Claudio Bettini

According to our database1, Claudio Bettini authored at least 148 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
newNECTAR: Collaborative active learning for knowledge-based probabilistic activity recognition.
Pervasive and Mobile Computing, 2019

Context-driven Active and Incremental Activity Recognition.
CoRR, 2019

Automatic Detection of Urban Features from Wheelchair Users' Movements.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

Is Privacy Regulation Slowing Down or Enabling the Wide Adoption of Pervasive Systems? Panel Summary.
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019

Hybrid data-driven and context-aware activity recognition with mobile devices.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

2018
Introduction to Mobility Data Privacy.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Privacy Protection in Location-Based Services: A Survey.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Temporal Granularity.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

EPIC: a Methodology for Evaluating Privacy Violation Risk in Cybersecurity Systems.
Transactions on Data Privacy, 2018

The Privacy Implications of Cyber Security Systems: A Technological Survey.
ACM Comput. Surv., 2018

NECTAR: Knowledge-based Collaborative Active Learning for Activity Recognition.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

2017
Privacy Threats in Location-Based Services.
, 2017

Monitoring objects manipulations to detect abnormal behaviors.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Personal data protection in pervasive health systems.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

2016
Mobile security and privacy: Advances, challenges and future research directions.
Pervasive and Mobile Computing, 2016

SmartFABER: Recognizing fine-grained abnormal behaviors for early detection of mild cognitive impairment.
Artificial Intelligence in Medicine, 2016

Towards automatic induction of abnormal behavioral patterns for recognizing mild cognitive impairment.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Analysis of long-term abnormal behaviors for early detection of cognitive decline.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

On the impact of activity recognition in monitoring cognitive decline.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Let the objects tell what you are doing.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

2015
Obfuscation of Sensitive Data for Incremental Release of Network Flows.
IEEE/ACM Trans. Netw., 2015

Privacy protection in pervasive systems: State of the art and technical challenges.
Pervasive and Mobile Computing, 2015

Extended Report: Fine-grained Recognition of Abnormal Behaviors for Early Detection of Mild Cognitive Impairment.
CoRR, 2015

Fine-grained recognition of abnormal behaviors for early detection of mild cognitive impairment.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications, 2015

From lab to life: Fine-grained behavior monitoring in the elderly's home.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Demo abstract: Demonstration of the FABER system for fine-grained recognition of abnormal behaviors.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

2014
SafeBox: adaptable spatio-temporal generalization for location privacy protection.
Trans. Data Privacy, 2014

Editorial.
Pervasive and Mobile Computing, 2014

Differentially-private release of check-in data for venue recommendation.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2014

2013
A Platform for Privacy-Preserving Geo-social Recommendation of Points of Interest.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

A Practical Location Privacy Attack in Proximity Services.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Obsidian: A scalable and efficient framework for NetFlow obfuscation.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

2012
JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks.
IEEE Trans. Dependable Sec. Comput., 2012

Context provenance to enhance the dependability of ambient intelligence systems.
Personal and Ubiquitous Computing, 2012

Private context-aware recommendation of points of interest: An initial investigation.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Obfuscation of sensitive data in network flows.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Location privacy attacks based on distance and density information.
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012

2011
Temporal Access Control.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies.
VLDB J., 2011

COSAR: hybrid reasoning for context-aware activity recognition.
Personal and Ubiquitous Computing, 2011

OWL 2 modeling and reasoning with complex human activities.
Pervasive and Mobile Computing, 2011

Editorial.
Pervasive and Mobile Computing, 2011

Location-Related Privacy in Geo-Social Networks.
IEEE Internet Computing, 2011

Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets
CoRR, 2011

Is ontology-based activity recognition really effective?
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Integrating Identity, Location, and Absence Privacy in Context-Aware Retrieval of Points of Interest.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

Challenges for Mobile Data Management in the Era of Cloud and Social Computing.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

2010
MIMOSA: context-aware adaptation for ubiquitous web access.
Personal and Ubiquitous Computing, 2010

A survey of context modelling and reasoning techniques.
Pervasive and Mobile Computing, 2010

Preserving Privacy in Sequential Data Release against Background Knowledge Attacks
CoRR, 2010

Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
CoRR, 2010

Towards the adaptive integration of multiple context reasoners in pervasive computing environments.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

IEEE PerCom 2010 PhD Forum: Message from the PhD Forum chair.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Pcube: A System to Evaluate and Test Privacy-Preserving Proximity Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Preserving location and absence privacy in geo-social networks.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Temporal Granularity.
Proceedings of the Encyclopedia of Database Systems, 2009

Evaluating privacy threats in released database views by symmetric indistinguishability.
Journal of Computer Security, 2009

Hybrid reasoning in the CARE middleware for context awareness.
Int. J. Web Eng. Technol., 2009

Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Preserving Anonymity of Recurrent Location-Based Queries.
Proceedings of the TIME 2009, 2009

Cor-Split: Defending Privacy in Data Re-publication from Historical Correlations and Compromised Tuples.
Proceedings of the Scientific and Statistical Database Management, 2009

Hide & Crypt: Protecting Privacy in Proximity-Based Services.
Proceedings of the Advances in Spatial and Temporal Databases, 2009

Longitude: Centralized Privacy-Preserving Computation of Users' Proximity.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS.
Proceedings of the MDM 2009, 2009

Privacy-Aware Proximity Based Services.
Proceedings of the MDM 2009, 2009

Privacy in Georeferenced Context-Aware Services: A Survey.
Proceedings of the Privacy in Location-Based Applications, 2009

Anonymity and Historical-Anonymity in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

2008
Privacy Threats in Location-Based Services.
Proceedings of the Encyclopedia of GIS., 2008

Privacy Protection through Anonymity in Location-based Services.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Shadow attacks on users' anonymity in pervasive computing environments.
Pervasive and Mobile Computing, 2008

Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications.
Pervasive and Mobile Computing, 2008

How Anonymous Is k-Anonymous? Look at Your Quasi-ID.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Protecting Users' Anonymity in Pervasive Computing Environments.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Composition and Generalization of Context Data for Privacy Preservation.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

2007
Distributed Context Monitoring for the Adaptation of Continuous Services.
World Wide Web, 2007

Spatial generalisation algorithms for LBS privacy preservation.
J. Location Based Services, 2007

Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets.
J. Artif. Intell. Res., 2007

Beyond Anonymity in Location Based Services.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007

Anonymity and Diversity in LBS: A Preliminary Investigation.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A Performance Evaluation of Ontology-Based Context Reasoning.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

Anonymity in Location-Based Services: Towards a General Framework.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

Context-aware Web Services for Distributed Retrieval of Points of Interest.
Proceedings of the International Conference on Internet and Web Applications and Services (ICIW 2007), 2007

2006
Integrated Profiling of Users, Terminals, and Provisioning Environments.
Proceedings of the Handbook of Mobile Middleware., 2006

The Role of Quasi-identifiers in k-Anonymity Revisited
CoRR, 2006

k-Anonymity in Databases with Timestamped Data.
Proceedings of the 13th International Symposium on Temporal Representation and Reasoning (TIME 2006), 2006

Experience Report: Ontological Reasoning for Context-aware Internet Services.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Online Ontological Reasoning for Context-Aware Internet Services.
Proceedings of the 2nd International Workshop on Contexts and Ontologies: Theory, 2006

2005
Information Release Control: A Learning-Based Architecture.
J. Data Semantics, 2005

An Efficient Algorithm for Minimizing Time Granularity Periodical Representations.
Proceedings of the 12th International Symposium on Temporal Representation and Reasoning (TIME 2005), 2005

Protecting Privacy Against Location-Based Personal Identification.
Proceedings of the Secure Data Management, 2005

Distributed Context Monitoring for Continuous Mobile Services.
Proceedings of the Mobile Information Systems II, 2005

Loosely Coupling Ontological Reasoning with an Efficient Middleware for Context-awareness.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Demo: ontology-based context-aware delivery of extended points of interest.
Proceedings of the 6th International Conference on Mobile Data Management (MDM 2005), 2005

A Distributed Architecture for Management and Retrieval of Extended Points of Interest.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Reasoning with advanced policy rules and its application to access control.
Int. J. on Digital Libraries, 2004

Mapping Calendar Expressions into Periodical Granularities.
Proceedings of the 11th International Symposium on Temporal Representation and Reasoning (TIME 2004), 2004

Identifying Sensitive Associations in Databases for Release Control.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Profile Aggregation and Policy Evaluation for Adaptive Internet Services.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Towards Highly Adaptive Services for Mobile Computing.
Proceedings of the Mobile Information Systems, 2004

A System Prototype for Solving Multi-granularity Temporal CSP.
Proceedings of the Recent Advances in Constraints, 2004

2003
Direct Granularity Conversions among Temporal Constraints.
J. UCS, 2003

Provisions and Obligations in Policy Rule Management.
J. Network Syst. Manage., 2003

Temporal representation and reasoning.
Data Knowl. Eng., 2003

Web services for time granularity reasoning.
Proceedings of the 10th International Symposium on Temporal Representation and Reasoning / 4th International Conference on Temporal Logic (TIME-ICTL 2003), 2003

A Learning-based Approach to Information Release Control.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

GSTP: A Temporal Reasoning System Supporting Multi-Granularity Temporal Constraints.
Proceedings of the IJCAI-03, 2003

2002
Temporal Reasoning in Workflow Systems.
Distributed and Parallel Databases, 2002

Research Issues and Trends in Spatial and Temporal Granularities.
Ann. Math. Artif. Intell., 2002

Solving multi-granularity temporal constraint networks.
Artif. Intell., 2002

Provisions and Obligations in Policy Management and Security Applications.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

Obligation Monitoring in Policy Management.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Deriving Abstract Views of Multi-granularity Temporal Constraint Networks.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

2001
AAAI 2000 Workshop Reports.
AI Magazine, 2001

Semantic Compression of Temporal Data.
Proceedings of the Advances in Web-Age Information Management, 2001

Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001

2000
Review - Temporal Logic in Information Systems.
ACM SIGMOD Digital Review, 2000

Review - On Modeling and Verification of Temporal Constraints in Production Workflows.
ACM SIGMOD Digital Review, 2000

Review - Temporal Entity-Relationship Models - A Survey.
ACM SIGMOD Digital Review, 2000

Review - Time Constraints in Workflow Systems.
ACM SIGMOD Digital Review, 2000

Symbolic representation of user-defined time granularities.
Ann. Math. Artif. Intell., 2000

Free Schedules for Free Agents in Workflow Systems.
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000

Time granularities in databases, data mining, and temporal reasoning.
Springer, ISBN: 978-3-540-66997-5, 2000

1999
Symbolic Representation of User-Defined Time Granularities.
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999

1998
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning.
ACM Trans. Database Syst., 1998

Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences.
IEEE Trans. Knowl. Data Eng., 1998

Temporal Semantic Assumptions and Their Use in Databases.
IEEE Trans. Knowl. Data Eng., 1998

Mining Temporal Relationships with Multiple Granularities in Time Sequences.
IEEE Data Eng. Bull., 1998

A General Framework for Time Granularity and Its Application to Temporal Reasoning.
Ann. Math. Artif. Intell., 1998

1997
Logical Design for Temporal Databases with Multiple Granularities.
ACM Trans. Database Syst., 1997

Decentralized Administration for a Temporal Access Control Model.
Inf. Syst., 1997

Time-Dependent Concepts: Representation and Reasoning Using Temporal Description Logics.
Data Knowl. Eng., 1997

An Architecture for Supporting Interoperability among Temporal Databases.
Proceedings of the Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, 1997

A Glossary of Time Granularity Concepts.
Proceedings of the Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, 1997

Satisfiability of Quantitative Temporal Constraints with Multiple Granularities.
Proceedings of the Principles and Practice of Constraint Programming - CP97, Third International Conference, Linz, Austria, October 29, 1997

1996
A Temporal Access Control Mechanism for Database Systems.
IEEE Trans. Knowl. Data Eng., 1996

Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996

On Using Materialization Strategies for a Temporal Authorization Model.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996

A General Framework and Reasoning Model for Time Granularity.
Proceedings of the Third International Workshop on Temporal Representation and Reasoning, 1996

A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996

Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining.
Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1996

1995
Semantic Assumptions and Query Evaluation in Temporal Databases.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

1994
A discretionary access control model with temporal authorizations.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

A Temporal Authorization Model.
Proceedings of the CCS '94, 1994

1993
A Family of Temporal Terminological Logics.
Proceedings of the Advances in Artificial Intelligence, 1993

1992
The connection machine opportunity for the implementation of a concurrent functional language.
Future Generation Comp. Syst., 1992

A Formalization of Interval-Based Temporal Subsumption in First Order Logic.
Proceedings of the Foundation of Knowledge Representation and Reasoning [the book grew out of an ECAI-92 workshop], 1992


  Loading...