Danilo Caivano

Danilo Caivano
  • University of Bari Aldo Moro

About

217
Publications
48,022
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,993
Citations
Current institution
University of Bari Aldo Moro

Publications

Publications (217)
Article
Full-text available
With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand, Qua...
Article
Full-text available
Computer architecture is considered one of the dry and hard-to-learn courses for students in the computer science discipline. Therefore, educational institutions experiment with different pedagogical approaches to enhance students’ performance and interest in courses. This study introduces a Simplified Approach to Teach a Processor (SAtTaP), a refo...
Article
Full-text available
Currently and in the near future, Smart Cities are vital to enhance urban living, address resource challenges, optimize infrastructure, and harness technology for sustainability, efficiency, and improved quality of life in rapidly urbanizing environments. Owing to the high usage of networks, sensors, and connected devices, Smart Cities generate a m...
Conference Paper
Smart Cities attract significant attention and investment from government and private entities, leading to their rapid development. With such growth in Smart Cities, data volume and diversity increase due to Internet of Things (IoT) sensors in devices. However, this abundance of data exposes millions of vulnerable devices to cyber threats, risking...
Conference Paper
With the adoption of advanced technology in the automotive field, managing the risks of attack in modern vehicles becomes essential. Some research works substantially exploit Machine Learning algorithms to identify threats conducted on vehicles, particularly on the Controller Area Network (CAN) bus. Therefore, it is necessary not only to use Intrus...
Chapter
Full-text available
The technology inside modern vehicles is rapidly growing and poses newer security risks, as vehicle communication protocols are not yet fully secured and vulnerable to attacks. Consequently, the implementation of automotive cybersecurity systems has gained more attention. Controller Area Network (CAN) is one of the most studied communication protoc...
Chapter
We present the results of a prospective observational study aimed to understand whether there is a relationship between personality traits (i.e., agreeableness, conscientiousness, extroversion, neuroticism, and openness) and the performance of undergraduates in Computer Science while accomplishing bug fixing. We involved 62 undergraduates, who took...
Chapter
Smart Cities are becoming a reality now with ample interest and investment from both government and private entities. As the number of Smart Cities increases, so does the sheer size and variety of data, the major part of which comes from Internet of Things (IoT) sensors embedded in devices. Millions of intelligent devices may be vulnerable to cyber...
Conference Paper
Full-text available
In recent months, the social impact of Artificial Intelligence (AI) has gained considerable public interest, driven by the emergence of Generative AI models, ChatGPT in particular. The rapid development of these models has sparked heated discussions regarding their benefits, limitations, and associated risks. Generative models hold immense promise...
Article
Full-text available
Remote usability testing is performed by evaluators who are in different physical locations from the participants (synchronous remote testing) and possibly operating at different times (asynchronous remote testing). The tools developed in recent years to support remote tests exploit web technology based on HTML5 and JavaScript ES6 and thus enable p...
Preprint
Full-text available
In the last years, the raise of Artificial Intelligence (AI), and its pervasiveness in our lives, has sparked a flourishing debate about the ethical principles that should lead its implementation and use in society. Driven by these concerns, we conduct a rapid review of several frameworks providing principles, guidelines, and/or tools to help pract...
Article
Full-text available
The Information Security Management Systems (ISMS) are global and risk-driven processes that allow companies to develop their cybersecurity strategy by defining security policies, valuable assets, controls, and technologies for protecting their systems and information from threats and vulnerabilities. Despite the implementation of such management i...
Research Proposal
Full-text available
We propose the first edition of the workshop on Cyber Security Education for Industry and Academia (CSE4IA) to be co-located with the next edition of IS-EUD 2023. Cybersecurity education has become increasingly important in recent years due to the shortage of cybersecurity professionals in the international job market. To address this challenge, it...
Article
Full-text available
Background. Dead code is a code smell. It can refer to code blocks, fields, methods, etc. that are unused and/or unreachable—e.g., if a method is unused and/or unreachable, it is a dead method. Past research has shown that the presence of dead code in source code harms its comprehensibility and maintainability. Nevertheless, there is still little e...
Conference Paper
The new breed of vehicles comes stashed with cutting-edge technologies. The in-vehicle communication system (CAN Bus) smartly connects to all such Electronic Control Units (ECU) to enhance the safety, security, and stability of the vehicle, driver, and passengers. We need efficient and real-time Intrusion Detection Systems (IDS) to prevent threats...
Conference Paper
In the last years, the raise of Artificial Intelligence (AI), and its pervasiveness in our lives, has sparked a flourishing debate about the ethical principles that should lead its implementation and use in society. Driven by these concerns, we conduct a rapid review of several frameworks providing principles, guidelines, and/or tools to help pract...
Article
Full-text available
Integrating embedded systems into next-generation vehicles is proliferating as they increase safety, efficiency, and driving comfort. These functionalities are provided by hundreds of electronic control units (ECUs) that communicate with each other using various protocols that, if not properly designed, may be vulnerable to local or remote attacks....
Chapter
Full-text available
The digital transformation and innovation of today’s environment requires a focus on the security of systems to preserve their confidentiality, integrity, and availability. Considering these needs, in this work an efficient and high-performance intrusion detection system based on Quantum Annealing is presented. The goal is to identify attacks in an...
Article
Background Conversational agents are currently a valid alternative to humans in first-level interviews with users who need information, even in-depth, about services or products. In application domains such as health care, this technology can become pervasive only if the perceived ”quality in use” is appropriate. How to measure chatbot quality is a...
Conference Paper
The digital transformation and innovation of today’s environment requires a focus on the security of systems to preserve their confidentiality, integrity, and availability. Considering these needs, in this work an efficient and high-performance intrusion detection system based on Quantum Annealing is presented. The goal is to identify attacks in an...
Article
Full-text available
Background . Conversational agents are currently a valid alternative to humans in first-level interviews with users who need information, even in-depth, about services or products. In application domains such as health care, this technology can become pervasive only if the perceived “quality in use” is appropriate. How to measure chatbot quality is...
Article
The research on the claimed effects of Test-Driven Development (TDD) on software quality and developers’ productivity has shown inconclusive results. Some researchers have ascribed such results to the negative affective reactions that TDD would provoke when developers apply it. In this paper, we studied whether and in which phases TDD influences th...
Conference Paper
Full-text available
The use of technology to make a city smart provides opportunities and threats. Cities can be analyzed from different perspectives and dimensions. This paper addresses the level of security of Smart Cities derived by the observation of their technological level, according to a model that also considers several application domains. As a case study, t...
Conference Paper
Full-text available
Nowadays, software development must face the challenge of integrating security and privacy elements from the earliest stages of any software development process. A correct and complete implementation starting from the requirements definition allows to significantly increase the security level of each single phase/iteration and consequently of the f...
Article
Full-text available
In recent years, we have been witnessing a rapid increase of research on exergames— i.e., computer games that require users to move during gameplay as a form of physical activity and rehabilitation. Properly balancing the need to develop an effective exercise activity with the requirements for a smooth interaction with the software system and an en...
Preprint
In this paper, we investigate the effect of TDD, as compared to a non-TDD approach, as well as its retainment (or retention) over a time span of (about) six months. To pursue these objectives, we conducted a (quantitative) longitudinal cohort study with 30 novice developers (i.e., third-year undergraduate students in Computer Science). We observed...
Article
In this paper, we investigate the effect of TDD, as compared to a non-TDD approach, as well as its retainment (or retention) over a time span of (about) six months. To pursue these objectives, we conducted a (quantitative) longitudinal cohort study with 30 novice developers (i.e., third-year undergraduate students in Computer Science). We observed...
Article
In the context of digital transformation, companies are increasingly forced to develop, manage and continually align IT and business. Companies have found in Enterprise Architecture (EA) a valuable tool to represent and manage IT and business in a holistic way by establishing connections among technology concerns and business/strategical/motivation...
Chapter
Mechanical heart valve dysfunction can develop in as little as a few weeks, often causing a heart attack or serious complications. Investigating the altered acoustic characteristics of the cardiac tones in a mechanical valve may allow the early identification of valve malfunction. Nowadays, it is essential to equip a transplanted patient with innov...
Chapter
Internet of Things (IoT), and in general the Internet of Everything (IoE), are deeply influencing the business processes Digital Transformation, also in the Public Administration context, introducing new actors and interactions among People, Process, Data and Things. Therefore, a re-design of the processes or the creation of new ones is necessary,...
Chapter
Researchers have shown a growing interest in the affective states (i.e., emotions and moods) of developers while performing software engineering tasks. We investigate the association between developers’ sentiment polarity—i.e., negativity and positivity—and bug introduction. To pursue our research objective, we executed a case-control study in the...
Conference Paper
Nowadays, the dimension and complexity of software development projects increase the possibility of cyber-attacks, information exfiltration and data breaches. In this context, developers play a primary role in addressing privacy requirements and, consequently security, in software applications. Currently, only general guidelines exist that are diff...
Article
Full-text available
As a consequence to factors such as progress made by the attackers, release of new technologies and use of increasingly complex systems, and threats to applications security have been continuously evolving. Security of code and privacy of data must be implemented in both design and programming practice to face such scenarios. In such a context, thi...
Article
Full-text available
The diffusion of connected devices in modern vehicles involves a lack in security of the in-vehicle communication networks such as the controller area network (CAN) bus. The CAN bus protocol does not provide security systems to counter cyber and physical attacks. Thus, an intrusion-detection system to identify attacks and anomalies on the CAN bus i...
Article
Full-text available
The diffusion of embedded and portable communication devices on modern vehicles entails new security risks since in-vehicle communication protocols are still insecure and vulnerable to attacks. Increasing interest is being given to the implementation of automotive cybersecurity systems. In this work we propose an efficient and high-performing intru...
Article
Full-text available
Integrated clinical pathways (ICPs) are task-oriented care plans detailing the essential steps of the therapeutic pathway referring to a specific clinical problem with a patient’s expected clinical course. ICPs represent an effective tool for resource management in the public and private health domains. To be automatically executed, the ICP process...
Article
Full-text available
Contribution: This paper examines the literature dealing with the non-invasive estimate of anemia (NEA), and analyzes if the research is developing scientifically with adequate empirical validation. This paper reveals a trend in NEA studies towards an increasing interest in estimating anemia using conjunctiva pallor. Background: Supporting clinical...
Chapter
Full-text available
Test-Driven Development (TDD) is an incremental approach to software development. Despite it is claimed to improve both quality of software and developers’ productivity, the research on the claimed effects of TDD has so far shown inconclusive results. Some researchers have ascribed these inconclusive results to the negative affective states that TD...
Preprint
Test-driven Development (TDD) is an incremental approach to software development. Despite it is claimed to improve both quality of software and developers' productivity, the research on the claimed effects of TDD has so far shown inconclusive results. Some researchers have ascribed these inconclusive results to the negative affective states that TD...
Article
Full-text available
Context. A Smart city is intended as a city able to offer advanced integrated services, based on information and communication technology (ICT) technologies and intelligent (smart) use of urban infrastructures for improving the quality of life of its citizens. This goal is pursued by numerous cities worldwide, through smart projects that should con...
Article
Full-text available
Daily experiences in working with various types of computer systems show that, despite the offered functionalities, users have many difficulties, which affect their overall User eXperience (UX). The UX focus is on aesthetics, emotions and social involvement, but usability has a great influence on UX. Usability evaluation is acknowledged as a fundam...
Chapter
We study whether and in which phase Test-Driven Development (TDD) influences affective states of novice developers in terms of pleasure, arousal, dominance, and liking. We performed a controlled experiment with 29 novice developers. Developers in the treatment group performed a development task using TDD, whereas those in the control group used a n...
Conference Paper
Full-text available
Anemia is diagnosed by measuring the blood concentration of hemoglobin (Hb). In the literature, many studies have aimed to diagnose anemia with non-invasive methods, for example, estimating the pallor of the conjunctiva by means of digital images. In this way, this paper aims to identify a procedure for the automatic segmentation and optimization o...
Chapter
Threats to applications security are continuously evolving thanks to factors such as progress made by the attackers, release of new technologies, use of increasingly complex systems. In this scenario, it is necessary to implement both design and programming practices that guarantee the security of the code on one hand, and the privacy of the data,...
Article
Full-text available
The potential for visually detectable clinical signs of anaemia and their correlation with the severity of the pathology have supported research on non-invasive prevention methods. Physical examination for a suspected diagnosis of anaemia is a practice performed by a specialist to evaluate the pallor of the exposed tissues. The aim of the research...
Preprint
We study whether and in which phase Test-Driven Development (TDD) influences affective states of novice developers in terms of pleasure, arousal, dominance, and liking. We performed a controlled experiment with 29 novice developers. Developers in the treatment group performed a development task using TDD, whereas those in the control group used a n...
Conference Paper
Full-text available
Nowadays cyber security is becoming an ever more stringent requirement and warned by organizations and companies all over the world. Furthermore, the educational offer on the topic is still modest and universities are struggling to design training courses capable of producing professionals directly employable. In this work, this need is addressed w...
Chapter
In this paper, we propose the Personal Health Electronic Record (PHER), a new type of Patient Health Record. This record aims to help physicians shift from a medical practice that is often based on their personal opinion or experience towards one of evidence based medicine, thus improving the communication among patients and their care providers an...
Chapter
The increasing availability of low-cost smart devices is bringing them to be used more and more in the smart home. However, the development of a smart home environment requires to take into account several aspects. First of all, designers must consider the end user (namely the person that actually uses the smart home), and not only the technology,...
Chapter
Aging population is a global concern, but the situation is even worst in developing countries where the migration of the active population from rural areas to major cities makes the elderly left in their home in the village, usually assisted by close relatives who take care of them. Far distance to accessing good health facilities provided in the c...
Chapter
Internet of Things (IoT) is now pervasive in most business and Public Administration processes. Along with the dizzying development of technological solutions, in recent years new methodological approaches are emerging with the objective of abstracting IoT functionalities, in order to manage them as resources in project management methodologies. A...
Article
Full-text available
The Internet of Things becomes Internet of Everything when in the process of communication machine-to-machine also intelligent forms of communication between human and machine are involved. Cities can be viewed as a microcosm of this interconnected system where ICT and emerging technologies can be enabling factors to transform cities in Smart Citie...
Book
Significant challenges will have to be overcome to achieve the level of agricultural productivity necessary to meet the predicted world demand for food, feed, fiber, and fuel in 2050. Although agriculture has met significant chal¬lenges in the past, targeted increases in productivity will have to be made by 2050, in the face of stringent constraint...
Conference Paper
Full-text available
We propose to create a system that, by exploiting the possibilities provided by the Internet of Things (IoT), offers a cheap and affordable solution to prevent and control health problems of people, especially elderly, living in rural villages, where assessing good health facilities is a major concern. The system consists of a heterogeneous combina...
Conference Paper
Big Data (BD) solutions are designed to better support decision-making processes in order to optimize organizational performance. These BD solutions use company’s core business data, using typically large datasets. However, data that doesn’t meet adequate quality levels will lead to BD solutions that will not produce useful results, and consequentl...
Conference Paper
The constantly increasing importance of cloud computing and Internet of Things (IoT) has led to solutions able to integrate heterogenous and diverse systems as well manage big data. This is especially true in Smart City environments with respect to traffic monitoring. Furthermore, cloud computing, and the various technologies around it are quickly...
Conference Paper
Background: Test-Driven Development (TDD) is an agile software development practice, which is claimed to boost both external quality of software products and developers' productivity. Aims: We want to study: (i) the TDD effects on the external quality of software products as well as the developers' productivity; and (ii) the retainment of TDD over...
Article
Full-text available
Medical practice for determining haemoglobin (Hb) concentration, which is important for anaemic patients in need of blood transfusion, requires a blood sample. In this paper, we propose a non-invasive approach to Hb estimation based on the image analysis of a specific conjunctival region. Our goal is to develop a device that is not expensive and si...
Preprint
Full-text available
Background: Test-Driven Development (TDD) is an agile software development practice, which is claimed to boost both external quality of software products and developers' productivity. Aims: We want to study (i) the TDD effects on the external quality of software products as well as the developers' productivity, and (ii) the retainment of TDD over a...
Chapter
In recent years, cytological observations in the rhinological field are being increasingly utilized. This development has taken place over the last two decades and has proven to be fundamental in defining new nosological entities and in driving changes in the previous classification of rhinopathies. The simplicity of the technique and its low invas...
Article
Business processes modeling has proven to be effective and reverse engineering techniques with which to recover business process models when they are missing or outmoded have therefore emerged. Regrettably, these techniques often lead to models with quality flaws and consequently to models with low levels of understandability and modifiability. Ref...
Article
Designing tools that allow end users to easily control and manage a smart home is a critical issue that researchers in Ambient Intelligence and Internet of Things have to address. Because of the variety of available solutions, with their advantages and limitations, it is not straightforward to understand which are the requirements that must be sati...
Conference Paper
The current Internet of Things (IoT) market proposes a wide variety of devices with complex design and different functionality. In addition, the same IoT device can be used in different domains, from home to industry, to healthcare. The management of such devices occurs in different ways, for example through visual interaction using high level prog...
Article
This paper examines the cloud computing for education (CCE) literature, and analyzes if the research is developing scientifically with adequate empirical validation. All aspects of empirical investigations covered in the literature are shown as weak, hence, the necessary scientific development of CCE requires extending its scope of interest, and in...
Conference Paper
Full-text available
The two communities of Software Engineering and Human-Computer Interaction tackle issues related to the software development process differently although with the same final goal: that of developing high quality software most effectively. This workshop has reached its third edition and is continuing to pursue the positive results achieved in previo...
Article
Full-text available
Patients with Parkinson's disease may have difficulties in speaking because of reduced coordination of the muscles that control breathing, phonation, articulation and prosody. Symptoms that may occur are weakening of the volume of the voice, voice monotony, changes in the quality of the voice, the speed of speech, uncontrolled repetition of words,...
Conference Paper
Full-text available
Nowadays, the low cost of smart objects and their variety in the mass market is resulting in a more and more pervasiveness of Internet of Things in our houses. This paper describes We@Home, a mobile application for smart home control that enables the collaboration within a group of people (e.g., a family) living in the same environment and interest...
Conference Paper
Full-text available
Software Engineering and Human-Computer Interaction look at the development process from different perspectives. They apparently use very different approaches, are inspired by different principles and address different needs. But, they definitively have the same goal: develop high quality software in the most effective way. The second edition of th...
Chapter
The integration of Human-Centred Design (HCD) and Agile software development approaches is gaining momentum in both the Human-Computer Interaction and Software Engineering communities. The common principles shared by the two approaches, i.e., iterative design, user involvement, continuous testing and prototyping, should facilitate their integration...
Chapter
Objective—Explore the relation between developers, a Knowledge Experience Base (KEB) called PROMETHEUS and their presentation in the development of enterprise applications used to propose a theory that expresses relations based on empirical evidences. Methods—Case study carried out in a real context with 5 development teams each of 6 staff members,...
Conference Paper
Full-text available
Patients with Parkinson's disease may have difficulties in speaking because of the reduced coordination of the muscles that control breathing, phonation, articulation and prosody. Symptoms that may occur because of changes are weakening of the volume of the voice, voice monotony, changes in the quality of the voice, speed of speech, uncontrolled re...
Book
This book constitutes the revised selected papers of the 10th Italian Workshop on Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, WIVACE 2015, held at Bari, Italy, in September 2015. The 18 papers presented have been thoroughly reviewed and selected from 45 submissions. They cover the following topics: evolutionary comp...
Conference Paper
Full-text available
Recent efforts have contributed to reduce the gap between Software Engineering and HCI for what concerns usability, however, this has not led to expected results and impacts in terms of the software development process where the debate is still open. The overall goal of this workshop has been to raise the level of engagement and discussion about hu...
Article
According to the Project Management Institute (PMI) project management consists of planning, organizing, motivating and controlling resources such as time and cost in order to produce products with acceptable quality levels. As so, project managers must monitor and control project execution, i.e. verify actual progress and performance of a project...
Article
Cloud computing is becoming more and more adopted as infrastructure for providing service oriented solutions. Such a solution is especially critical when software and hardware resources are remotely distributed. In this paper we illustrate our experience in designing the architecture of a community cloud infrastructure in an industrial project rela...
Article
Although the UML is considered to be the de facto standard notation with which to model software, there is still resistance to model-based development. UML modeling is perceived to be expensive and not necessarily cost-effective. It is therefore important to collect empirical evidence concerning the conditions under which the use of UML makes a pra...
Article
Reverse engineering of business process enables business process to be discovered and retrieved from existing information systems, which embed many business rules that are not available anywhere else. These techniques are especially useful when business process models are unavailable, outdated, or misaligned because of uncontrolled maintenance. Rev...
Article
Integration of human-centered design in a company's software development practice requires a thorough analysis of its current practices by both researchers and practitioners.
Conference Paper
Full-text available
In this paper we propose the Electronic Multimedia Health Fascicle (EMHF), a truly new software system for the very large number of available electronic health records. It allows the physician to see at a glance the patient's clinical biometric measurements and biologic parameters, so as to be able to link any alarming physical status to his recent...

Network

Cited By