Mauro Iacono

Mauro Iacono
Università degli Studi della Campania "Luigi Vanvitelli · Dipartimento di Matematica e Fisica

Dr. Prof. Ing.

About

129
Publications
18,439
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,377
Citations
Introduction
Mauro Iacono currently works at the Dipartimento di Matematica e Fisica, Università degli Studi della Campania "Luigi Vanvitelli". Mauro does research in Computer Science and Software Engineering.
Additional affiliations
July 2016 - November 2019
Università degli Studi della Campania "Luigi Vanvitelli
Position
  • Professor (Assistant)
July 2006 - July 2016
Università degli Studi della Campania "Luigi Vanvitelli
Position
  • Professor
June 2006 - July 2016
Università degli Studi della Campania "Luigi Vanvitelli
Position
  • Professor (Assistant)
Education
November 1999 - January 2002
November 1993 - November 1999
University of Naples Federico II
Field of study
  • Computer Engineering

Publications

Publications (129)
Conference Paper
The diffusion of intelligent services and the push for the integration of computing systems and services in the environment in which they operate require a constant sensing activity and the acquisition of di↵erent information from the environment and the users. Health monitoring, domotics, Industry 4.0 and environmental challenges leverage the avai...
Article
Full-text available
The wide use of IT resources to assess and manage the recent COVID-19 pandemic allows to increase the effectiveness of the countermeasures and the pervasiveness of monitoring and prevention. Unfortunately, the literature reports that IoT devices, a widely adopted technology for these applications, are characterized by security vulnerabilities that...
Chapter
Internet of Things (IoT) is a well established approach used for the implementation of surveillance systems that are suitable for monitoring large portions of territory. Current developments allow the design of battery powered IoT nodes that can communicate over the network with low energy requirements and locally perform some computing and coordin...
Chapter
Blockchains provide a valid and profitable support for the implementation of trustable and secure distributed ledgers, in support to groups of subjects that are potentially competitors in conflict of interest but need to share progressive information recording processes. Blockchains prevent data stored in blocks from being altered or deleted, but t...
Chapter
Simulation of second-order fluid models requires specific techniques due to the continuous randomness of the considered processes. Things become particularly difficult when considering several dimensions, where correlation occurs, and classical concepts like absorption and reflection require specific extensions. In this work, we will focus on three...
Conference Paper
Local pollution is a problem that affects urban areas and has effects on the quality of life and on health conditions. In order to not develop strict measures and to better manage territories, the national authorities have applied a vast range of predictive models. Actually, the application of machine learning has been studied in the last decades i...
Article
The COVID-19 emergency suddenly obliged schools and universities around the world to deliver on-line lectures and services. While the urgency of response resulted in a fast and massive adoption of standard, public on-line platforms, generally owned by big players in the digital services market, this does not sufficiently take into account privacy-r...
Article
Full-text available
We applied a flexible modeling technique capable of representing dynamics of large populations interacting in space and time, namely Markovian Agents, to study the evolution of COVID-19 in Italy. Our purpose was to show that this modeling approach, that is based on mean field analysis models, provides good performances in describing the diffusion o...
Article
Blockchain technologies and distributed ledgers enable the design and implementation of trustable data logging systems that can be used by multiple parties to produce a non-repudiable database. The case of Internet of Vehicles may greatly benefit of such a possibility to track the chain of responsibility in case of accidents or damages due to bad o...
Preprint
Full-text available
This is the draft of the Call for paper for PCEIoT 2021 Workshop
Chapter
This chapter introduces the different background material needed to understand the next three Chapters respectively presenting the Cyber-Physical Systems (CPS), Multi-Paradigm Modelling (MPM) and Multi-Paradigm Modelling for Cyber-Physical Systems (MPM4CPS) ontologies. It first introduces the approach and tools that have been used to define the ont...
Chapter
This chapter presents the ontology for Multi-Paradigm Modelling (MPM) specfied using the Web Ontology Language (OWL) as introduced in Chapter 2. A thorough state of the art on MPM's core notions including multi-formalism and model management approaches, languages and tools is presented. In particular, model management approaches have been character...
Chapter
Developing new competitive approaches to the physical and virtual world integration with cyber-physical systems (CPS) is one of the European Union research priorities. CPS change the way people interface with systems, similarly to the way in which the Internet has transformed the way people interface with information. The two-hemisphere model-drive...
Chapter
In this chapter a feature-based ontology of cyber-physical systems is provided. We have adopted feature modelling to represent the common and variant features of a CPS. The CPS feature model has been developed after a thorough domain analysis on CPS. The resulting feature model shows the configuration space for developing CPSs. Two different case s...
Book
This book constitutes the refereed proceedings of the 17th European Workshop on Computer Performance Engineering, EPEW 2021, and the 26th International Conference, on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2021, held in December 2021. The conference was held virtually due to COVID 19 pandemic. The 29 papers presented...
Article
Full-text available
Technological development and market expansion offer an increased availability of resources and computing power on IoT nodes at affordable cost. The edge computing paradigm allows keeping locally on the edge of the network a part of computing, while keeping all advantages of the cloud and adding support for privacy, real-time and network resilience...
Article
Technological development and market expansion offer an increased availability of resources and computing power on IoT nodes at affordable cost. The edge computing paradigm allows keeping locally on the edge of the network a part of computing, while keeping all advantages of the cloud and adding support for privacy, real-time and network resilience...
Article
Full-text available
In this paper we present a modeling approach suitable for practical evaluation of the delays that may affect security monitoring systems in (multitenant) cloud based architecture, and in general to support professionals in planning and evaluating relevant parameters in dealing with new designs or migration projects. The approach is based on modular...
Chapter
Cloud Computing has made possible flexible resources provisioning from an almost unlimited pool. This has created the opportunity to broaden the horizon of data that can be analyzed, allowing to support the so called Big Data Analytics applications. New programming paradigms, such as NoSQL queries and Map-Reduce applications, have emerged within fr...
Article
Full-text available
Different paradigms have been used to model the behaviour of pedestrians in a crowd. While some approaches analyze the modelization of crowd motion from a physical perspective, other techniques prefer to focus on similar abstractions following classic paradigms, such as mobile agents or cellular automata, or even from the point of view of social fo...
Conference Paper
Low cost monitoring of road traffic can bring a significant contribution to use the smart cities perspective for safety. The possibility of sensing and classifying vehicles and march conditions by means of simple physical sensors may support both real time applications and studies on traffic dynamics, e.g. support and assistance for car crashes and...
Article
Smart streets promise widely available traffic information to help improve people’s safety. Unfortunately, gathering that data may threaten privacy. We describe an architecture that exploits a blockchain and the Internet of Vehicles and show its compliance with the General Data Protection Regulation.
Conference Paper
The gaseous emissions derived from industrial plants are generally subject to a strictly program of monitoring, both continuous or one-spot, in order to comply with the limits imposed by the permitting license. Nowadays the problem of odour emission, and the consequently nuisance generated to the nearest receptors, has acquired importance so that i...
Conference Paper
Internet of Things (IoTs) services and data-centric systems allow smart and efficient information exchanging. Anyway, even if existing IoTs and cyber security architectures are enforcing, they are still vulnerable to security issues, as unauthorized access, data breaches, intrusions. They can't provide yet sufficiently robust and secure solutions t...
Article
Advances in technology and the rise of new computing paradigms, such as Fog computing, may boost the definition of a new generation of advanced support services in critical applications. In this paper we explore the possibilities of a Wireless Sensor Network support (WSN) for a Fog computing system in an emergency management architecture that has b...
Chapter
The role of remote resources, such as the ones provided by Cloud infrastructures, is of paramount importance for the implementation of cost effective, yet reliable software systems to provide services to third parties. Cost effectiveness is a direct consequence of a correct estimation of resource usage, to be able to define a budget and estimate th...
Article
Full-text available
Complexity of current computer networks, including e.g., local networks, large structured networks, wireless sensor networks, datacenter backbones, requires a thorough study to perform analysis and support design. Simulation is a tool of paramount importance to encompass all the different aspects that contribute to design quality and network perfor...
Book
This book constitutes the refereed proceedings of the 16th European Workshop on Computer Performance Engineering, EPEW 2019, held in Milan, Italy, in November 2019. The 10 papers presented in this volume together with one invited talk were carefully reviewed and selected from 13 submissions. The papers presented at the workshop reflect the diversit...
Article
Modern warehouse-scale computing facilities, seamlessly enabled by virtualisation technologies, are based on thousands of independent computing nodes that are administered according to efficiency criteria that depend on workload. Networks play a pivotal role in these systems, as they are likely to be the performance bottleneck, and because of the h...
Article
Modern warehouse-scale computing facilities, seamlessly enabled by virtualisation technologies, are based on thousands of independent computing nodes that are administered according to efficiency criteria that depend on workload. Networks play a pivotal role in these systems, as they are likely to be the performance bottleneck, and because of the h...
Cover Page
Proceedings of the 33rd International ECMS Conference on Modelling and Simulation ECMS 2019 June 11th – June 14th, 2019 Caserta, Italy
Conference Paper
Modern networking is moving towards exploitation of autonomic features into networks to reduce management effort and compensate the increasing complexity of network infrastructures, e.g. in large computing facilities such the data centers that support cloud services delivery. Autonomicity provides the possibility of reacting to anomalies in network...
Article
The edge computing paradigm enhances the exploitability of cloud computing by providing, in principle, the means to overcome the limitations in terms of responsiveness, bandwidth needs, privacy and availability in critical applications. By moving some of the components of the system towards the physical location where results are timely needed, it...
Chapter
Many modeling formalisms exist (e.g. social networks, agent‐based modeling, and discrete event simulations) for describing aspects of social‐behavioral system behavior. They are all useful but provide different insights. To develop strategy addressing complex social‐behavioral problems, however, it is necessary to have a comprehensive view going be...
Chapter
Full-text available
The faithful reproduction and accurate prediction of the phenotypes and emergent behaviors of complex cellular systems are among the most challenging goals in Systems Biology. Although mathematical models that describe the interactions among all biochemical processes in a cell are theoretically feasible, their simulation is generally hard because o...
Conference Paper
Autonomic routers are the main component on which autonomic networking is founded. Our goal is to provide a first approach performance modeling method that can be usable by networking professionals that are not part of the Performance Evaluation community.
Technical Report
Full-text available
COST IC1404 WG1 Deliverable WG1.1: State-of-the-art on Current Formalisms used in Cyber-Physical Systems Development
Technical Report
Full-text available
COST IC1404 WG1 Deliverable WG1.2: Framework to Relate / Combine Modeling Languages and Techniques
Article
Cloud based architectures present many challenges, ranging from poorly dimensioned hardware to lengthy wait times and resource balancing issues. Most of these problems can be mitigated by using proper performance evaluation techniques, depending on the accuracy of the model abstracting the real system. The adoption of a formalism over another to de...
Article
Full-text available
We deal with the following scheduling problem: an infinite number of tasks must be scheduled for processing on a finite number of heterogeneous machines, such as all tasks are sent to execution with a minimum delay. The tasks have causal dependencies and are generated in the context of biomedical applications, and produce results relevant for the m...
Chapter
To manage emergencies, it is useful to be able to understand how crowds behave in case of incidents. We modeled, by means of Markovian Agents, the behavior of a crowd in a theater to evaluate the effects of a potentially catastrophic situation in a constrained space. The chosen modeling technique showed to be well fit to help and evaluate, given th...
Article
Full-text available
Nowadays applications tend to be executed on distributed environments provisioned using on-demand infrastructures. The use of techniques such as application containers simplifies the orchestration of complex systems. In this context, microservices based architectures offer a promising solution for what concerns software development and scalability....
Conference Paper
Edge computing extends cloud computing by providing a subset of computational resources that are close to the application site, lowering the need for bandwidth and augmenting responsiveness. This allows implementing cloud benefits in critical applications bound to a physical location, provided that a correct distribution between edge and cloud is a...
Article
Modern computer based systems are characterized by several complexity dimensions: a non-exhaustive list includes scale, architecture, distribution, variability, flexibility, dynamics, workloads, time constraints, dependability, availability, security, performances. The design, implementation, operation, maintenance and evolution of such systems req...
Article
The lambda architectural pattern allows to overcome some limitations of data processing frameworks. It builds on the methodology of having two different data processing streams on the same system: a real time computing for fast data streams and a batch computing behavior for massive workloads for delayed processing. While these two modes are clearl...
Article
Protection and preservation of cultural heritage is an important responsibility for policy makers, public and private institutions, and the citizens themselves. Technologists can make an important contribution by designing monitoring systems for these sites and using the data to prevent incidents. Internet‐of‐things technology offers, for a sustain...
Conference Paper
IT offers significant tools to foster innovation in the fashion industry. Although the products have a low information content, the information content of the overall development and production process may be rich, specially for high end productions, and the same happens for ancillary processes connected to sales and after sales. In this paper we p...
Conference Paper
The Two-hemisphere model-driven (2HMD) approach assumes modelling and use of procedural and conceptual knowledge on an equal and related basis. This differentiates 2HMD approach from pure procedural, pure conceptual, and object oriented approaches. The approach may be applied in the context of modelling of a particular business domain as well as in...
Conference Paper
Full-text available
The complexity of modern cloud facilities requires attentive management policies that should encompass all aspects of the system. Security is a critical issue, as intrusions, misuse or denial of service attacks may damage both the users and the cloud provider including its reputation on the market. Disruptive attacks happen fast, cause evident and...
Chapter
Big Data applications provide new, disruptive tools to advance our knowledge about the mechanisms that characterize complex aspects of reality. Be it a high energy physics experiment or an analysis of social networks data, the strength of the approach is the availability of a huge richness of data; but, at the same time, it is also the main challen...
Conference Paper
As many real world systems evolve according to phenomena characterized by a continuous time dependency, literature studied several approaches to correctly capture all their aspects. Since their analysis is not trivial, different high level approaches have been proposed, such as classical pure mathematical analysis or tool-oriented frameworks like F...
Article
Full-text available
Hybrid systems (HS) have been proven a valid formalism to study and analyze specific issues in a variety of fields. However, most of the analysis techniques for HS are based on low-level description, where single states of the systems have to be defined and enumerated by the modeler. Some high level modeling formalisms, such as Fluid Stochastic Pet...
Technical Report
The two-hemisphere model-driven (2HMD) approach assumes modelling and use of procedural and conceptual knowledge on an equal and related basis. This differentiates 2HMD approach from pure procedural, pure conceptual, and object oriented approaches. The approach may be applied in the context of modelling of a particular business domain as well as in...
Chapter
Nowadays, power consumption in IT infrastructures is a major area of concern for both academia and industry. In data centers where computational power is provided by means of virtualized resources, like virtual machines, the policy to allocate them on physical servers can strongly impact the power consumption of the entire system. This affects data...
Chapter
The efficiency of storage systems is a key factor to ensure sustainability in data centers devoted to provide cloud services. A proper management of storage infrastructures can ensure the best trade off between costs, reliability and quality of service, enabling the provider to be competitive in the market. Heterogeneity of nodes, and the need for...
Chapter
A Markovian Agent Model (MAM) is an agent-based spatio-temporal analytical formalism aimed to model a collection of interacting entities, called Markovian Agents (MA), guided by stochastic behaviours. An MA is characterized by a finite number of states over which a transition kernel is defined. Transitions can either be local, or induced by the sta...