
Humanintheloop Artificial Intelligence
Little by little, newspapers are revealing the bright future that Artifi...
read it

On a Model for Integrated Information
In this paper we give a thorough presentation of a model proposed by Ton...
read it

Parsing with CYK over Distributed Representations: "Classical" Syntactic Parsing in the Novel Era of Neural Networks
Syntactic parsing is a key task in natural language processing which has...
read it

Approximation of the truncated Zeta distribution and Zipf's law
Zipf's law appears in many application areas but does not have a closed ...
read it

Adaptive Performance Optimization under Power Constraint in Multithread Applications with Diverse Scalability
In modern data centers, energy usage represents one of the major factors...
read it

Enhancing Predicate Pairing with Abstraction for Relational Verification
Relational verification is a technique that aims at proving properties t...
read it

Predicate Pairing for Program Verification
It is wellknown that the verification of partial correctness properties...
read it

Geographical Load Balancing across Green Datacenters
"Geographic Load Balancing" is a strategy for reducing the energy cost o...
read it

On a Stackelberg Subset Sum Game
This contribution deals with a twolevel discrete decision problem, a so...
read it

Degrees of extensionality in the theory of Böhm trees and Sallé's conjecture
The main observational equivalences of the untyped lambdacalculus have ...
read it

CECT: Computationally Efficient Congestionavoidance and Traffic Engineering in Softwaredefined Cloud Data Centers
The proliferation of cloud data center applications and network function...
read it

Estimation in emerging epidemics: biases and remedies
When analysing new emerging infectious disease outbreaks one typically h...
read it

Constrained maximum likelihood estimation of clusterwise linear regression models with unknown number of components
We consider an equivariant approach imposing datadriven bounds for the ...
read it

Solving Horn Clauses on Inductive Data Types Without Induction
We address the problem of verifying the satisfiability of Constrained Ho...
read it

Quantum Internet: from Communication to Distributed Computing!
In this invited paper, the authors discuss the exponential computing spe...
read it

Online Reciprocal Recommendation with Theoretical Performance Guarantees
A reciprocal recommendation problem is one where the goal of learning is...
read it

CuCoTrack: Cuckoo Filter Based Connection Tracking
This paper introduces CuCoTrack, a cuckoo hash based data structure desi...
read it

Decremental SPQRtrees for Planar Graphs
We present a decremental data structure for maintaining the SPQRtree of...
read it

Joint Failure Recovery, Fault Prevention, and Energyefficient Resource Management for Realtime SFC in Fogsupported SDN
In this paper, we focus on the problems of traffic engineering, failure ...
read it

Consensus Needs Broadcast in Noiseless Models but can be Exponentially Easier in the Presence of Noise
Consensus and Broadcast are two fundamental problems in distributed comp...
read it

Bounded Symbolic Execution for Runtime Error Detection of Erlang Programs
Dynamically typed languages, like Erlang, allow developers to quickly wr...
read it

SDN Architecture and Southbound APIs for IPv6 Segment Routing Enabled Wide Area Networks
The SRv6 architecture (Segment Routing based on IPv6 data plane) is a pr...
read it

Quantum Internet: Networking Challenges in Distributed Quantum Computing
By networking multiple quantum devices, the Quantum Internet builds up a...
read it

Coalition Resilient Outcomes in Max kCut Games
We investigate strong Nash equilibria in the max kcut game, where we ar...
read it

Finding a BoundedDegree Expander Inside a Dense One
It follows from the MarcusSpielmanSrivastava proof of the KadisonSing...
read it

Dominating Sets and Connected Dominating Sets in Dynamic Graphs
In this paper we study the dynamic versions of two basic graph problems:...
read it

A Conceptual Framework for Assessing AnonymizationUtility TradeOffs Based on Principal Component Analysis
An anonymization technique for databases is proposed that employs Princi...
read it

Segment Routing: A comprehensive survey of research activities, standardization efforts and implementation results
In this paper we present a comprehensive survey on SR technology analyzi...
read it

Proving Properties of Sorting Programs: A Case Study in Horn Clause Verification
The proof of a program property can be reduced to the proof of satisfiab...
read it

Asymptotics for Spherical Functional Autoregressions
In this paper, we investigate a class of spherical functional autoregres...
read it

StepbyStep Community Detection for VolumeRegular Graphs
Spectral techniques have proved amongst the most effective approaches to...
read it

Lemma Generation for Horn Clause Satisfiability: A Preliminary Study
It is known that the verification of imperative, functional, and logic p...
read it

Explicit error estimates for spline approximation of arbitrary smoothness in isogeometric analysis
In a recent publication, explicit constants have been provided in a prio...
read it

Curvilinear Virtual Elements for 2D solid mechanics applications
In the present work we generalize the curvilinear Virtual Element techno...
read it

Teaching Performance Modeling in the era of millennials
Performance Modeling (PM) teaching started in the early 70s and reached ...
read it

Is It Safe Living in the Vicinity of Cellular Towers? Analysis of LongTerm Human EMF Exposure at Population Scale
We focus on the ElectroMagnetic Field (EMF) exposure safety for people l...
read it

Removing Algebraic Data Types from Constrained Horn Clauses Using Difference Predicates
We address the problem of proving the satisfiability of Constrained Horn...
read it

Cutting Bamboo Down to Size
This paper studies the problem of programming a robotic panda gardener t...
read it

Phase Transition of a NonLinear Opinion Dynamics with Noisy Interactions
In several real MultiAgent Systems (MAS), it has been observed that onl...
read it

Parallel Load Balancing on Constrained ClientServer Topologies
We study parallel Load Balancing protocols for a clientserver distribut...
read it

Micro SIDs: a solution for Efficient Representation of Segment IDs in SRv6 Networks
The Segment Routing (SR) architecture is based on loose source routing. ...
read it

Best lowrank approximations and Kolmogorov nwidths
We relate the problem of best lowrank approximation in the spectral nor...
read it

Directional quantile classifiers
We introduce classifiers based on directional quantiles. We derive theor...
read it
University of Rome Tor Vergata
The Tor Vergata Six Sigma Academy is a cultural initiative of the Universitu00E0 of Rome “Tor Vergatau00BB that aims to disseminate the culture and instruments Six Sigma and Lean Six Sigma in the professionals and in Italian companies, both public and private. With its training and certification courses, its activities of research, operational support and knowledge dissemination, the Tor Vergata Six Sigma Academy operates at 360u00b0 to help professionals and companies to grow and improve standing out in a competitive context in the short and long term.