Paolo Falcarin | University of East London (original) (raw)
Papers by Paolo Falcarin
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information. To see the final version of this paper please visit the publisher’s website. Access to the published version may require a subscription.
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information. To see the final version of this paper please visit the publisher’s website. Access to the published version may require a subscription.
Communications in Computer and Information Science, 2016
Content discovery advertisements are type of native ads which have gained traction for driving ad... more Content discovery advertisements are type of native ads which have gained traction for driving ad traffic. These advertisements are being hosted on supposedly reputed websites and their popularity has been growing however it has been reported in the media that these ads are deploying click bait ads. In this research, these ads were evaluated for a period of one month to study and examine their credibility. It was found that significant percentage of these ads were malicious in nature.
2015 SAI Intelligent Systems Conference (IntelliSys), 2015
Convergent process may be defined as a composition of services which integrates functionalities f... more Convergent process may be defined as a composition of services which integrates functionalities from Web and Telecommunication domains. However, during execution of convergent processes some services may fail; in such cases a reconfiguration process must be triggered to recover normal behaviour of composite process. Previous works have developed mechanisms for reducing reconfiguration time while initial restrictions are maintained; this is achieved by replacing regions of services instead of individual services. The present work presents an approach for monitoring and error detecting in convergent processes using rule production systems based on ITIL model. The approach was tested in the monitoring module of the AUTO framework, whose architecture and performance are discussed to show that this approach can efficiently detect errors and repair convergent processes in telecom environments.
Abstract. The increasing flourish of available services in telecom domain offers more choices to ... more Abstract. The increasing flourish of available services in telecom domain offers more choices to the end user. On the other hand, such wide offer cannot be completely evaluated by the user, and some services may pass unobserved even if useful. To face this issue, the usage of recommendation systems in telecom domain is growing, to directly notify the user about the presence of services which may meet user interests. Recommendation can be seen as an advanced form of personalization, because user preferences are used to predict the interests of users for a new service. In this paper we propose a recommender system for users of telecom services, based on different collaborative filtering algorithms applied to a complex data-set of telecom users. Experiments on the recommendation performance and accuracy are conducted to test the different effects of different algorithms in data ser coming from the a telecom domain.
A computer system's security can be compromised in many ways—a denial-of-service attack can m... more A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention
3 rd International Workshop on Net-Centric Computing, May 14, 2001
It has often been remarked that fictional accounts of reality can tell us more about likely futur... more It has often been remarked that fictional accounts of reality can tell us more about likely future events and give us a better understanding of the present than contemporary nonfictional accounts and analyses found in textbooks. Here two fictional accounts of systems are examined for their insights into the phenomenon known as “Net Centric Computing”. One discusses the implications of an infinitely large library; and the other gives a view of software engineers as knowledge workers in the future. Three ...
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information.
NETWORK OPERATORS CAN SEE NEXT GENERATION NETWORKS (NGN) AS NEW REVENUE STREAM THANKS TO THE POTE... more NETWORK OPERATORS CAN SEE NEXT GENERATION NETWORKS (NGN) AS NEW REVENUE STREAM THANKS TO THE POTENTIAL THEY COULD HAVE IN INCREASING THE SERVICE OFFERING. THEREFORE IT IS IMPORTANT TO UNDERSTAND HOW PROPOSED TECHNOLOGIES AND SOLUTIONS IN NGN MARKET CAN ENABLE, FLEXIBLE AND EASY SERVICE CREATION. THIS PAPER PRESENTS THE RESULT OF THE INVESTIGATION OF EURESCOM P1109 PROJECT [1] IN THE AREA OF ADVANCED TECHNOLOGIES THAT ENABLE THE INTRODUCTION OF NEW SERVICES IN NGNS [4]. THESE TECHNOLOGIES ARE EVALUATED WITH RESPECT TO SOME KEY EVALUATION CRITERIA AND THEN A COMPARISON IS PROVIDED. i n s e a r c h o f i n n o v a t i o n exp Volume 3 n. 4 December 2003 47 ASSESSMENT OF SERVICE CREATION TECHNOLOGIES In this section we describe the evaluation criteria and the comparison of some of the more interesting technologies that can be used for service creation in NGN with respect to the identified criteria (for a detailed analysis refer to [2]). Evaluation Criteria In this section there is a def...
IEEE Software, 2011
We may be dealing with a 17 th century crime, but we need to bring 21 st century solutions to bea... more We may be dealing with a 17 th century crime, but we need to bring 21 st century solutions to bear.' Former US Secretary of State Hillary Clinton in response to the Maersk Alabama incident in 2009. 1
IEEE Pervasive Computing, 2008
... aims at easing inte-gration among heterogeneous systems, thus allowing innovative mobile appl... more ... aims at easing inte-gration among heterogeneous systems, thus allowing innovative mobile applica-tions in the e-tourism context. ... to represent the different informa-tion types that network-management operations must integrate to support interoperability and extensibility in ...
The 6th International Symposium on Web and Mobile Information Services ... General Chair Dimitrio... more The 6th International Symposium on Web and Mobile Information Services ... General Chair Dimitrios Georgakopoulos, CSIRO ICT Centre, Australia ... Program Chairs Michael Sheng, University of Adelaide, Australia Muhammad Younas, Oxford Brookes University, UK Elhadi Shakshuki, Acadia University, Canada ... Program Committee Jamal Bentahar, Concordia University, Canada Jinsong Dong, National University of Singapore, Singapore Paolo Falcarin, Politecnico di Torino, Italy Christos K. Georgiadis, University of Macedonia, Greece Yanbo Han, ...
The 7th International Symposium on Web and Mobile Information Services (WAMIS 2011) ... General C... more The 7th International Symposium on Web and Mobile Information Services (WAMIS 2011) ... General Chair Yanchun Zhang, Victoria University, Australia ... Program Chairs Michael Sheng, University of Adelaide, Australia Muhammad Younas, Oxford Brookes University, UK Elhadi Shakshuki, Acadia University, Canada ... Program Committee Karim Baina, ENSIAS, Morocco Djamal Benslimane, Lyon 1 University, France Stephane Bressan, National University of Singapore, Singapore Ernest Chang, National Chung Hsing University, Taiwan Paolo ...
Page 1. Service Creation for a Telecom Service Platform Mariano Belaunde 1 , PaoloFalcarin 2 , Jo... more Page 1. Service Creation for a Telecom Service Platform Mariano Belaunde 1 , PaoloFalcarin 2 , João Paulo A. Almeida 3 ... Paolo Falcarin has developed part of this work while affiliated to Politecnico di Torino University in Italy: he ...
International Journal of Web Services Research, 2008
Meshing up telecommunication and IT resources seems to be the real challenge for supporting the e... more Meshing up telecommunication and IT resources seems to be the real challenge for supporting the evolution towards the next generation of Web Services. In telecom world, JAIN-SLEE (JAIN Service Logic Execution Environment) is an emerging standard specification for Java service platforms targeted to host value added services, composed of telecom and IT services.In this paper we describe StarSLEE platform which extends JAIN-SLEE in order to compose JAIN-SLEE services with Web services and the StarSCE service creation environment which allows exporting value added services as communication web services, and we analyze open issues that must be addressed to introduce Web Services in new telecom service platforms.
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information. To see the final version of this paper please visit the publisher’s website. Access to the published version may require a subscription.
2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)
Smart cities rely on large-scale heterogeneous distributed systems known as Cyber-Physical System... more Smart cities rely on large-scale heterogeneous distributed systems known as Cyber-Physical Systems (CPS). Information systems based on CPS typically analyse a massive amount of data collected from various data sources that operate under noisy and dynamic conditions. How to determine the quality and reliability of such data is an open research problem that concerns the overall system safety, reliability and security. Our research goal is to tackle the challenge of real-time data quality assessment for large-scale CPS applications with a hybrid anomaly detection system. In this paper we describe the architecture of HADES, our Hybrid Anomaly DEtection System for sensors data monitoring, storage, processing, analysis, and management. Such data will be filtered with correlation-based outlier detection techniques, and then processed by predictive analytics for anomaly detection.
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information. To see the final version of this paper please visit the publisher’s website. Access to the published version may require a subscription.
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information. To see the final version of this paper please visit the publisher’s website. Access to the published version may require a subscription.
Communications in Computer and Information Science, 2016
Content discovery advertisements are type of native ads which have gained traction for driving ad... more Content discovery advertisements are type of native ads which have gained traction for driving ad traffic. These advertisements are being hosted on supposedly reputed websites and their popularity has been growing however it has been reported in the media that these ads are deploying click bait ads. In this research, these ads were evaluated for a period of one month to study and examine their credibility. It was found that significant percentage of these ads were malicious in nature.
2015 SAI Intelligent Systems Conference (IntelliSys), 2015
Convergent process may be defined as a composition of services which integrates functionalities f... more Convergent process may be defined as a composition of services which integrates functionalities from Web and Telecommunication domains. However, during execution of convergent processes some services may fail; in such cases a reconfiguration process must be triggered to recover normal behaviour of composite process. Previous works have developed mechanisms for reducing reconfiguration time while initial restrictions are maintained; this is achieved by replacing regions of services instead of individual services. The present work presents an approach for monitoring and error detecting in convergent processes using rule production systems based on ITIL model. The approach was tested in the monitoring module of the AUTO framework, whose architecture and performance are discussed to show that this approach can efficiently detect errors and repair convergent processes in telecom environments.
Abstract. The increasing flourish of available services in telecom domain offers more choices to ... more Abstract. The increasing flourish of available services in telecom domain offers more choices to the end user. On the other hand, such wide offer cannot be completely evaluated by the user, and some services may pass unobserved even if useful. To face this issue, the usage of recommendation systems in telecom domain is growing, to directly notify the user about the presence of services which may meet user interests. Recommendation can be seen as an advanced form of personalization, because user preferences are used to predict the interests of users for a new service. In this paper we propose a recommender system for users of telecom services, based on different collaborative filtering algorithms applied to a complex data-set of telecom users. Experiments on the recommendation performance and accuracy are conducted to test the different effects of different algorithms in data ser coming from the a telecom domain.
A computer system's security can be compromised in many ways—a denial-of-service attack can m... more A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention
3 rd International Workshop on Net-Centric Computing, May 14, 2001
It has often been remarked that fictional accounts of reality can tell us more about likely futur... more It has often been remarked that fictional accounts of reality can tell us more about likely future events and give us a better understanding of the present than contemporary nonfictional accounts and analyses found in textbooks. Here two fictional accounts of systems are examined for their insights into the phenomenon known as “Net Centric Computing”. One discusses the implications of an infinitely large library; and the other gives a view of software engineers as knowledge workers in the future. Three ...
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information.
NETWORK OPERATORS CAN SEE NEXT GENERATION NETWORKS (NGN) AS NEW REVENUE STREAM THANKS TO THE POTE... more NETWORK OPERATORS CAN SEE NEXT GENERATION NETWORKS (NGN) AS NEW REVENUE STREAM THANKS TO THE POTENTIAL THEY COULD HAVE IN INCREASING THE SERVICE OFFERING. THEREFORE IT IS IMPORTANT TO UNDERSTAND HOW PROPOSED TECHNOLOGIES AND SOLUTIONS IN NGN MARKET CAN ENABLE, FLEXIBLE AND EASY SERVICE CREATION. THIS PAPER PRESENTS THE RESULT OF THE INVESTIGATION OF EURESCOM P1109 PROJECT [1] IN THE AREA OF ADVANCED TECHNOLOGIES THAT ENABLE THE INTRODUCTION OF NEW SERVICES IN NGNS [4]. THESE TECHNOLOGIES ARE EVALUATED WITH RESPECT TO SOME KEY EVALUATION CRITERIA AND THEN A COMPARISON IS PROVIDED. i n s e a r c h o f i n n o v a t i o n exp Volume 3 n. 4 December 2003 47 ASSESSMENT OF SERVICE CREATION TECHNOLOGIES In this section we describe the evaluation criteria and the comparison of some of the more interesting technologies that can be used for service creation in NGN with respect to the identified criteria (for a detailed analysis refer to [2]). Evaluation Criteria In this section there is a def...
IEEE Software, 2011
We may be dealing with a 17 th century crime, but we need to bring 21 st century solutions to bea... more We may be dealing with a 17 th century crime, but we need to bring 21 st century solutions to bear.' Former US Secretary of State Hillary Clinton in response to the Maersk Alabama incident in 2009. 1
IEEE Pervasive Computing, 2008
... aims at easing inte-gration among heterogeneous systems, thus allowing innovative mobile appl... more ... aims at easing inte-gration among heterogeneous systems, thus allowing innovative mobile applica-tions in the e-tourism context. ... to represent the different informa-tion types that network-management operations must integrate to support interoperability and extensibility in ...
The 6th International Symposium on Web and Mobile Information Services ... General Chair Dimitrio... more The 6th International Symposium on Web and Mobile Information Services ... General Chair Dimitrios Georgakopoulos, CSIRO ICT Centre, Australia ... Program Chairs Michael Sheng, University of Adelaide, Australia Muhammad Younas, Oxford Brookes University, UK Elhadi Shakshuki, Acadia University, Canada ... Program Committee Jamal Bentahar, Concordia University, Canada Jinsong Dong, National University of Singapore, Singapore Paolo Falcarin, Politecnico di Torino, Italy Christos K. Georgiadis, University of Macedonia, Greece Yanbo Han, ...
The 7th International Symposium on Web and Mobile Information Services (WAMIS 2011) ... General C... more The 7th International Symposium on Web and Mobile Information Services (WAMIS 2011) ... General Chair Yanchun Zhang, Victoria University, Australia ... Program Chairs Michael Sheng, University of Adelaide, Australia Muhammad Younas, Oxford Brookes University, UK Elhadi Shakshuki, Acadia University, Canada ... Program Committee Karim Baina, ENSIAS, Morocco Djamal Benslimane, Lyon 1 University, France Stephane Bressan, National University of Singapore, Singapore Ernest Chang, National Chung Hsing University, Taiwan Paolo ...
Page 1. Service Creation for a Telecom Service Platform Mariano Belaunde 1 , PaoloFalcarin 2 , Jo... more Page 1. Service Creation for a Telecom Service Platform Mariano Belaunde 1 , PaoloFalcarin 2 , João Paulo A. Almeida 3 ... Paolo Falcarin has developed part of this work while affiliated to Politecnico di Torino University in Italy: he ...
International Journal of Web Services Research, 2008
Meshing up telecommunication and IT resources seems to be the real challenge for supporting the e... more Meshing up telecommunication and IT resources seems to be the real challenge for supporting the evolution towards the next generation of Web Services. In telecom world, JAIN-SLEE (JAIN Service Logic Execution Environment) is an emerging standard specification for Java service platforms targeted to host value added services, composed of telecom and IT services.In this paper we describe StarSLEE platform which extends JAIN-SLEE in order to compose JAIN-SLEE services with Web services and the StarSCE service creation environment which allows exporting value added services as communication web services, and we analyze open issues that must be addressed to introduce Web Services in new telecom service platforms.
This paper is made available online in accordance with publisher policies. Please scroll down to ... more This paper is made available online in accordance with publisher policies. Please scroll down to view the document itself. Please refer to the repository record for this item and our policy information available from the repository home page for further information. To see the final version of this paper please visit the publisher’s website. Access to the published version may require a subscription.
2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC)
Smart cities rely on large-scale heterogeneous distributed systems known as Cyber-Physical System... more Smart cities rely on large-scale heterogeneous distributed systems known as Cyber-Physical Systems (CPS). Information systems based on CPS typically analyse a massive amount of data collected from various data sources that operate under noisy and dynamic conditions. How to determine the quality and reliability of such data is an open research problem that concerns the overall system safety, reliability and security. Our research goal is to tackle the challenge of real-time data quality assessment for large-scale CPS applications with a hybrid anomaly detection system. In this paper we describe the architecture of HADES, our Hybrid Anomaly DEtection System for sensors data monitoring, storage, processing, analysis, and management. Such data will be filtered with correlation-based outlier detection techniques, and then processed by predictive analytics for anomaly detection.