Maria Carla Calzarossa

Maria Carla Calzarossa
  • Professor (Full) at University of Pavia

About

128
Publications
31,857
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,483
Citations
Current institution
University of Pavia
Current position
  • Professor (Full)

Publications

Publications (128)
Article
Full-text available
Several explainable AI methods are available, but there is a lack of a systematic comparison of such methods. This paper contributes in this direction, by providing a framework for comparing alternative explanations in terms of complexity and robustness. We exemplify our proposal on a real case study in the cybersecurity domain, namely, phishing we...
Article
Full-text available
The pervasiveness of IoT devices in many real-world domains, such as healthcare, agriculture, manufacturing, transportation, offers new interesting opportunities, but at the same time opens new challenges. In fact, to ensure the effectiveness of the innovative smart applications being deployed nowadays in these ecosystems, the mapping between appli...
Conference Paper
Modern IoT ecosystems face many security issues. An aspect often neglected concerns covert channels, which allow for exfiltrating data or preventing detection. To this aim, the Message Queuing Telemetry Transport (MQTT) protocol can be abused to create various hidden communication paths, mainly due to its textual nature. Alas, simpler detection met...
Article
Full-text available
Virtualization and server consolidation are the technologies that govern today’s data centers, allowing both efficient management at the functionality level as well as at the energy and performance levels. There are two main ways to virtualize either using virtual machines or containers. Both have a series of characteristics and applications, somet...
Conference Paper
Phishing is a fraudulent practice aimed at convincing individuals to reveal sensitive information, such as account credentials or credit card details, by clicking the links of malicious websites. To reduce the impacts of phishing, the timely identification of these websites is essential. For this purpose, machine learning models are often devised....
Article
Phishing is a very dangerous security threat that affects individuals as well as companies and organizations. To fight the risks associated with this threat, it is important to detect phishing websites in a timely manner. Machine learning models work well for this purpose as they can predict phishing cases, using information on the underlying websi...
Article
Full-text available
The pervasiveness of complex technological infrastructures and services coupled with the continuously evolving threat landscape poses new sophisticated security risks. These risks are mostly associated with many diverse vulnerabilities related to software or hardware security flaws, misconfigurations and operational weaknesses. In this scenario, a...
Article
Full-text available
Phishing is a security threat with serious effects on individuals as well as on the targeted brands. Although this threat has been around for quite a long time, it is still very active and successful. In fact, the tactics used by attackers have been evolving continuously in the years to make the attacks more convincing and effective. In this contex...
Article
Full-text available
Cloud technologies are being used nowadays to cope with the increased computing and storage requirements of services and applications. Nevertheless, decisions about resources to be provisioned and the corresponding scheduling plans are far from being easily made especially because of the variability and uncertainty affecting workload demands as wel...
Book
Full-text available
This book constitutes the post proceedings of the 28th International Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2020, held online -due to COVID -19- in Nice, France, in November 2020. The 17 full papers presented were carefully reviewed and selected from 124 submissions. The symposium collect...
Article
Full-text available
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly overseen or even ignored. The IoT threat landscape is extremely wide and complex and involves a...
Article
Cloud computing provides cost‐effective solutions for deploying services and applications. Although resources can be provisioned on demand, they need to adapt quickly and in a seamless way to the workload intensity and characteristics and satisfy at the same time the desired performance levels. In this paper, we evaluate the effects exercised by di...
Article
Full-text available
Among the most important reasons why people communicate with each other is to share and support each other through emotional problems, yet most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the development of online emotional support systems, where users needing to speak to someone can anonymously connec...
Chapter
The web is a complex information ecosystem that provides a large variety of content changing over time as a consequence of the combined effects of management policies, user interactions and external events. These highly dynamic scenarios challenge technologies dealing with discovery, management and retrieval of web content. In this paper, we addres...
Article
Data parallel applications are being extensively deployed in cloud environments because of the possibility of dynamically provisioning storage and computation resources. To identify cost-effective solutions that satisfy the desired service levels, resource provisioning and scheduling play a critical role. Nevertheless, the unpredictable behavior of...
Article
Parallelism has many advantages in accelerating compute tasks amenable to speed up. However, whereas parallel processing in an elastic, pay-per-use cloud can generate numerous benefits, there's a hidden downside due to the fundamental statistics and interrelationships of tasks whose completion times are stochastic.
Chapter
Full-text available
Despite the fast evolution of cloud computing, up to now the characterization of cloud workloads has received little attention. Nevertheless, a deep understanding of their properties and behavior is essential for an effective deployment of cloud technologies and for achieving the desired service levels. While the general principles applied to paral...
Article
Workload characterization is a well-established discipline that plays a key role in many performance engineering studies. The large-scale social behavior inherent in the applications and services being deployed nowadays leads to rapid changes in workload intensity and characteristics and opens new challenging management and performance issues. A de...
Article
Full-text available
Internet and online-based social systems are rising as the dominant mode of communication in society. However, the public or semi-private environment under which most online communications operate under do not make them suitable channels for speaking with others about personal or emotional problems. This has led to the emergence of online platforms...
Article
Full-text available
The technologies aimed at Web content discovery, retrieval and management face the compelling need of coping with its highly dynamic nature coupled with complex user interactions. This paper analyzes the temporal patterns of the content changes of three major news websites with the objective of modeling and predicting their dynamics. It has been ob...
Article
News websites are expected to deliver in a timely manner the latest stories as well as their latest developments. Thereby, tools, such as, search engines, need to cope with these rapid and frequent content changes by adjusting their crawling activities accordingly. In this paper we explore and model the properties and temporal behavior of the conte...
Conference Paper
The headers used by the various network protocols represent a good source of information for understanding the behavior and the properties of the traffic and detecting potential security attacks. In this paper we present a comprehensive analysis of the usage patterns of the headers included in the HTTP request messages of the clients. Our study sho...
Conference Paper
The traffic produced by the periodic crawling activities of Web robots often represents a good fraction of the overall websites traffic, thus causing some non-negligible effects on their performance. Our study focuses on the traffic generated on the SPEC website by many different Web robots, including, among the others, the robots employed by some...
Conference Paper
The content of news websites changes frequently and rapidly and its relevance tends to decay with time. To be of any value to the users, tools, such as, search engines, have to cope with the dynamics of websites and detect changes in a timely manner. In this paper we apply time series analysis to study the properties and the temporal patterns of th...
Conference Paper
Web robots periodically crawl Web sites to download their content, thus producing potential bandwidth overload and performance degradation. To cope with their presence, it is then important to understand and predict their behavior. The analysis of the properties of the traffic generated by some commercial robots has shown that their access patterns...
Conference Paper
Full-text available
This paper presents the main results of an extensive monitoring exercise aimed at assessing the role of informatics education in Italian high schools. The investigation focused on the teaching and certification activities performed by the schools as well as on the role and use of information technologies for teaching and communications with the stu...
Conference Paper
Full-text available
Questo articolo presenta i principali risultati di un’indagine condotta nelle Scuole Secondarie di secondo grado di otto Regioni. Allo scopo di ampliare e consolidare i risultati di una precedente indagine rivolta alle Scuole di tre Regioni – Lazio, Lombardia e Puglia – questa nuova indagine, relativa all’anno scolastico 2008-2009, ha coinvolto le...
Conference Paper
Full-text available
Questo articolo presenta i principali risultati di un’indagine condotta nel 2010 e rivolta agli studenti delle Scuole Secondarie di secondo grado di alcune Regioni italiane, che durante i propri studi hanno conseguito la certificazione informatica ECDL presso un Test Center di una Scuola. In questa indagine, si è voluto integrare quanto rilevato ne...
Article
Full-text available
Questo articolo presenta i risultati della seconda rilevazione condotta dall’Osservatorio su Formazione e Certificazione Informatica sulla diffusione delle attività di formazione e certificazione informatica nelle Scuole Secondarie di secondo grado di otto Regioni italiane, relativamente all’anno scolastico 2008-2009. (see http://osservatorio.conso...
Article
Full-text available
L‘indagine, relativa all'anno solare 2008, ha messo in evidenza alcune interessanti tendenze sia in relazione all'attivazione dei progetti ECDL negli Atenei italiani che per quanto riguarda la loro applicazione all'accreditamento delle abilità informatiche di base. Si sono anche notate differenze nelle Facoltà appartenenti alle diverse Aree. Più in...
Article
Full-text available
The evolution of Information and Communication Technology (ICT) has led to the development of Information Society. The Information Society must be built on a foundation in which integrity and rigor for good science promote quality ICT and good ethics will promote good professional practice. These appear to be reasonable causal links but there can b...
Conference Paper
Full-text available
The growing amount of information published on the Web, combined with its dynamic nature, opens many challenging issues dealing with management and retrieval of the information and provisioning of the underlying infrastructures. Search engines have to meet two conflicting requirements: minimize the number of downloads and provide up-to-date informa...
Conference Paper
Full-text available
Web logs are an important source of information to describe and understand the traffic of the servers and its characteristics. The analysis of these logs is rather challenging because of the large volume of data and the complex relationships hidden in these data. Our investigation focuses on the analysis of the logs of two Web servers and identifie...
Conference Paper
Full-text available
This paper presents the main results of two monitoring exercises aimed at analyzing the diffusion of teaching and certification activities of Information and Communication Technologies (ICT) in Italian high schools.
Conference Paper
Full-text available
Questo articolo presenta i risultati di una rilevazione statistica e di un insieme di interviste a studenti sul tema della formazione e certificazione informatica nelle scuole superiori di tre regioni: Lazio, Lombardia e Puglia.
Conference Paper
Full-text available
Questo articolo presenta i risultati di una rilevazione statistica e di un insieme di interviste a studenti sul tema della formazione e certificazione informatica nelle scuole superiori di tre regioni: Lazio, Lombardia e Puglia.
Presentation
Full-text available
C. Alfonsi, E. Breno, M. Calzarossa, P. Ciancarini, M. Genoviè, L. Mich, F. Sala, N. Scarabottolo
Article
The Web has become a ubiquitous tool for distributing knowledge and information and for conducting businesses. To exploit the huge potential of the Web as a global information repository, it is necessary to understand its dynamics. These issues are particularly important for news Web sites as they are expected to provide fresh information on curren...
Article
Full-text available
L’articolo presenta i risultati della prima indagine mirata a censire le attività di formazione e certificazione informatica in un universo molto complesso come quello delle Scuole Secondarie di secondo grado. La rilevazione ha coinvolto le Scuole di tre Regioni (Lazio, Lombardia e Puglia) e un campione di studenti con la certificazione ECDL.
Book
Full-text available
ETHICOMP 2008 has the overall theme of “Living, Working and Learning beyond Technology”. In 1995, Rogerson and Bynum wrote, “The information revolution has become a tidal wave that threatens to engulf and change all that humans value. Governments, organisations and individual citizens therefore would make a grave mistake if they view the computer r...
Conference Paper
Full-text available
EUCIP is a pan-European qualification scheme for people entering the IT profession and for IT professionals wishing to assess their professional development. This paper presents the experiences of the Italian Universities in the framework of the EUCIP programme. We illustrate both the institutional perspective of the Universities and the personal p...
Article
The European Computer Driving Licence (ECDL) programme aims at testing practical skills and competences in using ICT tools. This paper presents the results of a monitoring exercise aimed at analyzing the impact of the ECDL programme in the Italian Universities. The ECDL programme, adopted in most Italian Universities since the year 2000, has involv...
Article
Full-text available
L’articolo presenta lo stato dei progetti di certificazione delle abilità nell’uso delle tecnologie informatiche svolti dagli Atenei Italiani, evidenziandone gli aspetti salienti, l’evoluzione e le principali linee di tendenza. L’articolo presenta anche il punto di vista di un campione di studenti che hanno ottenuto la certificazione ECDL nel corso...
Conference Paper
Full-text available
Sommario Questo articolo presenta i risultati del progetto CampusOne della Conferenza dei Rettori delle Università Italiane (CRUI), con particolare riferimento all'accreditamento delle abilità nell'uso degli strumenti informatici di base. L'articolo analizza il ruolo svolto da CampusOne nella diffusione della certificazione ECDL (European Computer...
Article
Full-text available
Questo articolo presenta i risultati del progetto CampusOne della Conferenza dei Rettori delle Università Italiane (CRUI), con particolare riferimento all'accreditamento delle abilità nell'uso degli strumenti informatici di base. L'articolo analizza il ruolo svolto da CampusOne nella diffusione della certificazione ECDL (European Computer Driving L...
Article
Full-text available
Il presente articolo si propone di fornire una panoramica sul significato complessivo di EUCIP, illustrandone le caratteristiche e le potenzialità non soltanto come strumento di certificazione ma anche come schema di valutazione delle competenze informatiche. L’articolo presenterà inoltre le esperienze maturate nelle Università italiane, focalizzan...
Article
Full-text available
L’articolo discute l’importanza delle competenze e conoscenze informatiche nella formazione universitaria e il ruolo della certificazione di queste competenze. Dopo un esame della situazione italiana riguardo alle competenze informatiche, l’articolo analizza le attività svolte nel recente passato dalle Università e presenta le principali linee evol...
Article
Full-text available
A partire dall’anno 2001, l’Osservatorio delle Certificazioni Informatiche negli Atenei Italiani, patrocinato da AICA e con la collaborazione di CINI e Fondazione CRUI, ha svolto indagini annuali mirate ad analizzare l’introduzione e la diffusione delle certificazioni informatiche nel mondo universitario Italiano, con particolare riferimento alle c...
Chapter
The performance of HPF codes is influenced by the characteristics of the parallel system and by the efficiency of the compilation system. Performance analysis has to take into account all these aspects. We present the integration of a compilation system with a performance analysis tool aimed at the evaluation of HPF+ codes. The analysis is carried...
Article
Full-text available
We present the results of a monitoring exercise whose objectives were to analyze the experiences of the Italian Universities in the framework of the ECDL programme and to assess the impact of the ECDL certification in the Universities. Our investigation focused on the ECDL projects carried out by 50 Universities in the year 2004. The analysis has s...
Conference Paper
Full-text available
We present the results of a monitoring exercise whose objectives were to analyze the experiences of the Italian Universities in the framework of the ECDL programme and to assess the impact of the ECDL certification in the Universities. Our investigation focused on the ECDL projects carried out by 50 Universities in the year 2004. The analysis has s...
Article
Full-text available
Interactive Web services make use of highly dynamic contents. To de-sign efficient mechanisms for the replication and distribution of these contents and to improve the QoS perceived by the users, it is impor-tant to understand how often and to what extent contents change. This paper addresses these issues by studying the dynamic behavior of the con...
Article
Full-text available
Questo documento presenta i risultati sulla diffusione delle certificazioni informatiche negli Atenei Italiani nell’anno solare 2004, con particolare riferimento alle certificazioni supportate da AICA (Associazione Italiana per l’Informatica e il Calcolo Automatico http://www.aicanet.it).
Conference Paper
Full-text available
Web pages are created, modified and removed at unspecified times by their owners. The frequency and extent of changes to Web pages vary across sites and across pages within sites. These changes influence the quality of the information retrieved from the Web and to some extent the delays experienced by the users. Our study focuses on the analysis of...
Conference Paper
Full-text available
Web sites have become increasingly complex and oer a large variety of services and contents. The proliferation of dynamic Web con- tents opens up new challenging performance and scalability issues. This paper addresses the characterization of dynamic Web contents by study- ing their update process. We identify parameters and metrics that de- scribe...
Chapter
Full-text available
Electronic mail is the core of modern communications. People rely on email to conduct their business and stay in touch with families and friends. The ubiquity and popularity of email make its QoS an important issue. Performance of mail systems is the result of the interactions between their hardware and software components and the user behavior, th...
Article
Tuning and debugging the performance of parallel applications is an iterative process consisting of several steps dealing with identification and localization of inefficiencies, repair, and verification of the achieved performance. In this paper, we address the analysis of the performance of parallel applications from a methodological viewpoint wit...
Article
Performance evaluation studies are to be an integral part of the design and tuning of parallel applications. Their structure and their behavior are the dominating factors. We propose a hierarchical approach to the systematic characterization of the workload of a parallel system, to be kept as modular and flexible as possible. The methodology is bas...
Article
Full-text available
Al fine di analizzare l’introduzione e l’impatto dell’ECDL negli Atenei, l’AICA ha stipulato un accordo di collaborazione con il CINI (Consorzio Interuniversitario Nazionale per l’Informatica) che prevede la partecipazione della Fondazione CRUI. Nell’ambito di tale accordo opera una Commissione, presieduta dalla Prof. M. Calzarossa dell’Università...
Conference Paper
The fast technological evolution and the convergence of fixed and mobile communication infrastructures have led to the realization of a large variety of innovative applications and services that have become an integral part of our society. Efficiency, reliability, availability and security, i.e., quality of service, are fundamental requirements for...
Conference Paper
Full-text available
Parallel programs experience performance inefficiencies as a result of dependencies, resource contentions, uneven work distributions and loss of synchronizations among processors. The analysis of these inefficiencies is very important for tuning and performance debugging studies. In this paper we address the identification and localization of perfo...
Conference Paper
Electronic mail is the core of modern communications. People rely on email to conduct their business and stay in touch with families and friends. The ubiquity and popularity of email make its QoS an important issue. Performance of mail systems is the result of the interactions between their hardware and software components and the user behavior, th...
Book
G-Networks: Multiple Classes of Positive Customers, Signals, and Product Form Results.- Spectral Expansion Solutions for Markov-Modulated Queues.- M/G/1-Type Markov Processes: A Tutorial.- An Algorithmic Approach to Stochastic Bounds.- Dynamic Scheduling via Polymatroid Optimization.- Workload Modeling for Performance Evaluation.- Capacity Planning...
Conference Paper
Full-text available
High-performance computing (HPC) programmers utilize tracefiles, which record program behavior in great detail, as the basis for many performance analysis activities. The lack of generally accessible tracefiles has forced programmers to develop their own testbeds in order to study the basic performance characteristics of the platforms they use. Sin...
Article
Electronic mail has become an integral part of our daily lives. With this trend, mail servers have to provide a fast, highly available, reliable and secure service. Hence, workload characterization and performance evaluation of mail servers are to be addressed as primary issues. This paper deals with a detailed characterization of mail server workl...
Conference Paper
Full-text available
Tracefiles provide a convenient record of the behavior of HPC programs, but are not generally archived because of their storage requirements. This has hin- dered the developers of performance analysis tools, who must create their own tracefile collections in order to test tool functionality and usability. This paper describes a shared databank wher...
Article
The performance of High Performance Fortran (HPF) applications depends on their inherent parallelism and on the strategies adopted by compilers to distribute work and data among the processors. The evaluation of the performance of these applications has to consider all the aspects which in different ways determine such performance. The experimental...
Conference Paper
Full-text available
The performance of any type of system cannot be determined without knowing the workload, that is, the requests being processed. Workload characterization consists of a description of the workload by means of quantitative parameters and functions; the objective is to derive a model able to show, capture, and reproduce the behavior of the workload an...
Article
Full-text available
Loops represent the core of most applications in that they contain the bulk of the computations. An efficient parallelization of loops leads to good overall performance of the applications. High Performance Fortran provides a set of directives to be used to exploit the potential parallelism of the code. Our studies focus on the analysis of the perf...
Article
Although the performance of a system is determined by the characteristics of the load being processed, much more care is usually devoted to the construction of a detailed system model than to an accurate definition of the workload model. A precise description of actual workloads is obtained with multiclass workload models. Major difficulties on the...
Conference Paper
Full-text available
. The performance of HPF codes is influenced by the characteristics of the parallel system and by the efficiency of the compilation system. Performance analysis has to take into account all these aspects. We present the integration of a compilation system with a performance analysis tool aimed at the evaluation of HPF+ codes. The analysis is carrie...
Conference Paper
Full-text available
The performance of parallel programs is influenced by the multiplicity of hardware and software components involved in their executions. Experimental approaches, where trace files collected at run-time by monitors are the basis of the analyses, allow a detailed evaluation of the performance. Quantitative as well as qualitative information related t...
Conference Paper
Full-text available
Performance evaluation studies are to be an integral part of the design and tuning of parallel applications. Their structure and their behavior are the dominating factors. We propose a hierarchical approach to the systematic characterization of the workload of a parallel system, to be kept as modular and flexible as possible. The methodology is bas...

Network

Cited By