
Michele TomaiuoloUniversity of Parma | UNIPR · Department of Engineering and Architecture
Michele Tomaiuolo
Computer Engineering
About
112
Publications
44,169
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
958
Citations
Introduction
Michele Tomaiuolo is an assistant professor. He has given lessons on: Foundations of Informatics, Object-Oriented Programming, Software Enigineering, Computer Networks, Mobile Code and Security.
His current research activity is focused on peer-to-peer social networking, with attention to security and trust management, multi-agent systems, semantic web, rule-based systems, peer-to-peer networks. Research projects: @lis TechNet, Agentcities, Collaborator, Comma, and Anemone.
Additional affiliations
October 2007 - present
January 2001 - present
Education
January 2003 - March 2006
September 1993 - April 2001
Publications
Publications (112)
During the pandemic, a consortium of libraries in the Milan area (Italy) interviewed the community and applied sentiment analysis to quickly understand the community’s feelings toward online services. The model compares both sentiment analysis and topic detection using algorithms that identify sentiments and topics. The results highlight the prefer...
Detecting anomalous data within time series is a very relevant task in pattern recognition and machine learning, with many possible applications that range from disease prevention in medicine, e.g., detecting early alterations of the health status before it can clearly be defined as "illness" up to monitoring industrial plants. Regarding this latte...
Social networking systems can be considered one of the most important social phenomena because they succeeded in involving billions of people all around the world and in attracting users from several social groups, regardless of age, gender, education, or nationality. Social networking systems blur the distinction between the private and working sp...
Why and how more and more people get involved and use social networking systems are critical topics in social network analysis (SNA). As a matter of fact, social networking systems bring online a growing number of acquaintances, for many different purposes. Both business interests and personal recreational goals are motivations for using online soc...
Modeling and forecasting the spread of COVID-19 remains an open problem for several reasons. One of these concerns the difficulty to model a complex system at a high resolution (fine-grained) level at which the spread can be simulated by taking into account individual features such as the social structure, the effects of the governments' policies,...
In the knowledge discovery field of the Big Data domain the analysis of geographic positioning and mobility information plays a key role. At the same time, in the Natural Language Processing (NLP) domain pre-trained models such as BERT and word embedding algorithms such as Word2Vec enabled a rich encoding of words that allows mapping textual data i...
The recent advent of node embedding techniques enabled a more efficient application of machine learning techniques on graphs. These techniques allow each node of a network to be encoded into an arbitrary low-dimensional vector representation, which can be exploited by statistical learning models. However, the main limitation of these approaches is...
This article describes the current landscape in the fields of social media and socio-technical systems. In particular, it analyzes the different ways in which social media are adopted in organizations, workplaces, educational and smart environments. One interesting aspect of this integration, is the use of social media for members’ participation an...
The phenomenon of “trolling” in social networks is becoming a very serious threat to the online presence of people and companies, since it may affect ordinary people, public profiles of brands, as well as popular characters. In this paper, we present a novel method to preprocess the temporal data describing the activity of possible troll profiles o...
When developing a software engineering project, selecting the most appropriate programming language is a crucial step. Most often, feeling at ease with the possible options becomes almost as relevant as the technical features of the language. Therefore, it appears to be worth analyzing the role that the emotional component plays in this process.
In...
A troll is usually defined as somebody who provokes and offends people to make them angry, who wants to dominate any discussion or who tries to manipulate people's opinions. The problems caused by such persons have increased with the diffusion of social media. Therefore, on the one hand, press bodies and magazines have begun to address the issue an...
Participation in social networks has long been studied as a social phenomenon according to different theories. In particular, the notion of social capital highlights a person's benefit due to his relations with other persons, including family, colleagues, friends and generic contacts. It may be important both for the individuals that are able to ac...
ActoDatA (Actor Data Analysis) is an actor-based software library for the development of distributed data mining applications. It provides a multi-agent architecture with a set of predefined and configurable agents performing the typical tasks of data mining applications. In particular, its architecture can manage different users’ applications; it...
Hidradenitis Suppurativa (HS), also known as Acne Inversa, is a chronic, underdiagnosed, often debilitating and painful disease that affects the folds of the skin. It has a considerable negative impact on the quality of life and on the emotional well-being. In this paper we discuss some results obtained by applying automatic Emotion Detection and S...
In the last few years the amount of electronic data in high schools has grown tremendously, also as a consequence of the introduction of electronic logbooks, where teachers store data about their students’ activities: school attendance, marks obtained in individual test trials and the typology of these tests. However, all this data is often spread...
This work presents the results of some summer stages for high school students, for the first introduction to computational thinking and programming. Differently from other approaches, our experiences are characterized by: (i) a full week of lessons and exercises, for gradually developing a small but complete and original project, (ii) an objects-ea...
Social networking systems are usually huge centralized systems owned by a single company. However, this solution has many drawbacks (e.g., lack of privacy, lack of anonymity, risks of censorship, and operating costs). This chapter proposes a novel P2P system that leverages existing, widespread, and stable technologies such as DHTs and BitTorrent. I...
Social networking sites have deeply changed the face of the web in the last years. Although the current approach to build social networking systems is to create huge centralized systems owned by a single company. Such a strategy has many drawbacks (e.g., lack of privacy, lack of anonymity, risks of censorship, and operating costs). Therefore, a dec...
Social networking systems can be considered one of the most important social phenomena because they succeeded in involving billions of people all around the world and in attracting users from several social groups, regardless of age, gender, education, or nationality. Social networking systems blur the distinction between the private and working sp...
The concept of computational thinking has been discussed for several decades and in recent years has been brought to the attention of the scientific community by Jeanette Wing. The importance of computational thinking places it among the basic skills for the 21st century, together with reading, writing, and calculation, that every person will have...
In the last few years, the impact of information spread through online social networks has continuously grown. For this reason, understanding the trustworthiness of news has become one of the most important challenges for an Internet user, especially during crisis events or in political, health and social issues. As part of a more comprehensive pro...
We present a comprehensive framework for managing reports sent to the local government by citizens through well-known instant messaging apps. It leverages a combined use of Web systems and automated bots, based on Machine Learning techniques. This project has been developed in collaboration with the local administration of Montecchio Emilia (Italy)...
Various techniques based on artificial intelligence have been proposed for the automatic detection of online anti-social behaviors, both in existing systems and in the scientific literature. In this article, we describe TrollPacifier, a holistic system for troll detection, which analyses many different features of trolls and legitimate users on the...
Why and how more and more people get involved and use social networking systems are critical topics in social network analysis (SNA). As a matter of fact, social networking systems bring online a growing number of acquaintances, for many different purposes. Both business interests and personal recreational goals are motivations for using online soc...
Agent-based modeling and simulation are some powerful techniques that are widely used with success for analyzing complex and emergent phenomena in many research and application areas. Many different reasons are behind the success of such techniques, among which an important mention goes to the availability of a great variety of software tools, that...
Within the field of sentiment analysis and emotion detection applied to tweets, one of the main problems related to the construction of an automatic classifier is the lack of suitable training sets. Considering the tediousness of manually annotating a training set, and the noise present in data collected directly from the social web, in this paper...
The current approach to build social networking systems is to create huge centralized systems owned by a single company. However, such strategy has many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs. In this paper the authors propose a novel P2P system that leverages existing, widespread and stable tec...
Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequ...
In Facebook, the set of pages liked by some users represents an important knowledge about their real life tastes. However, the process of classification, which is already hard when dealing with dozens of classes and genres, is made even more difficult by the very coarse information of Facebook pages. Our work originates from a large dataset of page...
Scopus is a well known repository of metadata about scientific research articles. In this work, we gather data from this repositiory to create a social graph of scientific authors, starting from citations among their articles. Moreover, using data mining techniques, we infer some relevant research topics for each author, from the textual analysis o...
Building centralized social networking systems has many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship, and operating costs. As it is discussed in this article, an alternative approach is possible. A prototype system, named Blogracy, has been realized as a micro-blogging social networking system, based on well-known P2P te...
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, th...
Social media analysis is rapidly becoming awidespread tool for various applications. Motivations for interestrange from commercial marketing to the monitoring of socialtrends and political opinions. This work presents an actor-based platform, augmented with machine learning algorithms.To evaluate its possible application for the continuous analysis...
Mainly as a consequence of societal changes, the traditional approach to provide cares and social services in hospitals and institutional centres is being paralleled with a growing tendency to provide cares in the community, directly. Information and communication technologies play an important role in enabling and supporting this tendency. However...
BOOK WEBSITE: http://www.igi-global.com/book/social-media-performance-evaluation-success/169445
There are many different social media platforms that provide a wide array of services. Exploring the results yielded by these platforms can enhance their usefulness and impact on society’s advancement.
Social Media Performance Evaluation and Success Me...
According to current definitions, health can not be merely intended as the absence of disease or infirmity. In this sense, for maintaining health, the coordination and collaboration among social and health systems is becoming essential, and it can happen only though the harmonization of existing and new integrated information systems. In this study...
The most important technological trend of the last years has been the rise of socialnetworking systems to social phenomena involving hundreds of millions of people,attracting users from several social groups. Social networking systems blur thedistinction between the private and working spheres, and users use such systemsboth at home and in the work...
Social media are more and more frequently used by people to express their feelings in the form of short messages. This has raised interest in emotion detection, with a wide range of applications among which the assessment of users’ moods in a community is perhaps the most relevant. This paper proposes a comparison between two approaches to emotion...
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However, they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenar...
The objective of this work is to present a methodology and an educational environment to facilitate first approach to coding for high school and university students. Objectoriented paradigm is increasingly used in CS1 courses and Block programming reduces the syntactic complexity of textbased programming languages. So our purpose is merge positive...
The current approach to build social networking systems is to create huge centralized systems owned by a single company. However, such strategy has many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs. In this paper the authors propose a novel P2P system that leverages existing, widespread and stable tec...
The availability and adoption of open protocols allow applications to integrate Web services offered by different providers. Moreover, simple services can be dynamically composed to accomplish more complex tasks. This implies the delegation of both tasks and permissions. In fact, delegation is intertwined with some notion of risk, on the one hand,...
Participation in social networks has long been studied as a social phenomenon according to different theories. In particular, the notion of social capital highlights a person's benefit due to his relations with other persons, including family, colleagues, friends and generic contacts. It may be important both for the individuals that are able to ac...
ActoDeS is a software framework for the development of large concurrent and distributed systems. This software framework takes advantage of the actor model and of an its implementation that makes easy the development of the actor code by delegating the management of events (i.e., the reception of messages) to the execution environment. Moreover, it...
Social networking systems blur the distinction between the private and working spheres, and users are known to use such systems both at home and at the work place, both professionally and with recreational goals. In fact, several traditional information systems have been modified in order to include social aspects. However, in the vast majority of...
Microblogging platforms like Twitter can convey
short messages to direct contacts, but also to other potentially
interested users. They are actively exploited either by individual
users or whole organizations and companies. This paper
describes some results we obtained from the Social Network and
Sentiment Analysis of a Twitter channel, related to...
Twitter is a platform which may contain opinions, thoughts, facts and
other information. Within it, many and various communities are originated by
users with common interests, or with similar ways to feel part of the
community. This paper presents a possible combined approach between Social
Network Analysis and Sentiment Analysis. In particular, we...
Concern about vulnerabilities of IT systems is growing together with attention to risks of intrusive cyber-control over personal activities and data. This article discusses some new technologies that are being integrated into computing devices for realizing so-called Trusted Computing and Digital Rights Management systems, which can remotely attest...
The development of scalable and efficient applications requires the use of appropriate models and software infrastructures. This paper presents a software framework that enables the development of scalable and efficient actor-based applications. Each application can be configured with different implementations of the components that drive the execu...
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, th...
Multi-agent systems have been contributing to the development of both theory and practice of complex distributed systems. Social networks are probably the systems that exhibit the highest degree of similarity with multi-agent systems because members of a social network interact as agents do in a multi-agent system. Multi-agent system may be the bes...
With the widespread adoption of online social networks as a crucial means for communication, social information retrieval is becoming one of the most interesting areas of research in terms of the large number of-theoretical and practical-issues that it encompasses. We argue that agent technology is central in supporting the decentralization of next...
In the last sixty years of research, several models have been proposed to explain (i) the formation and (ii) the evolution of networks. However, because of the specialization required for the problems, most of the agent-based models are not general. On the other hand, many of the traditional network models focus on elementary interactions that are...
This chapter has the goal of showing how multi-agent systems can be a suitable means for supporting the development and the composition of services in dynamic and complex environments. In particular, the chapter copes with the problem of developing services in the field of social networks. After an introduction on the relationships between multi-ag...
Social networking systems blur the distinction between the private and working spheres, and users are known to use such systems both at home and at the work place, both professionally and with recreational goals. In fact, several traditional information systems have been modified in order to include social aspects. However, in the vast majority of...
Features of online social networks are being introduced in various applications and environments, including tools supporting virtual teams and online collaboration in general. In fact, social networking has a large potential for easing collaboration, also across organizational boundaries. However, effective e-collaboration through social networks r...
In the context of Web services, access control presents some interesting challenges, especially when services are exposed to a global audience, with users accessing them from different systems and under different security settings. A decentralized approach to access control, which can be applied to such open environments, is represented by Trust Ma...
Pervasive computing is one of the most active research fields because it promises the creation of environments where computing and communication devices are effectively integrated with users so th at applications can provide largely invisible support for tasks performed by users. This paper presents an environment for software development, called M...
JOSI is a software framework that tries to simplify the development of such kinds of applications both by providing the possibility of working on models for representing such semantic information and by offering some implementations of such models that can be easily used by software developers without any knowledge about semantic models and languag...
This paper presents AOIS, a multi-agent system that supports the sharing of information among a dynamic community of users connected through the Internet thanks to the use of a well-known DHT-based peer-to-peer platform: BitTorrent. In respect to Web search engines, this system enhances the search through domain ontologies, avoids the burden of pub...
Multi-agent systems have been importantly contributing to the development of the theory and the practice of complex distributed systems and, in particular, they have shown the potential to meet critical needs in high-speed, mission-critical, content-rich, and distributed information applications where mutual interdependencies, dynamic environments,...
This paper presents a generic Trust Negotiation framework for Web services, based on the WS-Trust standard. It allows users to create trust incrementally, by disclosing credentials step by step. This way, services and resources can be shared in an open environment, and access can be realized on the basis of peer-to-peer trust relationships. The pap...
Current approaches to build social networking systems are based on a centralized architecture because it allows a simple browser-based user experience and makes easier and more efficient to implement many algorithms used in a social networking site e.g., friend suggestion, However this kind of architecture has many drawbacks for its users, e.g., la...
The availability and adoption of open protocols allow applications to integrate Web services offered by different providers. Moreover, simple services can be dynamically composed to accomplish more complex tasks. This implies the delegation of both tasks and permissions. In fact, delegation is intertwined with some notion of risk, on the one hand,...
Especially in the case of completely distributed or federated social networking platforms, multi-agent systems can play an important role. In particular, multi-agent systems have been used as (i) an underlying layer or a middleware for developing social networking platforms, (ii) a technology to increase the autonomous and intelligent behaviour of...
Expert systems are successfully applied to a number of domains. Often built on generic rule-based systems, they can also exploit optimized algorithms. On the other side, being based on loosely coupled components and peer to peer infrastructures for asynchronous messaging, multi-agent systems allow code mobility, adaptability, easy of deployment and...
HDS (Heterogeneous Distributed System) is a software framework that tries to simplify the realization of distributed applications and, in particular, of multi-agent systems, by merging the client-server and the peer-to-peer paradigms and by implementing all the interactions among the processes of a system through the exchange of a kind of message t...
Current technological advances and the increasing diffusion of its use for scientific, financial and social activities, make Internet the de facto platform for providing worldwide distributed data storage, distributed computing and communication. It creates new opportunities for the development of new kinds of applications, but it will also create...
Virtual communities represent the gathering of people, in an online “space” where they come, communicate, connect, and get to know each other better over time. Virtual communities can be created for different purposes moving from the simple socialization among people to the collaboration among remote people working on shared projects.
The combination of peer-to-peer networking and multi-agent systems seems be a perfect solution for the realization of applications
that broaden on the Internet. In fact, while peer-to-peer networking infrastructures and protocols provide the suitable discovery
and communication services necessary for developing effective and reliable applications,...
— Hierarchical collaborations between cooperative, rational agents are quite naturally achieved through goal delegation. In the context of a service-oriented architecture, agents responsible for workflow management can subdivide their goals in sub-goals, generate a utility function from each sub-goal and set up a negotiation process with the agents...
Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures. In this field, trust management systems can play an important role, being based on a totally di...
Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures. In this field, trust management systems can play an important role, being based on a totally di...
One of the main challenges of multi-agent systems is to become the main means to support legacy systems interoperability and to make the realization of scalable distributed systems easy. In the last years, however, two technologies, peer-to-peer and service-oriented, have made an impressive progress and seem to have good chances of competing with m...