis. Source-level debuggers use this information to display program state in terms of source code, allowing users to reason on it even when optimizations alter program structure extensively. A few recent endeavors have proposed effective methodologies for identifying incorrect instance… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: Full online version (includes an Appendix not in the ASPLOS proceedings)

    Journal ref: Proceedings of ASPLOS 2023 - 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems

  8. arXiv:2208.06692  [pdf, other

    cs.CR cs.LG

    BinBert: Binary Code Understanding with a Fine-tunable and Execution-aware Transformer

    Authors: Fiorella Artuso, Marco Mormando, Giuseppe A. Di Luna, Leonardo Querzoni

    Abstract: A recent trend in binary code analysis promotes the use of neural solutions based on instruction embedding models. An instruction embedding model is a neural network that transforms sequences of assembly instructions into embedding vectors. If the embedding network is trained such that the translation from code to vectors partially preserves the semantic, the network effectively represents an asse… ▽ More

    Submitted 13 August, 2022; originally announced August 2022.

  9. arXiv:2207.08061  [pdf, other

    cs.DC cs.DM

    Optimal Computation in Anonymous Dynamic Networks

    Authors: Giuseppe A. Di Luna, Giovanni Viglietta

    Abstract: We give a simple characterization of which functions can be computed deterministically by anonymous processes in dynamic networks, depending on the number of leaders in the network. In addition, we provide efficient distributed algorithms for computing all such functions assuming minimal or no knowledge about the network. Each of our algorithms comes in two versions: one that terminates with the c… ▽ More

    Submitted 5 April, 2024; v1 submitted 16 July, 2022; originally announced July 2022.

    Comments: 50 pages, 10 figures

  10. arXiv:2206.01862  [pdf, other

    eess.IV cs.CV

    Image Data collection and implementation of deep learning-based model in detecting Monkeypox disease using modified VGG16

    Authors: Md Manjurul Ahsan, Muhammad Ramiz Uddin, Mithila Farjana, Ahmed Nazmus Sakib, Khondhaker Al Momin, Shahana Akter Luna

    Abstract: While the world is still attempting to recover from the damage caused by the broad spread of COVID-19, the Monkeypox virus poses a new threat of becoming a global pandemic. Although the Monkeypox virus itself is not deadly and contagious as COVID-19, still every day, new patients case has been reported from many nations. Therefore, it will be no surprise if the world ever faces another global pand… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  11. arXiv:2206.01774  [pdf, other

    eess.IV cs.CV

    Monkeypox Image Data collection

    Authors: Md Manjurul Ahsan, Muhammad Ramiz Uddin, Shahana Akter Luna

    Abstract: This paper explains the initial Monkeypox Open image data collection procedure. It was created by assembling images collected from websites, newspapers, and online portals and currently contains around 1905 images after data augmentation.

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: This is the attempt of creating monkeypox image dataset collected from various sources and it will continue to update by collectiong samples from journals and other public access domains

  12. arXiv:2204.02128  [pdf, other

    cs.DC cs.DM cs.DS

    Computing in Anonymous Dynamic Networks Is Linear

    Authors: Giuseppe A. Di Luna, Giovanni Viglietta

    Abstract: We give the first linear-time counting algorithm for processes in anonymous 1-interval-connected dynamic networks with a leader. As a byproduct, we are able to compute in $3n$ rounds every function that is deterministically computable in such networks. If explicit termination is not required, the running time improves to $2n$ rounds, which we show to be optimal up to a small additive constant (thi… ▽ More

    Submitted 20 February, 2024; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: 34 pages, 8 figures

  13. 3D Reconstruction and Alignment by Consumer RGB-D Sensors and Fiducial Planar Markers for Patient Positioning in Radiation Therapy

    Authors: Hamid Sarmadi, Rafael Muñoz-Salinas, M. Álvaro Berbís, Antonio Luna, Rafael Medina-Carnicer

    Abstract: BACKGROUND AND OBJECTIVE: Patient positioning is a crucial step in radiation therapy, for which non-invasive methods have been developed based on surface reconstruction using optical 3D imaging. However, most solutions need expensive specialized hardware and a careful calibration procedure that must be repeated over time.This paper proposes a fast and cheap patient positioning method based on inex… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

    Comments: 11 pages, 5 figures

  14. arXiv:2103.02961  [pdf, other

    eess.IV cs.CV stat.ML

    Probabilistic combination of eigenlungs-based classifiers for COVID-19 diagnosis in chest CT images

    Authors: Juan E. Arco, Andrés Ortiz, Javier Ramírez, Francisco J. Martínez-Murcia, Yu-Dong Zhang, Jordi Broncano, M. Álvaro Berbís, Javier Royuela-del-Val, Antonio Luna, Juan M. Górriz

    Abstract: The outbreak of the COVID-19 (Coronavirus disease 2019) pandemic has changed the world. According to the World Health Organization (WHO), there have been more than 100 million confirmed cases of COVID-19, including more than 2.4 million deaths. It is extremely important the early detection of the disease, and the use of medical imaging such as chest X-ray (CXR) and chest Computed Tomography (CCT)… ▽ More

    Submitted 26 September, 2022; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: 15 pages, 9 figures

  15. arXiv:2011.13994  [pdf, other

    cs.SE

    Who is Debugging the Debuggers? Exposing Debug Information Bugs in Optimized Binaries

    Authors: Giuseppe Antonio Di Luna, Davide Italiano, Luca Massarelli, Sebastian Osterlund, Cristiano Giuffrida, Leonardo Querzoni

    Abstract: Despite the advancements in software testing, bugs still plague deployed software and result in crashes in production. When debugging issues -- sometimes caused by "heisenbugs" -- there is the need to interpret core dumps and reproduce the issue offline on the same binary deployed. This requires the entire toolchain (compiler, linker, debugger) to correctly generate and use debug information. Litt… ▽ More

    Submitted 4 December, 2020; v1 submitted 27 November, 2020; originally announced November 2020.

  16. Joint Scene and Object Tracking for Cost-Effective Augmented Reality Assisted Patient Positioning in Radiation Therapy

    Authors: Hamid Sarmadi, Rafael Muñoz-Salinas, M. Álvaro Berbís, Antonio Luna, R. Medina-Carnicer

    Abstract: BACKGROUND AND OBJECTIVE: The research done in the field of Augmented Reality (AR) for patient positioning in radiation therapy is scarce. We propose an efficient and cost-effective algorithm for tracking the scene and the patient to interactively assist the patient's positioning process by providing visual feedback to the operator. Up to our knowledge, this is the first framework that can be empl… ▽ More

    Submitted 11 January, 2021; v1 submitted 5 October, 2020; originally announced October 2020.

    Comments: 16 pages, 7 figures

  17. arXiv:2007.07171  [pdf, other

    cs.CV cs.LG eess.IV

    Towards Dense People Detection with Deep Learning and Depth images

    Authors: David Fuentes-Jimenez, Cristina Losada-Gutierrez, David Casillas-Perez, Javier Macias-Guarasa, Roberto Martin-Lopez, Daniel Pizarro, Carlos A. Luna

    Abstract: This paper proposes a DNN-based system that detects multiple people from a single depth image. Our neural network processes a depth image and outputs a likelihood map in image coordinates, where each detection corresponds to a Gaussian-shaped local distribution, centered at the person's head. The likelihood map encodes both the number of detected people and their 2D image positions, and can be use… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

  18. DPDnet: A Robust People Detector using Deep Learning with an Overhead Depth Camera

    Authors: David Fuentes-Jimenez, Roberto Martin-Lopez, Cristina Losada-Gutierrez, David Casillas-Perez, Javier Macias-Guarasa, Daniel Pizarro, Carlos A. Luna

    Abstract: In this paper we propose a method based on deep learning that detects multiple people from a single overhead depth image with high reliability. Our neural network, called DPDnet, is based on two fully-convolutional encoder-decoder neural blocks based on residual layers. The Main Block takes a depth image as input and generates a pixel-wise confidence map, where each detected person in the image is… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

  19. arXiv:2005.07917  [pdf, other

    cs.DC cs.CG cs.RO

    Gathering on a Circle with Limited Visibility by Anonymous Oblivious Robots

    Authors: Giuseppe A. Di Luna, Ryuhei Uehara, Giovanni Viglietta, Yukiko Yamauchi

    Abstract: A swarm of anonymous oblivious mobile robots, operating in deterministic Look-Compute-Move cycles, is confined within a circular track. All robots agree on the clockwise direction (chirality), they are activated by an adversarial semi-synchronous scheduler (SSYNCH), and an active robot always reaches the destination point it computes (rigidity). Robots have limited visibility: each robot can see o… ▽ More

    Submitted 28 September, 2023; v1 submitted 16 May, 2020; originally announced May 2020.

    Comments: 33 pages, 9 figures

  20. arXiv:2005.07453  [pdf, other

    cs.DC

    Tight Bounds for Black Hole Search in Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro

    Abstract: In this paper, we start the investigation of distributed computing by mobile agents in dangerous dynamic networks. The danger is posed by the presence in the network of a black hole BH, a harmful site that destroys all incoming agents without leaving any trace. The problem of determining the location of the black hole in a network, known as black hole search BHS, has been extensively studied in th… ▽ More

    Submitted 1 August, 2020; v1 submitted 15 May, 2020; originally announced May 2020.

  21. arXiv:2002.03384  [pdf, other

    cs.DC

    Mobile RAM and Shape Formation by Programmable Particles

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Yukiko Yamauchi

    Abstract: We investigate computational issues in the distributed model Amoebots of programmable matter. In this model, the computational entities, called particles, are anonymous finite-state machines that operate and move on an hexagonal tasselation of the plane. In this paper we show how a constant number of such weak particles can simulate a powerful Turing-complete entity that is able to move on the pla… ▽ More

    Submitted 29 May, 2020; v1 submitted 9 February, 2020; originally announced February 2020.

  22. arXiv:2001.02670  [pdf, other

    cs.DC

    Synchronous Byzantine Lattice Agreement in ${\cal O}(\log (f))$ Rounds

    Authors: Giuseppe Antonio Di Luna, Emmanuelle Anceaume, Silvia Bonomi, Leonardo Querzoni

    Abstract: In the Lattice Agreement (LA) problem, originally proposed by Attiya et al. \cite{Attiya:1995}, a set of processes has to decide on a chain of a lattice. More precisely, each correct process proposes an element $e$ of a certain join-semi lattice $L$ and it has to decide on a value that contains $e$. Moreover, any pair $p_i,p_j$ of correct processes has to decide two values $dec_i$ and $dec_j$ that… ▽ More

    Submitted 13 January, 2020; v1 submitted 8 January, 2020; originally announced January 2020.

  23. arXiv:1912.07946  [pdf, other

    cs.LG cs.CL stat.ML

    In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks

    Authors: Fiorella Artuso, Giuseppe Antonio Di Luna, Luca Massarelli, Leonardo Querzoni

    Abstract: In this paper we investigate the problem of automatically naming pieces of assembly code. Where by naming we mean assigning to an assembly function a string of words that would likely be assigned by a human reverse engineer. We formally and precisely define the framework in which our investigation takes place. That is we define the problem, we provide reasonable justifications for the choices that… ▽ More

    Submitted 4 February, 2021; v1 submitted 17 December, 2019; originally announced December 2019.

  24. arXiv:1911.05239  [pdf, other

    cs.DC cs.RO

    Oblivious Permutations on the Plane

    Authors: Shantanu Das, Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Masafumi Yamashita

    Abstract: We consider a distributed system of n identical mobile robots operating in the two dimensional Euclidian plane. As in the previous studies, we consider the robots to be anonymous, oblivious, dis-oriented, and without any communication capabilities, operating based on the Look-Compute-Move model where the next location of a robot depends only on its view of the current configuration. Even in this s… ▽ More

    Submitted 12 November, 2019; originally announced November 2019.

    Comments: This is the full version of the article with the same title published at OPODIS 2019

  25. arXiv:1910.05768  [pdf, other

    cs.DC

    Byzantine Generalized Lattice Agreement

    Authors: Giuseppe Antonio Di Luna, Emmanuelle Anceaume, Leonardo Querzoni

    Abstract: The paper investigates the Lattice Agreement (LA) problem in asynchronous systems. In LA each process proposes an element $e$ from a predetermined lattice, and has to decide on an element $e'$ of the lattice such that $e \leq e'$. Moreover, decisions of different processes have to be comparable (no two processes can decide two elements $e$ and $e'$ such that… ▽ More

    Submitted 13 February, 2020; v1 submitted 13 October, 2019; originally announced October 2019.

  26. arXiv:1811.05296  [pdf, other

    cs.CR cs.LG

    SAFE: Self-Attentive Function Embeddings for Binary Similarity

    Authors: Luca Massarelli, Giuseppe Antonio Di Luna, Fabio Petroni, Leonardo Querzoni, Roberto Baldoni

    Abstract: The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright disputes, malware analysis, vulnerability detection, etc., and thus have an immediate practical impact. Current solutions compare functions by first… ▽ More

    Submitted 19 December, 2019; v1 submitted 13 November, 2018; originally announced November 2018.

    Comments: Published in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) 2019

  27. arXiv:1810.09683  [pdf, other

    cs.LG cs.DC

    Unsupervised Features Extraction for Binary Similarity Using Graph Embedding Neural Networks

    Authors: Roberto Baldoni, Giuseppe Antonio Di Luna, Luca Massarelli, Fabio Petroni, Leonardo Querzoni

    Abstract: In this paper we consider the binary similarity problem that consists in determining if two binary functions are similar only considering their compiled form. This problem is know to be crucial in several application scenarios, such as copyright disputes, malware analysis, vulnerability detection, etc. The current state-of-the-art solutions in this field work by creating an embedding model that ma… ▽ More

    Submitted 13 November, 2018; v1 submitted 23 October, 2018; originally announced October 2018.

  28. arXiv:1810.02350  [pdf, ps, other

    cs.SE

    Global Software Development: Practices for Cultural Differences

    Authors: Marcelo Marinho, Alexandre Luna, Sarah Beecham

    Abstract: Drivers for globalization are significant where today's organizations look for cheaper and faster ways to develop software as well as ways to satisfy quality and investment requirements imposed by customers, shareholders, and governments. Given these needs, Global Software Development (GSD) has become a "normal" way of doing business. Working in GSD often require teams of different cultures to wor… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

    Comments: This is the author-created version of the work accepted at the 19th International Conference on Product-Focused Software Process Improvement 2018 (PROFES 2018). A link to the final authenticated version will be added when it is available

  29. arXiv:1808.04349  [pdf, other

    cs.DC

    Patrolling on Dynamic Ring Networks

    Authors: Shantanu Das, Giuseppe Antonio Di Luna, Leszek A. Gasieniec

    Abstract: We study the problem of patrolling the nodes of a network collaboratively by a team of mobile agents, such that each node of the network is visited by at least one agent once in every $I(n)$ time units, with the objective of minimizing the idle time $I(n)$. While patrolling has been studied previously for static networks, we investigate the problem on dynamic networks with a fixed set of nodes, bu… ▽ More

    Submitted 13 August, 2018; originally announced August 2018.

  30. arXiv:1709.08800  [pdf, other

    cs.DC cs.CG cs.RO

    TuringMobile: A Turing Machine of Oblivious Mobile Robots with Limited Visibility and its Applications

    Authors: Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta

    Abstract: In this paper we investigate the computational power of a set of mobile robots with limited visibility. At each iteration, a robot takes a snapshot of its surroundings, uses the snapshot to compute a destination point, and it moves toward its destination. Each robot is punctiform and memoryless, it operates in $\mathbb{R}^m$, it has a local reference system independent of the other robots' ones, a… ▽ More

    Submitted 6 August, 2018; v1 submitted 25 September, 2017; originally announced September 2017.

    Comments: 27 pages, 9 figures

  31. arXiv:1705.03538  [pdf, other

    cs.DC cs.RO

    Shape Formation by Programmable Particles

    Authors: Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Yukiko Yamauchi

    Abstract: Shape formation is a basic distributed problem for systems of computational mobile entities. Intensively studied for systems of autonomous mobile robots, it has recently been investigated in the realm of programmable matter. Namely, it has been studied in the geometric Amoebot model, where the anonymous entities, called particles, operate on a hexagonal tessellation of the plane and have limited c… ▽ More

    Submitted 9 September, 2017; v1 submitted 9 May, 2017; originally announced May 2017.

    Comments: 71 pages, 9 figures

  32. arXiv:1705.00324  [pdf, other

    cs.DC cs.CG cs.RO

    Meeting in a Polygon by Anonymous Oblivious Robots

    Authors: Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, Masafumi Yamashita

    Abstract: The Meeting problem for $k\geq 2$ searchers in a polygon $P$ (possibly with holes) consists in making the searchers move within $P$, according to a distributed algorithm, in such a way that at least two of them eventually come to see each other, regardless of their initial positions. The polygon is initially unknown to the searchers, and its edges obstruct both movement and vision. Depending on th… ▽ More

    Submitted 6 July, 2019; v1 submitted 30 April, 2017; originally announced May 2017.

    Comments: 37 pages, 9 figures

  33. arXiv:1704.02427  [pdf, other

    cs.DC

    Gathering in Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Linda Pagli, Giuseppe Prencipe, Nicola Santoro, Giovanni Viglietta

    Abstract: The gathering problem requires a set of mobile agents, arbitrarily positioned at different nodes of a network to group within finite time at the same location, not fixed in advanced. The extensive existing literature on this problem shares the same fundamental assumption: the topological structure does not change during the rendezvous or the gathering; this is true also for those investigations… ▽ More

    Submitted 11 April, 2017; v1 submitted 7 April, 2017; originally announced April 2017.

  34. arXiv:1611.06864  [pdf, other

    cs.DC

    Population Protocols with Faulty Interactions: the Impact of a Leader

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta

    Abstract: We consider the problem of simulating traditional population protocols under weaker models of communication, which include one-way interactions (as opposed to two-way interactions) and omission faults (i.e., failure by an agent to read its partner's state during an interaction), which in turn may be detectable or undetectable. We focus on the impact of a leader, and we give a complete characteriza… ▽ More

    Submitted 21 November, 2016; originally announced November 2016.

  35. arXiv:1610.09435  [pdf, other

    cs.DC

    On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population Protocols

    Authors: Giuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta

    Abstract: In this paper we investigate the computational power of Population Protocols (PP) under some unreliable and/or weaker interaction models. More precisely, we focus on two features related to the power of interactions: omission failures and one-way communications. An omission failure, a notion that this paper introduces for the first time in the context of PP, is the loss by one or both parties of t… ▽ More

    Submitted 1 November, 2016; v1 submitted 28 October, 2016; originally announced October 2016.

  36. arXiv:1512.05306  [pdf, other

    cs.DC

    Live Exploration of Dynamic Rings

    Authors: Giuseppe Antonio Di Luna, Stefan Dobrev, Paola Flocchini, Nicola Santoro

    Abstract: In the graph exploration problem, a team of mobile computational entities, called agents, arbitrarily positioned at some nodes of a graph, must cooperate so that each node is eventually visited by at least one agent. In the literature, the main focus has been on graphs that are static; that is, the topology is either invariant in time or subject to localized changes. The few studies on exploration… ▽ More

    Submitted 18 May, 2018; v1 submitted 16 December, 2015; originally announced December 2015.

  37. arXiv:1505.06701  [pdf

    cs.SE

    Agile Governance Theory: conceptual development

    Authors: Alexandre J. H. de O. Luna, Philippe Kruchten, Hermano P. de Moura

    Abstract: Context: Competitiveness is the key to a sustainable development and it demands agility at the business and organizational levels, which in turn requires a flexible and customizable IT environment and effective and responsive governance in order to deliver value to the business. Objective: This paper describes the conceptual development of a theory for analyze and describe agile governance in orde… ▽ More

    Submitted 25 May, 2015; originally announced May 2015.

    Comments: Conference Proceedings of 12th International Conference on Management of Technology and Information Systems, 22 pages, 8 figures. In 12th International Conference on Management of Technology and Information Systems. Sao Paulo: FEA-USP

    Report number: 2423-14033-1-PB, FEA-USP, Sao Paulo, SP, Brazil ACM Class: K.6; K.6.1; K.6.4; D.2; D.2.9

  38. arXiv:1505.03509  [pdf, other

    cs.DC

    Investigating the Cost of Anonymity on Dynamic Networks

    Authors: Giuseppe Antonio Di Luna, Roberto Baldoni

    Abstract: In this paper we study the difficulty of counting nodes in a synchronous dynamic network where nodes share the same identifier, they communicate by using a broadcast with unlimited bandwidth and, at each synchronous round, network topology may change. To count in such setting, it has been shown that the presence of a leader is necessary. We focus on a particularly interesting subset of dynamic net… ▽ More

    Submitted 13 May, 2015; originally announced May 2015.

  39. arXiv:1503.04347  [pdf, other

    cs.DC cs.CG cs.RO

    Mutual Visibility by Luminous Robots Without Collisions

    Authors: G. A. Di Luna, P. Flocchini, S. Gan Chaudhuri, F. Poloni, N. Santoro, G. Viglietta

    Abstract: Consider a finite set of identical computational entities that can move freely in the Euclidean plane operating in Look-Compute-Move cycles. Let p(t) denote the location of entity p at time t; entity p can see entity q at time t if at that time no other entity lies in the line segment p(t)q(t). We consider the basic problem called Mutual Visibility: starting from arbitrary distinct locations, with… ▽ More

    Submitted 1 July, 2015; v1 submitted 14 March, 2015; originally announced March 2015.

    Comments: 60 pages, 15 figures

  40. Agile governance in Information and Communication Technologies: shifting paradigms

    Authors: Alexandre J. H. de O. Luna, Cleyverson P. Costa, Hermano P. de Moura, Magdala A. Novaes, Cesar A. D. C. do Nascimento

    Abstract: This paper presents the basis of the Agile Governance in Information and Communication Technology (ICT), which is based on Agile Software Engineering Methodologies principles and values. Its development was done through a systematic review process, supported by Bibliometrics and Scientometrics methods and techniques, where the Critical Success Factors (CSF) of ICT Governance projects and the princ… ▽ More

    Submitted 10 November, 2014; originally announced November 2014.

    Comments: Journal of Information Systems and Technology Management (JISTEM), Vol 7, No 2, August 2010

    ACM Class: K.6; K.6.1; K.6.4; D.2; D.2.9

  41. State of the Art of Agile Governance: A Systematic Review

    Authors: Alexandre J. H. de O. Luna, Philippe Kruchten, Marcello L. G. do E. Pedrosa, Humberto R. de Almeida Neto, Hermano P. de Moura

    Abstract: Context: Agility at the business level requires Information Technology (IT) environment flexible and customizable, as well as effective and responsive governance in order to deliver value faster, better, and cheaper to the business. Objective: To understand better this context, our paper seeks to investigate how the domain of agile governance has evolved, as well as to derive implications for rese… ▽ More

    Submitted 7 November, 2014; originally announced November 2014.

    Comments: International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 5, October 2014 20 pages, 8 Figures, 7 Tables

    ACM Class: K.6; K.6.1; K.6.4; D.2; D.2.9

  42. arXiv:1407.2073  [pdf

    cs.CE q-bio.QM

    MIMTool: A Tool for Drawing Molecular Interaction Maps

    Authors: Mine Edes, Can Özturan, Türkan Haliloğlu, Augustin Luna, Ruth Nussinov

    Abstract: Background: To understand protein function, it is important to study protein- protein interaction networks. These networks can be represented in network diagrams called protein interaction maps that can lead to better understanding by visualization. We address the problem of drawing of protein interactions in Kohn's Molecular Interaction Map (MIM) notation. Even though there are some existing tool… ▽ More

    Submitted 8 July, 2014; originally announced July 2014.

    Comments: BioVis 2014 conference

  43. arXiv:1405.2430  [pdf, other

    cs.DC cs.RO

    Robots with Lights: Overcoming Obstructed Visibility Without Colliding

    Authors: G. A. Di Luna, P. Flocchini, S. Gan Chaudhuri, N. Santoro, G. Viglietta

    Abstract: Robots with lights is a model of autonomous mobile computational entities operating in the plane in Look-Compute-Move cycles: each agent has an externally visible light which can assume colors from a fixed set; the lights are persistent (i.e., the color is not erased at the end of a cycle), but otherwise the agents are oblivious. The investigation of computability in this model, initially suggeste… ▽ More

    Submitted 10 May, 2014; originally announced May 2014.

  44. A decision support system for ship identification based on the curvature scale space representation

    Authors: Alvaro Enriquez de Luna, Carlos Miravet, Deitze Otaduy, Carlos Dorronsoro

    Abstract: In this paper, a decision support system for ship identification is presented. The system receives as input a silhouette of the vessel to be identified, previously extracted from a side view of the object. This view could have been acquired with imaging sensors operating at different spectral ranges (CCD, FLIR, image intensifier). The input silhouette is preprocessed and compared to those stored… ▽ More

    Submitted 11 October, 2005; originally announced October 2005.

    Comments: 12 pages, 18 figures, 1 table, SPIE 5988 Electro-Optical Remote Sensing 2005