Fausto Giunchiglia - Academia.edu (original) (raw)

Papers by Fausto Giunchiglia

Research paper thumbnail of Encoding Classifications into Lightweight

Classifications have been used for centuries with the goal of cataloguing and searching large set... more Classifications have been used for centuries with the goal of cataloguing and searching large sets of objects. In the early days it was mainly books; lately it has also become Web pages, pictures and any kind of electronic information items. Classifications describe their contents using natural language labels, which has proved very effective in manual classification. However natural language labels show their limitations when one tries to automate the process, as they make it very hard to reason about classifications and their contents. In this paper we introduce the novel notion of Formal Classification, as a graph structure where labels are written in a propositional concept language. Formal Classifications turn out to be some form of lightweight ontologies. This, in turn, allows us to reason about them, to associate to each node a normal form formula which univocally describes their contents, and to reduce document classification to reasoning about subsumption.

Research paper thumbnail of A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools

Lecture Notes in Computer Science, 1998

ABSTRACT Safety-critical systems are often designed using development support tools which perform... more ABSTRACT Safety-critical systems are often designed using development support tools which perform translations of high-level specifications into lower-level counterparts. The correctness of the translation is critical to the safety of the resulting systems. However, using non failure-safe components to implement translators is desirable because of the extremely high cost of certified components. In order to ensure the correct behavior of development tools, we adopt a solution based on the idea of verifying each of their executions. In order to perform the verification in an automatic and efficient way, we follow an innovative approach, by distinguishing an on-line and an on-line verification phases. Each proof in the two phases is guaranteed correct by designing the certifying tools according to a logging-and-checking architecture. We describe the on-line and on-line logging-and-checking methodology, its application in the frame of an industrial project, and the ongoing logging-and-checking redesign of a state-of-the-art prover which we intend to use in future applications.

Research paper thumbnail of Planning via model checking: A decision procedure for AR

Lecture Notes in Computer Science, 1997

In this paper we propose a new approach to planning based on a \high level action language", call... more In this paper we propose a new approach to planning based on a \high level action language", called AR, and \model checking". AR is an expressive formalism which is able to handle, among other things, rami cations and non-deterministic e ects. We de ne a decision procedure for planning in AR which is based on \symbolic model checking", a technique which has been successfully applied in hardware and software veri cation. The decision procedure always terminates with an optimal solution or with failure if no solution exists. We have constructed a planner, called mbp, which implements the decision procedure.

Research paper thumbnail of Design of the Liquid Publications Integrated Platform

ABSTRACT This document presents the overall architecture of the Liquid Publication integrated pla... more ABSTRACT This document presents the overall architecture of the Liquid Publication integrated platform and describes all components in detail. In addition to that, it also describes LiquidPub applications. This final version not only introduces advances in the development of the platform but also a more mature understanding of the requirements and possibilities, explored in the LiquidPub applications covering the aspects of knowledge creation, dissemination and evaluation.

Research paper thumbnail of Encoding Classifications into Lightweight

Classifications have been used for centuries with the goal of cataloguing and searching large set... more Classifications have been used for centuries with the goal of cataloguing and searching large sets of objects. In the early days it was mainly books; lately it has also become Web pages, pictures and any kind of electronic information items. Classifications describe their contents using natural language labels, which has proved very effective in manual classification. However natural language labels show their limitations when one tries to automate the process, as they make it very hard to reason about classifications and their contents. In this paper we introduce the novel notion of Formal Classification, as a graph structure where labels are written in a propositional concept language. Formal Classifications turn out to be some form of lightweight ontologies. This, in turn, allows us to reason about them, to associate to each node a normal form formula which univocally describes their contents, and to reduce document classification to reasoning about subsumption.

Research paper thumbnail of Agent-Oriented Software

We are developing a methodology, called Tropos, for building agent-oriented software systems. The... more We are developing a methodology, called Tropos, for building agent-oriented software systems. The methodology covers five software development phases: early requirements analysis, late requirements analysis, architectural design, detailed design, and implementation. Throughout, the concepts offered by i* are used to model both the stakeholders in the system's environment, and the system itself. These concepts include actors, who can be (social) agents (organizational, human or software), positions or roles, goals, and social dependencies for defining the obligations of actors to other actors (called dependees and dependers respectively.) Dependencies may involve a goal, to be fulfilled by the dependee on behalf of the depender, a task to be carried out by the dependee, or a resource to be delivered. The paper presents a case study to illustrate the features and the strengths of the Tropos methodology.

Research paper thumbnail of A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools

Lecture Notes in Computer Science, 1998

ABSTRACT Safety-critical systems are often designed using development support tools which perform... more ABSTRACT Safety-critical systems are often designed using development support tools which perform translations of high-level specifications into lower-level counterparts. The correctness of the translation is critical to the safety of the resulting systems. However, using non failure-safe components to implement translators is desirable because of the extremely high cost of certified components. In order to ensure the correct behavior of development tools, we adopt a solution based on the idea of verifying each of their executions. In order to perform the verification in an automatic and efficient way, we follow an innovative approach, by distinguishing an on-line and an on-line verification phases. Each proof in the two phases is guaranteed correct by designing the certifying tools according to a logging-and-checking architecture. We describe the on-line and on-line logging-and-checking methodology, its application in the frame of an industrial project, and the ongoing logging-and-checking redesign of a state-of-the-art prover which we intend to use in future applications.

Research paper thumbnail of Planning via model checking: A decision procedure for AR

Lecture Notes in Computer Science, 1997

In this paper we propose a new approach to planning based on a \high level action language", call... more In this paper we propose a new approach to planning based on a \high level action language", called AR, and \model checking". AR is an expressive formalism which is able to handle, among other things, rami cations and non-deterministic e ects. We de ne a decision procedure for planning in AR which is based on \symbolic model checking", a technique which has been successfully applied in hardware and software veri cation. The decision procedure always terminates with an optimal solution or with failure if no solution exists. We have constructed a planner, called mbp, which implements the decision procedure.

Research paper thumbnail of Design of the Liquid Publications Integrated Platform

ABSTRACT This document presents the overall architecture of the Liquid Publication integrated pla... more ABSTRACT This document presents the overall architecture of the Liquid Publication integrated platform and describes all components in detail. In addition to that, it also describes LiquidPub applications. This final version not only introduces advances in the development of the platform but also a more mature understanding of the requirements and possibilities, explored in the LiquidPub applications covering the aspects of knowledge creation, dissemination and evaluation.

Research paper thumbnail of Event detection and scene attraction by very simple contextual cues

Proceedings of the 2011 joint ACM workshop on Modeling and representing events - J-MRE '11, 2011

We detect and arrange events in private photo archives by putting these photos into context. The ... more We detect and arrange events in private photo archives by putting these photos into context. The problem is seen as a fully automated mining in one's personal life and behavior. To this end, we build a contextual meaningful hierarchy of events based on personal photos. With the analysis of very simple cues of time, space and perceptual visual appearance we are refining and validating the event borders and their relation in an iterative way. Beginning with discriminating between routine and unusual events, we are able to robustly recognize the basic nature of an event. Further combination of the given cues efficiently gives a hierarchy of events that coincides with the given ground-truth at an F-measure of 0.83 for event detection and 0.70 for its hierarchical representation. We process the given task in a fully unsupervised and computationally inexpensive manner. Using standard clustering and machine learning techniques, sparse events in the collection would tend to be neglected by automated approaches. Opposed to these methods, the proposed approach is invariant to the distribution of the photo collection regarding the sparsity and denseness in time, space and visual appearance. This is improved by introducing a momentum of attraction measure for a meaningful representation of personal events.

Research paper thumbnail of A provably correct embedded verifier for the certification of safety critical software

Lecture Notes in Computer Science, 1997

VFRAME is one of ANSALDO's software driven vital architectures for safety critical products. This... more VFRAME is one of ANSALDO's software driven vital architectures for safety critical products. This paper describes a project whose result is the development of an "embedded verifier", i.e. a system integrated within VFRAME and able to certify the correctness of one of VFRAME components, a compiler. The embedded verifier satisfies two precise requirements. First, the compiler must be certified in a fully automatic and efficient way. Second, the embedded verifier must be itself certified, in a way which can be easily understood and validated by end users.

Research paper thumbnail of Social events and social ties

Proceedings of the 3rd ACM conference on International conference on multimedia retrieval - ICMR '13, 2013

This paper is based upon an approach for automatic detection of personal events in on-line person... more This paper is based upon an approach for automatic detection of personal events in on-line personal photo collections and proposes a powerful exploitation of these events: We compose social events out of personal events and then automatically reveal interpersonal ties. Trying to tame the stream of big data in social networks we solely rely on image meta-data of time and space. We validate our assumptions in the wild using 1.8 million public images of more than 4100 users. The proposed approach has three main steps: (i) personal event detection using individual, unsorted photo collections, in which we make use of the spatio-temporal context embedded in digital photos to detect event boundaries within the collection; (ii) social event detection for which we use a tailored similarity measurement between personal events of different users; and (iii) an analysis of event co-participation to propagate social connections. Experiments validate that the fully automated approach is able to accurately detect 78.76% of social events and reconstruct the interpersonal ties of a user with a verified true positive rate of 45%. This rate is probably much higher: Since most interpersonal ties are undefined in the universe of social networks, our experimental ground-truth of course remains fragmentary.

Research paper thumbnail of Modeling Early Requirements in Tropos: A Transformation Based Approach

Agent-Oriented Software Engineering II, 2002

We are developing an agent-oriented software development methodology, called Tropos, which integr... more We are developing an agent-oriented software development methodology, called Tropos, which integrates ideas from multi-agent system technologies and Requirements Engineering research. A distinguishing feature of Tropos is that it covers software development from early requirements analysis to detailed design, allowing for a deeper understanding of the operational environment of the new software system. This paper proposes a characterization of the process of early requirements analysis, defined in terms of transformation applications. Different categories of transformations are presented and illustrated by means of a running example. These transformations are then mapped onto a set of primitive transformations. The paper concludes with observations on the form and the role of the proposed transformations.

Research paper thumbnail of Tropos: An Agent-Oriented Software Development Methodology

Autonomous Agents and Multi-Agent Systems, 2004

Research paper thumbnail of Recognizing Hospital Care Activities with a Coat Pocket Worn Smartphone

Proceedings of the 6th International Conference on Mobile Computing, Applications and Services, 2014

In this work, we show how a smart-phone worn unobtrusively in a nurses coat pocket can be used to... more In this work, we show how a smart-phone worn unobtrusively in a nurses coat pocket can be used to document the patient care activities performed during a regular morning routine. The main contribution is to show how, taking into account certain domain specific boundary conditions, a single sensor node worn in such an (from the sensing point of view) unfavorable location can still recognize complex, sometimes subtle activities. We evaluate our approach in a large real life dataset from day to day hospital operation. In total, 4 runs of patient care per day were collected for 14 days at a geriatric ward and annotated in high detail by following the performing nurses for the entire duration. This amounts to over 800 hours of sensor data including acceleration, gyroscope, compass, wifi and sound annotated with groundtruth at less than 1min resolution.

Research paper thumbnail of NuSMV 2: An OpenSource Tool for Symbolic Model Checking

Computer Aided Verification, 2002

Research paper thumbnail of NuSMV: A New Symbolic Model Verifier

Computer Aided Verification, 1999

Research paper thumbnail of Personal photo indexing

Proceedings of the 20th ACM international conference on Multimedia - MM '12, 2012

Sorting one's own private photo collection is a time consuming and tedious task. We demonstrate o... more Sorting one's own private photo collection is a time consuming and tedious task. We demonstrate our event-centered approach to perform this task fully automatically. In the course of the demonstration, we either use our own photo collections, or invite the conference visitors to bring their own cameras and photos. We will sort the photos into a semantically meaningful hierarchy for the users within a couple of minutes. Events as a media aggregator allow a user to manage and annotate a photo collection in more convenient and natural to the human being way. Based on the recognized user behavior the application is able to reveal the nature of an event and build its hierarchy with a event/sub-event relationship. One important prerequisite of our approach is a precise GPS based spatial annotation of the photos. To accommodate for devices without GPS chips or temporary low GPS perception, we propose an approach to enrich the collection with automatically estimated GPS data by semantically interpolating possible routes of the user. We are positive that we can provide a well received service for the conference visitors, especially since the conference venue will trigger a lot of memorable photos. Large scale experimental validation showed that the approach is able to recreate a user's desired hierarchy with an F-measure of about 0.8.

Research paper thumbnail of Model Checking Safety Critical Software with SPIN: an Application to a Railway Interlocking System

Lecture Notes in Computer Science, 1998

Abstract. This paper describes an industrial application in formal verifica-tion. The analyzed sy... more Abstract. This paper describes an industrial application in formal verifica-tion. The analyzed system is the Safety Logic of an interlocking system for the control of railway stations developed by Ansaldo. The Safety Logic is a process-based software architecture, which can be ...

Research paper thumbnail of Nusmv version 2: an opensource tool for symbolic model checking

Research paper thumbnail of Encoding Classifications into Lightweight

Classifications have been used for centuries with the goal of cataloguing and searching large set... more Classifications have been used for centuries with the goal of cataloguing and searching large sets of objects. In the early days it was mainly books; lately it has also become Web pages, pictures and any kind of electronic information items. Classifications describe their contents using natural language labels, which has proved very effective in manual classification. However natural language labels show their limitations when one tries to automate the process, as they make it very hard to reason about classifications and their contents. In this paper we introduce the novel notion of Formal Classification, as a graph structure where labels are written in a propositional concept language. Formal Classifications turn out to be some form of lightweight ontologies. This, in turn, allows us to reason about them, to associate to each node a normal form formula which univocally describes their contents, and to reduce document classification to reasoning about subsumption.

Research paper thumbnail of A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools

Lecture Notes in Computer Science, 1998

ABSTRACT Safety-critical systems are often designed using development support tools which perform... more ABSTRACT Safety-critical systems are often designed using development support tools which perform translations of high-level specifications into lower-level counterparts. The correctness of the translation is critical to the safety of the resulting systems. However, using non failure-safe components to implement translators is desirable because of the extremely high cost of certified components. In order to ensure the correct behavior of development tools, we adopt a solution based on the idea of verifying each of their executions. In order to perform the verification in an automatic and efficient way, we follow an innovative approach, by distinguishing an on-line and an on-line verification phases. Each proof in the two phases is guaranteed correct by designing the certifying tools according to a logging-and-checking architecture. We describe the on-line and on-line logging-and-checking methodology, its application in the frame of an industrial project, and the ongoing logging-and-checking redesign of a state-of-the-art prover which we intend to use in future applications.

Research paper thumbnail of Planning via model checking: A decision procedure for AR

Lecture Notes in Computer Science, 1997

In this paper we propose a new approach to planning based on a \high level action language", call... more In this paper we propose a new approach to planning based on a \high level action language", called AR, and \model checking". AR is an expressive formalism which is able to handle, among other things, rami cations and non-deterministic e ects. We de ne a decision procedure for planning in AR which is based on \symbolic model checking", a technique which has been successfully applied in hardware and software veri cation. The decision procedure always terminates with an optimal solution or with failure if no solution exists. We have constructed a planner, called mbp, which implements the decision procedure.

Research paper thumbnail of Design of the Liquid Publications Integrated Platform

ABSTRACT This document presents the overall architecture of the Liquid Publication integrated pla... more ABSTRACT This document presents the overall architecture of the Liquid Publication integrated platform and describes all components in detail. In addition to that, it also describes LiquidPub applications. This final version not only introduces advances in the development of the platform but also a more mature understanding of the requirements and possibilities, explored in the LiquidPub applications covering the aspects of knowledge creation, dissemination and evaluation.

Research paper thumbnail of Encoding Classifications into Lightweight

Classifications have been used for centuries with the goal of cataloguing and searching large set... more Classifications have been used for centuries with the goal of cataloguing and searching large sets of objects. In the early days it was mainly books; lately it has also become Web pages, pictures and any kind of electronic information items. Classifications describe their contents using natural language labels, which has proved very effective in manual classification. However natural language labels show their limitations when one tries to automate the process, as they make it very hard to reason about classifications and their contents. In this paper we introduce the novel notion of Formal Classification, as a graph structure where labels are written in a propositional concept language. Formal Classifications turn out to be some form of lightweight ontologies. This, in turn, allows us to reason about them, to associate to each node a normal form formula which univocally describes their contents, and to reduce document classification to reasoning about subsumption.

Research paper thumbnail of Agent-Oriented Software

We are developing a methodology, called Tropos, for building agent-oriented software systems. The... more We are developing a methodology, called Tropos, for building agent-oriented software systems. The methodology covers five software development phases: early requirements analysis, late requirements analysis, architectural design, detailed design, and implementation. Throughout, the concepts offered by i* are used to model both the stakeholders in the system's environment, and the system itself. These concepts include actors, who can be (social) agents (organizational, human or software), positions or roles, goals, and social dependencies for defining the obligations of actors to other actors (called dependees and dependers respectively.) Dependencies may involve a goal, to be fulfilled by the dependee on behalf of the depender, a task to be carried out by the dependee, or a resource to be delivered. The paper presents a case study to illustrate the features and the strengths of the Tropos methodology.

Research paper thumbnail of A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools

Lecture Notes in Computer Science, 1998

ABSTRACT Safety-critical systems are often designed using development support tools which perform... more ABSTRACT Safety-critical systems are often designed using development support tools which perform translations of high-level specifications into lower-level counterparts. The correctness of the translation is critical to the safety of the resulting systems. However, using non failure-safe components to implement translators is desirable because of the extremely high cost of certified components. In order to ensure the correct behavior of development tools, we adopt a solution based on the idea of verifying each of their executions. In order to perform the verification in an automatic and efficient way, we follow an innovative approach, by distinguishing an on-line and an on-line verification phases. Each proof in the two phases is guaranteed correct by designing the certifying tools according to a logging-and-checking architecture. We describe the on-line and on-line logging-and-checking methodology, its application in the frame of an industrial project, and the ongoing logging-and-checking redesign of a state-of-the-art prover which we intend to use in future applications.

Research paper thumbnail of Planning via model checking: A decision procedure for AR

Lecture Notes in Computer Science, 1997

In this paper we propose a new approach to planning based on a \high level action language", call... more In this paper we propose a new approach to planning based on a \high level action language", called AR, and \model checking". AR is an expressive formalism which is able to handle, among other things, rami cations and non-deterministic e ects. We de ne a decision procedure for planning in AR which is based on \symbolic model checking", a technique which has been successfully applied in hardware and software veri cation. The decision procedure always terminates with an optimal solution or with failure if no solution exists. We have constructed a planner, called mbp, which implements the decision procedure.

Research paper thumbnail of Design of the Liquid Publications Integrated Platform

ABSTRACT This document presents the overall architecture of the Liquid Publication integrated pla... more ABSTRACT This document presents the overall architecture of the Liquid Publication integrated platform and describes all components in detail. In addition to that, it also describes LiquidPub applications. This final version not only introduces advances in the development of the platform but also a more mature understanding of the requirements and possibilities, explored in the LiquidPub applications covering the aspects of knowledge creation, dissemination and evaluation.

Research paper thumbnail of Event detection and scene attraction by very simple contextual cues

Proceedings of the 2011 joint ACM workshop on Modeling and representing events - J-MRE '11, 2011

We detect and arrange events in private photo archives by putting these photos into context. The ... more We detect and arrange events in private photo archives by putting these photos into context. The problem is seen as a fully automated mining in one's personal life and behavior. To this end, we build a contextual meaningful hierarchy of events based on personal photos. With the analysis of very simple cues of time, space and perceptual visual appearance we are refining and validating the event borders and their relation in an iterative way. Beginning with discriminating between routine and unusual events, we are able to robustly recognize the basic nature of an event. Further combination of the given cues efficiently gives a hierarchy of events that coincides with the given ground-truth at an F-measure of 0.83 for event detection and 0.70 for its hierarchical representation. We process the given task in a fully unsupervised and computationally inexpensive manner. Using standard clustering and machine learning techniques, sparse events in the collection would tend to be neglected by automated approaches. Opposed to these methods, the proposed approach is invariant to the distribution of the photo collection regarding the sparsity and denseness in time, space and visual appearance. This is improved by introducing a momentum of attraction measure for a meaningful representation of personal events.

Research paper thumbnail of A provably correct embedded verifier for the certification of safety critical software

Lecture Notes in Computer Science, 1997

VFRAME is one of ANSALDO's software driven vital architectures for safety critical products. This... more VFRAME is one of ANSALDO's software driven vital architectures for safety critical products. This paper describes a project whose result is the development of an "embedded verifier", i.e. a system integrated within VFRAME and able to certify the correctness of one of VFRAME components, a compiler. The embedded verifier satisfies two precise requirements. First, the compiler must be certified in a fully automatic and efficient way. Second, the embedded verifier must be itself certified, in a way which can be easily understood and validated by end users.

Research paper thumbnail of Social events and social ties

Proceedings of the 3rd ACM conference on International conference on multimedia retrieval - ICMR '13, 2013

This paper is based upon an approach for automatic detection of personal events in on-line person... more This paper is based upon an approach for automatic detection of personal events in on-line personal photo collections and proposes a powerful exploitation of these events: We compose social events out of personal events and then automatically reveal interpersonal ties. Trying to tame the stream of big data in social networks we solely rely on image meta-data of time and space. We validate our assumptions in the wild using 1.8 million public images of more than 4100 users. The proposed approach has three main steps: (i) personal event detection using individual, unsorted photo collections, in which we make use of the spatio-temporal context embedded in digital photos to detect event boundaries within the collection; (ii) social event detection for which we use a tailored similarity measurement between personal events of different users; and (iii) an analysis of event co-participation to propagate social connections. Experiments validate that the fully automated approach is able to accurately detect 78.76% of social events and reconstruct the interpersonal ties of a user with a verified true positive rate of 45%. This rate is probably much higher: Since most interpersonal ties are undefined in the universe of social networks, our experimental ground-truth of course remains fragmentary.

Research paper thumbnail of Modeling Early Requirements in Tropos: A Transformation Based Approach

Agent-Oriented Software Engineering II, 2002

We are developing an agent-oriented software development methodology, called Tropos, which integr... more We are developing an agent-oriented software development methodology, called Tropos, which integrates ideas from multi-agent system technologies and Requirements Engineering research. A distinguishing feature of Tropos is that it covers software development from early requirements analysis to detailed design, allowing for a deeper understanding of the operational environment of the new software system. This paper proposes a characterization of the process of early requirements analysis, defined in terms of transformation applications. Different categories of transformations are presented and illustrated by means of a running example. These transformations are then mapped onto a set of primitive transformations. The paper concludes with observations on the form and the role of the proposed transformations.

Research paper thumbnail of Tropos: An Agent-Oriented Software Development Methodology

Autonomous Agents and Multi-Agent Systems, 2004

Research paper thumbnail of Recognizing Hospital Care Activities with a Coat Pocket Worn Smartphone

Proceedings of the 6th International Conference on Mobile Computing, Applications and Services, 2014

In this work, we show how a smart-phone worn unobtrusively in a nurses coat pocket can be used to... more In this work, we show how a smart-phone worn unobtrusively in a nurses coat pocket can be used to document the patient care activities performed during a regular morning routine. The main contribution is to show how, taking into account certain domain specific boundary conditions, a single sensor node worn in such an (from the sensing point of view) unfavorable location can still recognize complex, sometimes subtle activities. We evaluate our approach in a large real life dataset from day to day hospital operation. In total, 4 runs of patient care per day were collected for 14 days at a geriatric ward and annotated in high detail by following the performing nurses for the entire duration. This amounts to over 800 hours of sensor data including acceleration, gyroscope, compass, wifi and sound annotated with groundtruth at less than 1min resolution.

Research paper thumbnail of NuSMV 2: An OpenSource Tool for Symbolic Model Checking

Computer Aided Verification, 2002

Research paper thumbnail of NuSMV: A New Symbolic Model Verifier

Computer Aided Verification, 1999

Research paper thumbnail of Personal photo indexing

Proceedings of the 20th ACM international conference on Multimedia - MM '12, 2012

Sorting one's own private photo collection is a time consuming and tedious task. We demonstrate o... more Sorting one's own private photo collection is a time consuming and tedious task. We demonstrate our event-centered approach to perform this task fully automatically. In the course of the demonstration, we either use our own photo collections, or invite the conference visitors to bring their own cameras and photos. We will sort the photos into a semantically meaningful hierarchy for the users within a couple of minutes. Events as a media aggregator allow a user to manage and annotate a photo collection in more convenient and natural to the human being way. Based on the recognized user behavior the application is able to reveal the nature of an event and build its hierarchy with a event/sub-event relationship. One important prerequisite of our approach is a precise GPS based spatial annotation of the photos. To accommodate for devices without GPS chips or temporary low GPS perception, we propose an approach to enrich the collection with automatically estimated GPS data by semantically interpolating possible routes of the user. We are positive that we can provide a well received service for the conference visitors, especially since the conference venue will trigger a lot of memorable photos. Large scale experimental validation showed that the approach is able to recreate a user's desired hierarchy with an F-measure of about 0.8.

Research paper thumbnail of Model Checking Safety Critical Software with SPIN: an Application to a Railway Interlocking System

Lecture Notes in Computer Science, 1998

Abstract. This paper describes an industrial application in formal verifica-tion. The analyzed sy... more Abstract. This paper describes an industrial application in formal verifica-tion. The analyzed system is the Safety Logic of an interlocking system for the control of railway stations developed by Ansaldo. The Safety Logic is a process-based software architecture, which can be ...

Research paper thumbnail of Nusmv version 2: an opensource tool for symbolic model checking