Andrea Vitaletti

Andrea Vitaletti
Sapienza University of Rome | la sapienza · Department of Computer, Automatic and Management Engineering "Antonio Ruberti"

Ph.D. in CS

About

81
Publications
21,219
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,559
Citations
Introduction
I'm assistant professor at the University of Rome "La Sapienza". In 2002 I co-founded my first company, the WLAB - www.w-lab.it. In 2012 I'm one of the founders of WSENSE, a spin-off of "La Sapienza"
Additional affiliations
January 2004 - December 2010
Università degli Studi di Roma "La Sapienza"
Education
February 1999 - February 2002
Sapienza University of Rome
Field of study
  • Computer Science

Publications

Publications (81)
Article
Plants monitor their surrounding environment and control their physiological functions by producing an electrical response. We recorded electrical signals from different plants by exposing them to Sodium Chloride (NaCl), Ozone (O3) and Sulfuric Acid (H2SO4) under laboratory conditions. After applying pre-processing techniques such as filtering and...
Conference Paper
GENDE (http://www.gende.it) is a tool to allow designers, but also common people, to automatically design new products that evolve according to the principles of Genetic Algorithms (GAs). The selection of the products that will actually take part to the evolutionary process, relies on crowdsourcing mechanisms: only the most appreciated products sur...
Article
Full-text available
In this paper, we propose a reference architecture for Delay-Tolerant Networking (DTN) routing protocols and a thorough quantitative evaluation of many protocols proposed in the literature. We categorize DTN protocols according to their use of the three techniques that are the key elements of our reference architecture: queue management, forwarding...
Article
Since the initial visions proposed in the SmartDust project fifteen years ago, Wireless Sensor Networks have seen a tremendous development, leading to the realization of the Internet of Things (IoT). Today, there is a large variety of hardware and software to choose from that is easy to set up and use. Even though there is an increasing number of r...
Article
Plant electrical signals often contains low frequency drifts with or without the application of external stimuli. Quantification of the randomness in plant signals in a stimulus-specific way is hindered because the knowledge of vital frequency information in the actual biological response is not known yet. Here we design an optimum Infinite Impulse...
Article
Full-text available
Automatic surveillance of public areas, such as airports, train stations, and shopping malls, requires the capacity of detecting and recognizing possible abnormal situations in populated environments. In this book chapter, an architecture for intelligent surveillance in indoor public spaces, based on an integration of interactive and non-interactiv...
Article
Full-text available
Plants sense their environment by producing electrical signals which in essence represent changes in underlying physiological processes. These electrical signals, when monitored, show both stochastic and deterministic dynamics. In this paper, we compute 11 statistical features from the raw non-stationary plant electrical signal time series to class...
Article
Full-text available
The Terrestrial Trunked Radio TETRA system is an open standard developed by ETSI and designed to support mobile radio communications in a number of market segments, among which public safety is by far the largest one. In this paper, we present the activities to the 'TETRis - TETRA Innovative Open Source Services' project to integrate wireless senso...
Article
Online social networks, formed by cyber interactions between users, are nowadays explored in a number of papers. In this work, we present our experimental activity on Face-To-Face (F2F) social networks tracing physical interactions of humans in real-world scenarios. We briefly present the technologies to observe F2F social networks focusing on the...
Conference Paper
Full-text available
Monitoring of populated indoor environments is crucial for the surveillance of public spaces like airports or embassies, where the behavior of people may be relevant in order to determine abnormal situations. In this paper, a surveillance system based on an integration of interactive and non-interactive heterogeneous sensors is described. As a diff...
Chapter
This chapter introduces the MagoNode: a new low-power wireless device for Wireless Sensor Networks operating in the ISM 2.4 Ghz band. This platform is based on a highly efficient RF front-end that greatly improves RF performance, in terms of radio range and sensibility, still limiting energy consumption. Indeed, the device outperforms other existin...
Chapter
Pervasive communication technologies and tiny wireless monitoring devices have provided a solid foundation for the idea of remote healthcare. This idea aims at making available over communication networks (e.g. the Internet) some of the fundamental healthcare services commonly available only in conventional medical facilities and clinical settings....
Conference Paper
Full-text available
This paper presents the SUNRISE GATE, namely the interface through which users can run their experiments, accessing in a unified way the heterogeneous resources offered by the testbeds of the SUNRISE federation (http://fp7-sunrise.eu).
Article
In this paper, system identification approach has been adopted to develop a novel dynamical model for describing the relationship between light as an environmental stimulus and the electrical response as the measured output for a bay leaf (Laurus nobilis) plant. More specifically, the target is to predict the characteristics of the input light stim...
Conference Paper
Full-text available
In this paper we consider Delay Tolerant Network (DTN) as a technology to implement a future network in a People Centric Networking paradigm, using Active RFID carried by people that exchange information with each other. We propose a novel and real Neighbor Discovery (ND) phase on active RFID based DTN using Open Beacon devices. In particular, we p...
Conference Paper
In this paper we analyze the interaction between two communication protocols implemented in TinyOS 2.x: Deluge T2, an over-the-air programming protocol, and the Low Power Listening (LPL) implementation provided with the standard Medium Access Control layer, BoX-MAC. We show how the characteristics of the two layers deeply diverge, leading to a sens...
Conference Paper
ProvinciaSense is a proof-of-concept of the integration of both static and mobile sensor nodes with ProvinciaWiFi, a network which currently hosts more than 1100 WiFi Access Points (APs) serving Rome and other 120 cities with about 4.5 millions of citizens. The simple and cost effective integration of sensor nodes with a big number of ProvinciaWiFi...
Conference Paper
This poster presents the work done to monitor the structural health of a Rome B1 underground construction site through a battery-powered Wireless Sensor Network (WSN). We illustrate the specific requirements and challenges of working with wireless sensors underground, and we describe the solutions adopted for obtaining a working WSN that provides a...
Conference Paper
Full-text available
In this paper we discuss the first results of the PLEASED project [1] which aims at employing plants as biosensors of a new generation of pervasive and organic wireless sensor networks.
Article
The purpose of this demo is to introduce a new low-power wireless device for Wireless Sensor Networks (WSN) operating in the ISM 2.4Ghz band: the MagoNode. Thanks to a highly efficient RF front-end, that extends the radio range and increases link reliability, the MagoNode features out-standing RF performance, still containing energy consumption. Th...
Conference Paper
Full-text available
In delay tolerant networking (DTN) nodes exploit their mobility in order to carry messages to their intended destination. Thus the knowledge of a node's neighbors over time, is a fundamental requirement for DTN nodes to exchange knowledge and messages. A typical problem in this task occurs when the neighboring nodes try to response to the neighbor...
Conference Paper
Full-text available
In this paper, we present our experience in designing a reference architecture for implementing Delay Tolerant Networking protocols running on resource constrained devices. The proposed architecture, has been employed to implement the Epidemic protocol on the Openbeacon active tags, and it has been validated on a simple experiment for data collecti...
Conference Paper
Full-text available
We consider the data delivery problem in delay tolerant networks, where a data content is located in a fixed source need to be delivered to a specific destination. We assume nodes have limited storage and computational capabilities. In this paper, we initially, explore the data delivery problem, for both unbiased and biased contact models. Based on...
Conference Paper
Full-text available
In this paper we present an implementation of Population Protocols, a well-known fully decentralized computational model, on physical devices. We implemented the protocols sensing platforms developed with the support of the SocioPatterns research collaboration. This implementation enabled us to evaluate the protocols on a small-scale social network...
Article
Full-text available
In this paper we present an experimental analysis to assess the performance of Population Protocols, a well-known fully decentralized computational model, on real, dynamic social networks. We set-up two infrastructures to collect data coming from wireless active RFID tags, and we asked H 120 volunteers to wear them while normally moving and interac...
Conference Paper
Full-text available
In this paper we propose a new taxonomy for Delay Tolerant Networks (DTNs) routing protocols and a thorough quantitative evaluation of many protocols proposed in the literature. We categorize DTN protocols, according to their use of three main techniques: queue management, forwarding and replication. Queue management orders and manages the messages...
Article
In this paper we propose and investigate the effectiveness of recommendation techniques based on collaborative filtering for use in fully decentralized, pervasive systems of small devtices with limited communication and computational capabilities. We consider a reference scenario where items are distributed in a shop (e.g. a bookstore or a supermar...
Article
In this paper we present an approach to support privacy in people-centric sensing. In particular, we propose a technique that allows a central authority to select a subset of users whose past positions provide a good coverage of a given area of interest, without explicitly georeferencing them. To achieve this goal, we propose an efficient algorithm...
Article
In this paper, we propose and investigate the effectiveness of fully decentralized, collaborative filtering techniques. These are particularly interesting for use in pervasive systems of small devices with limited communication and computational capabilities. In particular, we assume that items are tagged with smart tags (such as passive RFIDs), st...
Article
The necessity to certify one's identity for different purposes and the evolution of mobile technologies have led to the generation of electronic devices such as smart cards, and electronic identities designed to meet daily needs. Nevertheless, these mechanisms have a problem: they don't allow the user to set the scope of the information presented....
Conference Paper
Small portable devices carried by users can be exploited to provide useful information through active cooperation. To guarantee privacy, the system should use the information on the device without tracing the user. In this work we address this scenario and we present a privacy-preserving distributed technique to estimate the number of distinct mobi...
Conference Paper
Full-text available
This paper presents DISSense, an adaptive, ultralow-power communication protocol for wireless sensor networks. DISSense is specifically designed for long-term environmental monitoring applications and it provides for both data collection and data dissemination services. By automatically adapting the length of its active phases, DISSense can guarant...
Conference Paper
Full-text available
The use of electronic documents is constantly growing and the necessity to implement an ad-hoc eCertificate which manages access to private information is not only required but also necessary. This paper presents a protocol for the management of electronic identities (eIDs), meant as a substitute for the paper-based IDs, in a mobile environment wit...
Article
In this work, we discuss various aspects of the application of pervasive technologies inside an urban setting. In the last decade we have seen the emergence of a multitude of closely-related pervasive technologies that have only recently started to materialize on a grand scale, such as wireless sensor networks, RFID and NFC. We discuss the arising...
Conference Paper
Full-text available
We present and discuss challenges and solutions posed by the design of an adaptable network infrastructure of tiny artifacts. Such artifacts are characterized by severe limitations in computational power, communications capacity and energy; nevertheless they must realize a communication infrastructure able to deliver services to the end-users in a...
Article
Full-text available
In this paper we present the Smart City Archi-tecture developed in the context of the ARTEMIS JU SP3 SOFIA project. It is an Event Driven Architecture that allows the management and cooperation of heterogeneous sensors for monitoring public spaces. The main components of the architecture are implemented in a testbed on a subway scenario with the ob...
Chapter
Summary Introduction Programming models System architectures Conclusions and future work Bibliography
Conference Paper
In this paper we propose a fully decentralized approach for recommending new contacts in the social network of mobile phone users. With respect to existing solutions, our approach is characterized by some distinguishing features. In particular, the application we propose does not assume any centralized coordination: it transparently collects and pr...
Conference Paper
Simulation results can only approximate testbed ones but, at the best of our knowledge, only very few papers such as [11, 8, 12, 15] studied the reliability of simulators. In this work, we used the results of some experiments on Motelab [9] testbed as a baseline to evaluate the accuracy of NS-2 [3] and Castalia [10] simulators. Our results show tha...
Article
Full-text available
A sensor network consists of sensing devices which may exchange data through wireless communication; sensor networks are highly energy constrained since they are usually battery operated. Data aggregation is a possible way to save energy consumption: nodes may delay data in order to aggregate them into a single packet before forwarding them towards...
Article
In a sensor network the sensors, or nodes, obtain data and have to communicate these data to a central node. Because sensors are battery powered they are highly energy constrained. Data aggregation can be used to combine data of several sensors into a single message, thus reducing sensor communication costs at the expense of message delays. Thus, t...
Conference Paper
Radio Frequency Identification (RFID) and Near Field Communication (NFC) are promising technologies to build a ubiquitous “Internet of things” and related forms of Human Computer Interaction (HCI). We present here a ubiquitous touch-based remote grocery shopping process fitting well with some RFID’s and NFC’s peculiar benefits and favorable charact...
Article
Full-text available
In [9] we presented a first effort in assessing the reliability of OMNeT++ in the simulation of Wireless Sensor Networks. We showed that OMNeT++ with MACSimulator framework over-estimates the experimental results obtained by a real testbed. In this paper, we extend our analysis to the well known NS-2 simulator and then to Castalia, a new framework...
Article
Full-text available
In this work we present the architecture and im-plementation of WebDust, a software platform for managing multiple, heterogeneous (both in terms of software and hard-ware), geographically disparate sensor networks. We describe in detail the main concepts behind its design, and basic aspects of its implementation, including the services provided to...
Conference Paper
We design and study recommendation algorithms for a fully decentralized scenario in which each item/node of a network recommends other items/nodes only on the basis of simple statistics on the behavior of users that visited the node in the past. We perform a theoretical and experimental study assessing that very simple heuristics can provide recomm...
Conference Paper
Full-text available
Focusing on the assessment of environmental noise pollution in urban areas, we provide qualitative considerations and experimental results to show the feasibility of wireless sensor networks to be used in this context. To select the most suitable data collection protocol for the specific noise monitoring application scenario, we evaluated the energ...
Article
Full-text available
The assessment of environmental pollution levels is a complex and expensive task that public administration and often also private entities are willing or forced to take over. Focusing on the assess-ment of environmental noise pollution in urban areas, we provide qualitative considerations and experimental results to show the fea-sibility of wirele...
Conference Paper
Full-text available
In a sensor network the sensors, or nodes, obtain data and have to communicate these data to a central node. Because sensors are battery powered they are highly energy constrained. Data aggregation can be used to combine data of several sensors into a single message, thus reducing sensor communication costs at the expense of message delays. Thus, t...
Conference Paper
Full-text available
Deployment of sensor networks in real-world settings is a labor-intensive and cumbersome task: environmental influences often trigger problems that are difficult to track down due to limited visibility of the network state. In this paper we present a framework for passive inspection (i.e., no instrumentation of sensor nodes required) of deployed se...
Article
Full-text available
We present an implementation of Rijndael for wireless sensor networks running on Eyes sensor nodes. In previous works, Rijndael has not been considered a suitable encryption algorithm for sensor nodes because it is too slow and requires a large space in memory, a precious resource in this environment. Our implementation of Rijndael is smaller, from...
Conference Paper
Full-text available
In this paper we present a first effort in assessing the reliability of OMNeT++ and the MAC Simulator framework insimulating Wireless Sensor Networks. A collection of metricson the flooding algorithm running on a simple testbed made of few Tmote Sky is used as reference to evaluate the qualityof the simulation results. Our experiments show that sim...
Conference Paper
Full-text available
The paper presents IRIS, an Integrated Routing and Interest dissemination System for wireless sensor networks. The proposed protocols are designed to work under very low duty cycle operations and are jointly optimized for improved efficiency. Routing towards the sink is achieved by exploiting hop count information which is proactively distributed d...
Article
Full-text available
While environmental issues keep gaining increasing atten-tion from the public opinion and policy makers, several ex-periments demonstrated the feasibility of wireless sensor net-works to be used in a large variety of environmental mon-itoring applications. Focusing on the assessment of envi-ronmental noise pollution in urban areas, we provide qual-...
Article
Full-text available
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of dissem-inating a message from a source node to all the nodes in the network. Aim of the proposed techniques is to define broadcasting mechanisms that are simple, thus generating low overhead, energy efficient, for deployment in resource-c...
Article
Full-text available
Bluepleiades is a bluetooth scatternet formation protocol which has been proven to perform well both analytically and by simulations. In this paper we present the implementation of Bluepleiades on two distinct platforms: the DBT-120 and the BTnodes. Our testbed shows that Bluepleiades can be implemented in practice but exhibits decreased performanc...
Conference Paper
Full-text available
A sensor network consists of sensing devices which may exchange data through wireless communication; sensor networks are highly energy constrained since they are usually battery operated. Data aggregation is a possible way to save energy consumption: nodes may delay data in order to aggregate them into a single packet before forwarding them towards...
Conference Paper
High Frequency (HF) passive Radio Frequency IDentica- tion (RFID) is currently a widely adopted technology for mobile HCI with physical objects. Prototypes, pilot projects and industrial systems have been developed in a number of areas mostly following an approach in which RFID tags are either attached to mobile real world entities or carried by mo...
Conference Paper
Full-text available
In this paper we introduce directed diffusion light, a variant of the well-known protocol directed diffusion (DD), which results in significant savings in terms of exchanged control messages and energy consumption, and improvements in network lifetime. Directed diffusion light defines local rules to generate a sparse logical topology over which DD...
Article
Next-generation 3G/4G wireless data networks allow multiple codes (or channels) to be allocated to a single user, where each code can support multiple data rates. Providing fine-grained QoS to users in such networks poses the two-dimensional challenge of assigning both power (rate) and codes to every user. This gives rise to a new class of parallel...
Article
Full-text available
The problem of matching user proles arises in several ap- plications where demand and supply proles need to be matched, e.g., in information systems for recruitment, real estate, or dating agencies. In this paper we present SmartDate, a system that matches proles of users that need to be matched for dating. The system runs on mobile devices and ope...
Conference Paper
In this paper we tackle the problem of designing simple, localized, low energy consuming, reliable protocols for one-to-all communication in large scale wireless sensor networks. Our first proposed technique, called the Irrigator protocol, relies on the idea to first build a sparse overlay network, and then flood over it. The overlay network is set...
Conference Paper
Full-text available
Caching and prefetching have often been studied as separate tools for enhancing the access to the World Wide Web. The goal of this work is to propose integrated Caching and Prefetching Algorithms for improving the performances of web navigation. We propose a new prefetching algorithm that uses a limited form of user cooperation to establish which d...