Skip to main content

Showing 1–5 of 5 results for author: Bianco, G

Searching in archive cs. Search in all archives.
.
  1. Body-UAV Near-Ground LoRa Links through a Mediterranean Forest

    Authors: Giulio Maria Bianco, Gaetano Marrocco

    Abstract: LoRa low-power wide-area network protocol has recently gained attention for deploying ad-hoc search and rescue (SaR) systems. They could be empowered by exploiting body-UAV links that enable communications between a body-worn radio and a UAV-mounted one. However, to employ UAVs effectively, knowledge of the signal's propagation in the environment is required. Otherwise, communications and localiza… ▽ More

    Submitted 25 March, 2023; v1 submitted 17 March, 2023; originally announced March 2023.

    Journal ref: IEEE Transactions on Antennas and Propagation, 2023

  2. arXiv:2204.12415  [pdf, other

    eess.SY cs.LG eess.SP

    Automatic Monitoring of Fruit Ripening Rooms by UHF RFID Sensor Network and Machine Learning

    Authors: Cecilia Occhiuzzi, Francesca Camera, Michele D'Orazio, Nicola D'Uva, Sara Amendola, Giulio Maria Bianco, Carolina Miozzi, Luigi Garavaglia, Eugenio Martinelli, Gaetano Marrocco

    Abstract: Accelerated ripening through the exposure of fruits to controlled environmental conditions and gases is nowadays one of the most assessed food technologies, especially for climacteric and exotic products. However, a fine granularity control of the process and consequently of the quality of the goods is still missing, so the management of the ripening rooms is mainly based on qualitative estimation… ▽ More

    Submitted 13 May, 2022; v1 submitted 26 April, 2022; originally announced April 2022.

    Comments: Accepted for publication in "IEEE Journal of Radio Frequency Identification"

    Journal ref: IEEE Journal of Radio Frequency Identification, 2022

  3. Toxic Code Snippets on Stack Overflow

    Authors: Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixao, Giuseppe Bianco, Rocco Oliveto

    Abstract: Online code clones are code fragments that are copied from software projects or online sources to Stack Overflow as examples. Due to an absence of a checking mechanism after the code has been copied to Stack Overflow, they can become toxic code snippets, e.g., they suffer from being outdated or violating the original software license. We present a study of online code clones on Stack Overflow and… ▽ More

    Submitted 1 April, 2019; v1 submitted 20 June, 2018; originally announced June 2018.

    Comments: IEEE Transactions on Software Engineering (Early Access)

  4. arXiv:1709.04178  [pdf, ps, other

    cs.CR

    Scalar multiplication in compressed coordinates in the trace-zero subgroup

    Authors: Giulia Bianco, Elisa Gorla

    Abstract: We consider trace-zero subgroups of elliptic curves over a degree three field extension. The elements of these groups can be represented in compressed coordinates, i.e. via the two coefficients of the line that passes through the point and its two Frobenius conjugates. In this paper we give the first algorithm to compute scalar multiplication in the degree three trace-zero subgroup using these coo… ▽ More

    Submitted 13 September, 2017; originally announced September 2017.

    Comments: 23 pages

  5. arXiv:1507.08555  [pdf, ps, other

    math.NT cs.CR

    Compression for trace zero points on twisted Edwards curves

    Authors: Giulia Bianco, Elisa Gorla

    Abstract: We propose two optimal representations for the elements of trace zero subgroups of twisted Edwards curves. For both representations, we provide efficient compression and decompression algorithms. The efficiency of the algorithm is compared with the efficiency of similar algorithms on elliptic curves in Weierstrass form.

    Submitted 27 July, 2015; originally announced July 2015.