Pier Luca Montessoro - Academia.edu (original) (raw)
Uploads
Papers by Pier Luca Montessoro
Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium, 2008
Building an optical telecommunication network that allows operators offering broadband connection... more Building an optical telecommunication network that allows operators offering broadband connection services stimulates the competitiveness and supports the spreading of services in a digital divided region. All the operators that wish to offer services to companies and private citizens can take advantage of this network, which allows them keeping their own operative independence while reaching the marginal areas in an effective way. This paper describes both financial and technological aspects of the successful development plan for a regional broadband infrastructure in Regione Friuli Venezia Giulia, Italy, evaluating costs and benefits of such long-term investments. Analyzing the regional project from a macro-economic point of view, the model appears to be attractive for all the involved stakeholders. Public intervention makes also the Region attractive to ICT operators, and more in general to investors.
IEEE Transactions on Control of Network Systems
Recent Advances in Biometrics
With the proliferation of automated systems for reliable and highly secure human authentication a... more With the proliferation of automated systems for reliable and highly secure human authentication and identification, the importance of technological solutions in biometrics is growing along with security awareness. Indeed, conventional authentication methodologies, consisting of knowledge-based systems that make use of something you know (e.g., username and password) and token-based systems that make use of something you have (e.g., identification card), are not able to meet the strict requirements of reliable security applications. Conversely, biometric systems make use of behavioral (extrinsic) and/or physiological (intrinsic) human characteristics, overcoming the security issues affecting the conventional methods for personal authentication. This book chapter provides an overview of the most commonly used biometric traits along with their properties, the various biometric system operating modalities as well as various security aspects related to these systems. In particular, it wi...
IEEE Transactions on Network Science and Engineering, 2016
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1996
Advances in Computer, Information, and Systems Sciences, and Engineering
... Together with Silvano Gai and Pietro Nicoletti, Pier Luca Montessoro wrote a popular book (&q... more ... Together with Silvano Gai and Pietro Nicoletti, Pier Luca Montessoro wrote a popular book (" Reti locali: dal cablaggio all'internetworking", SSGRR, in Italian) on structured cabling systems, LAN and internet-working. Author ...
PLOS ONE
The demand for high level of safety and superior quality in agricultural products is of prime con... more The demand for high level of safety and superior quality in agricultural products is of prime concern. The introduction of new technologies for supporting crop management allows the efficiency and quality of production to be improved and, at the same time, reduces the environmental impact. Common strategies to disease control are mainly oriented on spraying pesticides uniformly over cropping areas at different times during the growth cycle. Even though these methodologies can be effective, they present a negative impact in ecological and economic terms, introducing new pests and elevating resistance of the pathogens. Therefore, consideration for new automatic and accurate along with inexpensive and efficient techniques for the detection and severity estimation of pathogenic diseases before proper control measures can be suggested is of great realistic significance and may reduce the likelihood of an infection spreading. In this work, we present a novel system-theoretic approach for ...
Il problema della cybersecurity \ue8 complesso e per comprendere i dettagli degli aspetti tecnici... more Il problema della cybersecurity \ue8 complesso e per comprendere i dettagli degli aspetti tecnici sono necessarie elevate competenze. Tuttavia, una efficace strategia di protezione dai rischi ad essa connessi si basa, prima che sulla tecnologia, sulla prevenzione guidata da conoscenza e consapevolezza. Questo articolo descrive gli aspetti fondamentali del problema evidenziando come tutti i soggetti coinvolti abbiano un ruolo e delle responsabilit\ue0, a partire dalla amministrazione che progetta ed eroga i servizi agli utenti finali che ne fruiscono
In the recent years multimedia traffic and in particular VoIP services are growing dramatically. ... more In the recent years multimedia traffic and in particular VoIP services are growing dramatically. We present a new algorithm to control the resource utilization and to optimize the voice codec selection during SIP call setup on behalf of the traffic condition estimated on the network path. The most suitable methodologies and the tools that perform realtime evaluation of the available bandwidth on a network path have been integrated with our proposed algorithm: this selects the best codec for a VoIP call in function of the instantaneous available bandwidth on the path. The algorithm does not require any explicit feedback from the network, and this makes it easily deployable over the Internet. We have also performed intensive tests on real network scenarios with a software prototype, verifying the algorithm efficiency with different network topologies and traffic patterns between two SIP PBXs. The promising results obtained during the experimental validation of the algorithm are now th...
Proceedings of the SMC Conferences, Jul 21, 2010
— Well known requirements for handling multimedia flows in routers are resource reservation and f... more — Well known requirements for handling multimedia flows in routers are resource reservation and fast packets forwarding. The former takes into account the quite stable and long lasting bandwidth occupation, whereas the latter takes into account the large number of packets routed along the same path. Many techniques have been proposed and standardized to face these requirements, but their application is often complex, expensive and sometimes limited by the need of agreements between network managers of the many networks and Autonomous Systems. This paper introduces IMFM (Integrated Multimedia Flows Management), an innovative, scalable, and extremely lightweight technique to provide routers deterministic and dynamic resource reservation and a fast forwarding table lookup. It is based on a distributed linked data structure that allows direct (searchless) access to entries in the routers ’ tables, extending the resource reservation algorithm REBOOK. Unlike conventional virtual circuits,...
The MTEACH authoring framework is based on a methodology supported by a language and a compiler, ... more The MTEACH authoring framework is based on a methodology supported by a language and a compiler, allowing the author of a didactic multimedia production to work at a higher level than conventional authoring tools. Starting from a formal description of the lessons, the running code of the multimedia application is generated in standard formats, and provides a consistent and easy-to-navigate hypermedia structure. Automatic link generation provides reusability of the multimedia material after it is organized in the lesson structure. This approach will allow authors to create different context-based presentations starting from the expected skill of the target users. Advanced indexing schemes will be further available for dynamic and interactive hypermedia generation. The MTEACH research project is also developing a stable workspace for almost real-time multimedia production. Interfacing the teacher’s console with a multimedia processing unit, lessons and knowledge models can be directly...
Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium, 2008
Building an optical telecommunication network that allows operators offering broadband connection... more Building an optical telecommunication network that allows operators offering broadband connection services stimulates the competitiveness and supports the spreading of services in a digital divided region. All the operators that wish to offer services to companies and private citizens can take advantage of this network, which allows them keeping their own operative independence while reaching the marginal areas in an effective way. This paper describes both financial and technological aspects of the successful development plan for a regional broadband infrastructure in Regione Friuli Venezia Giulia, Italy, evaluating costs and benefits of such long-term investments. Analyzing the regional project from a macro-economic point of view, the model appears to be attractive for all the involved stakeholders. Public intervention makes also the Region attractive to ICT operators, and more in general to investors.
IEEE Transactions on Control of Network Systems
Recent Advances in Biometrics
With the proliferation of automated systems for reliable and highly secure human authentication a... more With the proliferation of automated systems for reliable and highly secure human authentication and identification, the importance of technological solutions in biometrics is growing along with security awareness. Indeed, conventional authentication methodologies, consisting of knowledge-based systems that make use of something you know (e.g., username and password) and token-based systems that make use of something you have (e.g., identification card), are not able to meet the strict requirements of reliable security applications. Conversely, biometric systems make use of behavioral (extrinsic) and/or physiological (intrinsic) human characteristics, overcoming the security issues affecting the conventional methods for personal authentication. This book chapter provides an overview of the most commonly used biometric traits along with their properties, the various biometric system operating modalities as well as various security aspects related to these systems. In particular, it wi...
IEEE Transactions on Network Science and Engineering, 2016
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1996
Advances in Computer, Information, and Systems Sciences, and Engineering
... Together with Silvano Gai and Pietro Nicoletti, Pier Luca Montessoro wrote a popular book (&q... more ... Together with Silvano Gai and Pietro Nicoletti, Pier Luca Montessoro wrote a popular book (" Reti locali: dal cablaggio all'internetworking", SSGRR, in Italian) on structured cabling systems, LAN and internet-working. Author ...
PLOS ONE
The demand for high level of safety and superior quality in agricultural products is of prime con... more The demand for high level of safety and superior quality in agricultural products is of prime concern. The introduction of new technologies for supporting crop management allows the efficiency and quality of production to be improved and, at the same time, reduces the environmental impact. Common strategies to disease control are mainly oriented on spraying pesticides uniformly over cropping areas at different times during the growth cycle. Even though these methodologies can be effective, they present a negative impact in ecological and economic terms, introducing new pests and elevating resistance of the pathogens. Therefore, consideration for new automatic and accurate along with inexpensive and efficient techniques for the detection and severity estimation of pathogenic diseases before proper control measures can be suggested is of great realistic significance and may reduce the likelihood of an infection spreading. In this work, we present a novel system-theoretic approach for ...
Il problema della cybersecurity \ue8 complesso e per comprendere i dettagli degli aspetti tecnici... more Il problema della cybersecurity \ue8 complesso e per comprendere i dettagli degli aspetti tecnici sono necessarie elevate competenze. Tuttavia, una efficace strategia di protezione dai rischi ad essa connessi si basa, prima che sulla tecnologia, sulla prevenzione guidata da conoscenza e consapevolezza. Questo articolo descrive gli aspetti fondamentali del problema evidenziando come tutti i soggetti coinvolti abbiano un ruolo e delle responsabilit\ue0, a partire dalla amministrazione che progetta ed eroga i servizi agli utenti finali che ne fruiscono
In the recent years multimedia traffic and in particular VoIP services are growing dramatically. ... more In the recent years multimedia traffic and in particular VoIP services are growing dramatically. We present a new algorithm to control the resource utilization and to optimize the voice codec selection during SIP call setup on behalf of the traffic condition estimated on the network path. The most suitable methodologies and the tools that perform realtime evaluation of the available bandwidth on a network path have been integrated with our proposed algorithm: this selects the best codec for a VoIP call in function of the instantaneous available bandwidth on the path. The algorithm does not require any explicit feedback from the network, and this makes it easily deployable over the Internet. We have also performed intensive tests on real network scenarios with a software prototype, verifying the algorithm efficiency with different network topologies and traffic patterns between two SIP PBXs. The promising results obtained during the experimental validation of the algorithm are now th...
Proceedings of the SMC Conferences, Jul 21, 2010
— Well known requirements for handling multimedia flows in routers are resource reservation and f... more — Well known requirements for handling multimedia flows in routers are resource reservation and fast packets forwarding. The former takes into account the quite stable and long lasting bandwidth occupation, whereas the latter takes into account the large number of packets routed along the same path. Many techniques have been proposed and standardized to face these requirements, but their application is often complex, expensive and sometimes limited by the need of agreements between network managers of the many networks and Autonomous Systems. This paper introduces IMFM (Integrated Multimedia Flows Management), an innovative, scalable, and extremely lightweight technique to provide routers deterministic and dynamic resource reservation and a fast forwarding table lookup. It is based on a distributed linked data structure that allows direct (searchless) access to entries in the routers ’ tables, extending the resource reservation algorithm REBOOK. Unlike conventional virtual circuits,...
The MTEACH authoring framework is based on a methodology supported by a language and a compiler, ... more The MTEACH authoring framework is based on a methodology supported by a language and a compiler, allowing the author of a didactic multimedia production to work at a higher level than conventional authoring tools. Starting from a formal description of the lessons, the running code of the multimedia application is generated in standard formats, and provides a consistent and easy-to-navigate hypermedia structure. Automatic link generation provides reusability of the multimedia material after it is organized in the lesson structure. This approach will allow authors to create different context-based presentations starting from the expected skill of the target users. Advanced indexing schemes will be further available for dynamic and interactive hypermedia generation. The MTEACH research project is also developing a stable workspace for almost real-time multimedia production. Interfacing the teacher’s console with a multimedia processing unit, lessons and knowledge models can be directly...