Theoretical Computer Science

Computer Networks and Pervasive Systems

Computer Networks and Pervasive Systems

The group is conducting research on emerging networking technologies and modern pervasive systems. Our research in these areas involves both theoretical investigations and practical implementations. We work closely with industry partners to design and deploy real-world networking solutions that leverage these emerging technologies.

New methods for small area estimation with linkage uncertainty

In official statistics, interest for data integration has been increasingly growing, due to the need of extracting information from different sources. However, the effects of these procedures on the validity of the resulting statistical analyses has been disregarded for a long time. In recent years, it has been largely recognized that linkage is not an error-free procedure and linkage errors, as false links and/or missed links, can invalidate the reliability of estimates in standard statistical models.

A service-oriented architecture for student modeling in peer assessment environments

Peer assessment functionalities are provided in several Learning Management Systems; data coming from the peer evaluation sessions could be used for automated or semi-automated grading, for the management of student modeling, and for providing the teacher with feedback about the learners. Various models for the representation of peer assessment data have been proposed in the literature.

Q2A-I: A Support Platform for Computer Programming Education, Based on Automated Assessment and Peer Learning

Management and assessment of homework assignments in programming courses is a challenging topic both for researchers and practitioners. In the current paper we propose a solution based on the blending of automated evaluation and peer learning. More specifically, we introduce a platform called Q2A-I, which provides two main features: (1) automated management and assessment of homework submissions; and (2) peer interaction support on the programming tasks, by exchanging questions and answers through dedicated micro-forums.

Continuously non-malleable codes in the split-state model from minimal assumptions

At ICS 2010, Dziembowski, Pietrzak and Wichs introduced the notion of non-malleable codes, a weaker form of error-correcting codes guaranteeing that the decoding of a tampered codeword either corresponds to the original message or to an unrelated value. The last few years established non-malleable codes as one of the recently invented cryptographic primitives with the highest impact and potential, with very challenging open problems and applications. In this work, we focus on so-called continuously non-malleable codes in the split-state model, as proposed by Faust et al.

Continuously non-malleable codes with split-state refresh

Non-malleable codes for the split-state model allow to encode a message into two parts, such that arbitrary independent tampering on each part, and subsequent decoding of the corresponding modified codeword, yields either the same as the original message, or a completely unrelated value. Continuously non-malleable codes further allow to tolerate an unbounded (polynomial) number of tampering attempts, until a decoding error happens. The drawback is that, after an error happens, the system must self-destruct and stop working, otherwise generic attacks become possible.

Fiat–Shamir for highly sound protocols is instantiable

The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto ‘86) is a popular paradigm for constructing very efficient non-interactive zero-knowledge (NIZK) arguments and signature schemes from a hash function and any three-move interactive protocol satisfying certain properties. Despite its wide-spread applicability both in theory and in practice, the known positive results for proving security of the FS paradigm are in the random oracle model only, i.e., they assume that the hash function is modeled as an external random function accessible to all parties.

Special issue on soft methods in probability and statistics (SMPS 2016)

This special issue of the International Journal of Approximate Reasoning (IJAR) focuses on recent advances in soft methods in probability and statistics.The special issue is a follow-up of the 8th International Conference on Soft Methods in Probability and Statistics (SMPS2016),which took place in Rome (Italy) in September 2016 (http://www.sbai.uniroma1.it/smps2016/index.php).

Robust fuzzy clustering of multivariate time trajectories

The detection of patterns in multivariate time series is a relevant task, especially for large datasets. In this paper, four clustering models for multivariate time series are proposed, with the following characteristics. First, the Partitioning Around Medoids (PAM) framework is considered. Among the different approaches to the clustering of multivariate time series, the observation-based is adopted. To cope with the complexity of the features of each multivariate time series and the associated assignment uncertainty a fuzzy clustering approach is adopted.

Approximation algorithms for replenishment problems with fixed turnover times

We introduce and study a class of optimization problems we coin replenishment problems with fixed turnover times: a very natural model that has received little attention in the literature. Nodes with capacity for storing a certain commodity are located at various places; at each node the commodity depletes within a certain time, the turnover time, which is constant but can vary between locations. Nodes should never run empty, and to prevent this we may schedule nodes for replenishment every day.

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma