Skip to main content

Showing 1–6 of 6 results for author: Marotta, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.14213  [pdf, other

    cs.IT math.GR

    On abelian and cyclic group codes

    Authors: Angelo Marotta

    Abstract: We determine a condition on the minimum Hamming weight of some special abelian group codes and, as a consequence of this result, we establish that any such code is, up to permutational equivalence, a subspace of the direct sum of $s$ copies of the repetition code of length $t$, for some suitable positive integers $s$ and $t$. Moreover, we provide a complete characterisation of permutation automorp… ▽ More

    Submitted 28 September, 2022; originally announced September 2022.

    Comments: 14 pages

  2. arXiv:2204.10655  [pdf, other

    cs.DB

    Use of Context in Data Quality Management: a Systematic Literature Review

    Authors: Flavia Serra, Veronika Peralta, Adriana Marotta, Patrick Marcel

    Abstract: The importance of context in data quality (DQ) was shown many years ago and nowadays is widely accepted. Early approaches and surveys defined DQ as \textit{fitness for use} and showed the influence of context on DQ. This paper presents a Systematic Literature Review (SLR) for investigating how context is taken into account in recent proposals for DQ management. We specifically present the planning… ▽ More

    Submitted 22 April, 2022; originally announced April 2022.

  3. arXiv:2109.11224  [pdf, other

    cs.CR cs.NI

    A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection

    Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta

    Abstract: Network intrusion detection systems (NIDS) are one of many solutions that make up a computer security system. Several machine learning-based NIDS have been proposed in recent years, but most of them were developed and evaluated under the assumption that the training context is similar to the test context. In real networks, this assumption is false, given the emergence of new attacks and variants o… ▽ More

    Submitted 26 April, 2022; v1 submitted 23 September, 2021; originally announced September 2021.

  4. arXiv:2010.07759  [pdf, other

    cs.RO

    alurity, a toolbox for robot cybersecurity

    Authors: Víctor Mayoral-Vilches, Irati Abad-Fernández, Martin Pinzger, Stefan Rass, Bernhard Dieber, Alcino Cunha, Francisco J. Rodríguez-Lera, Giovanni Lacava, Angelica Marotta, Fabio Martinelli, Endika Gil-Uriarte

    Abstract: The reuse of technologies and inherent complexity of most robotic systems is increasingly leading to robots with wide attack surfaces and a variety of potential vulnerabilities. Given their growing presence in public environments, security research is increasingly becoming more important than in any other area, specially due to the safety implications that robot vulnerabilities could cause on huma… ▽ More

    Submitted 16 October, 2020; v1 submitted 15 October, 2020; originally announced October 2020.

  5. arXiv:1911.00766  [pdf, other

    cs.NI

    Automating Ethernet VPN Deployment in SDN-based Data Centers

    Authors: Kyoomars Alizadeh Noghani, Cristian Hernandez Benet, Andreas Kassler, Antonio Marotta, Patrick Jestin, Vivek V. Srivastava

    Abstract: Layer 2 Virtual Private Network (L2VPN) is widely deployed in both service provider networks and enterprises. However, legacy L2VPN solutions have scalability limitations in the context of Data Center (DC) interconnection and networking which require new approaches that address the requirements of service providers for virtual private cloud services. Recently, Ethernet VPN (EVPN) has been proposed… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

    Comments: 6 pages

  6. Power-Efficient Resource Allocation in C-RANs with SINR Constraints and Deadlines

    Authors: Salvatore D'Oro, Marcelo Antonio Marotta, Cristiano Bonato Both, Luiz DaSilva, Sergio Palazzo

    Abstract: In this paper, we address the problem of power-efficient resource management in Cloud Radio Access Networks (C-RANs). Specifically, we consider the case where Remote Radio Heads (RRHs) perform data transmission, and signal processing is executed in a virtually centralized Base-Band Units (BBUs) pool. Users request to transmit at different time instants; they demand minimum signal-to-noise-plus-i… ▽ More

    Submitted 24 April, 2019; originally announced April 2019.

    Journal ref: IEEE Transactions on Vehicular Technology 2019