Zobrazeno 1 - 10
of 104
pro vyhledávání: '"PIZZONIA, MAURIZIO"'
Autor:
Pennino, Diego, Pizzonia, Maurizio
Blockchain, like any other complex technology, needs a strong testing methodology to support its evolution in both research and development contexts. Setting up meaningful tests for permissionless blockchain technology is a notoriously complex task f
Externí odkaz:
http://arxiv.org/abs/2402.14610
For permissionless blockchains, scalability is paramount. While current technologies still fail to address this problem fully, many research works propose sharding or other techniques that extensively adopt parallel processing of transactions. In the
Externí odkaz:
http://arxiv.org/abs/2212.11700
Autor:
Cirillo, Albenzio, Dalena, Vito, Mauro, Antonio, Mogavero, Francesco, Pennino, Diego, Pizzonia, Maurizio, Vitaletti, Andrea, Zecchini, Marco
A Robinson list protects phone subscribers against commercial spam calls. Its least basic functionality is to collect the denial of the subscribers to be contacted by market operators. Nowadays, Robinson lists run as centralised services, which impli
Externí odkaz:
http://arxiv.org/abs/2110.02594
Public blockchains should be able to scale with respect to the number of nodes and to the transactions workload. The blockchain scalability trilemma has been informally conjectured. This is related to scalability, security and decentralization, stati
Externí odkaz:
http://arxiv.org/abs/2005.06665
In many applications, identity management (IdM) is used to associate a subject public key with an endpoint at which the subject can be contacted (telephone number, email, etc.). In decentralized applications based on distributed ledger technologies (
Externí odkaz:
http://arxiv.org/abs/2005.00794
Publikováno v:
IEEE Access, Volume 7, pages 175642 - 175670, year 2019
Commercial off-the-shelf DataBase Management Systems (DBMSes) are highly optimized to process a wide range of queries by means of carefully designed indexing and query planning. However, many aggregate range queries are usually performed by DBMSes us
Externí odkaz:
http://arxiv.org/abs/1910.11754
The first obstacle that regular users encounter when setting up a node for a public blockchain is the time taken for downloading all the data needed for the node to start operating correctly. In fact, this may last from hours to weeks for the major n
Externí odkaz:
http://arxiv.org/abs/1904.01935
Industrial Control Systems (ICS) are sensible targets for high profile attackers and advanced persistent threats, which are known to exploit USB thumb drives as an effective spreading vector. In ICSes, thumb drives are widely used to transfer files a
Externí odkaz:
http://arxiv.org/abs/1810.05005
Autor:
di Lallo, Roberto, Griscioli, Federico, Lospoto, Gabriele, Mostafaei, Habib, Pizzonia, Maurizio, Rimondini, Massimo
In critical infrastructures, communication networks are used to exchange vital data among elements of Industrial Control Systems (ICSes). Due to the criticality of such systems and the increase of the cybersecurity risks in these contexts, best pract
Externí odkaz:
http://arxiv.org/abs/1701.04293
Autor:
Di Bartolomeo, Marco, Di Donato, Valentino, Pizzonia, Maurizio, Squarcella, Claudio, Rimondini, Massimo
In the never-ending quest for tools that enable an ISP to smooth troubleshooting and improve awareness of network behavior, very much effort has been devoted in the collection of data by active and passive measurement at the data plane and at the con
Externí odkaz:
http://arxiv.org/abs/1412.4074