Skip to main content

Showing 1–41 of 41 results for author: Esposito, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.07690  [pdf, ps, other

    cs.SE cs.DM math.NA

    Centrality Change Proneness: an Early Indicator of Microservice Architectural Degradation

    Authors: Alexander Bakhtin, Matteo Esposito, Valentina Lenarduzzi, Davide Taibi

    Abstract: Over the past decade, the wide adoption of Microservice Architecture has required the identification of various patterns and anti-patterns to prevent Microservice Architectural Degradation. Frequently, the systems are modelled as a network of connected services. Recently, the study of temporal networks has emerged as a way to describe and analyze evolving networks. Previous research has explored h… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

  2. arXiv:2506.07683  [pdf, ps, other

    cs.SE cs.DM

    Leveraging Network Methods for Hub-like Microservice Detection

    Authors: Alexander Bakhtin, Matteo Esposito, Valentina Lenarduzzi, Davide Taibi

    Abstract: Context: Microservice Architecture is a popular architectural paradigm that facilitates flexibility by decomposing applications into small, independently deployable services. Catalogs of architectural anti-patterns have been proposed to highlight the negative aspects of flawed microservice design. In particular, the Hub-like anti-pattern lacks an unambiguous definition and detection method. Aim: I… ▽ More

    Submitted 9 June, 2025; originally announced June 2025.

  3. arXiv:2506.04853  [pdf, ps, other

    cs.CR cs.CE

    A Private Smart Wallet with Probabilistic Compliance

    Authors: Andrea Rizzini, Marco Esposito, Francesco Bruschi, Donatella Sciuto

    Abstract: We propose a privacy-preserving smart wallet with a novel invitation-based private onboarding mechanism. The solution integrates two levels of compliance in concert with an authority party: a proof of innocence mechanism and an ancestral commitment tracking system using bloom filters for probabilistic UTXO chain states. Performance analysis demonstrates practical efficiency: private transfers with… ▽ More

    Submitted 5 June, 2025; originally announced June 2025.

  4. arXiv:2505.14142  [pdf, ps, other

    cs.SD eess.AS

    AudSemThinker: Enhancing Audio-Language Models through Reasoning over Semantics of Sound

    Authors: Gijs Wijngaard, Elia Formisano, Michele Esposito, Michel Dumontier

    Abstract: Audio-language models have shown promising results in various sound understanding tasks, yet they remain limited in their ability to reason over the fine-grained semantics of sound. In this paper, we present AudSemThinker, a model whose reasoning is structured around a framework of auditory semantics inspired by human cognition. To support this, we introduce AudSem, a novel dataset specifically cu… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  5. arXiv:2505.01136  [pdf, ps, other

    cs.SE cs.IR cs.LG cs.PL

    Descriptor: C++ Self-Admitted Technical Debt Dataset (CppSATD)

    Authors: Phuoc Pham, Murali Sridharan, Matteo Esposito, Valentina Lenarduzzi

    Abstract: In software development, technical debt (TD) refers to suboptimal implementation choices made by the developers to meet urgent deadlines and limited resources, posing challenges for future maintenance. Self-Admitted Technical Debt (SATD) is a sub-type of TD, representing specific TD instances ``openly admitted'' by the developers and often expressed through source code comments. Previous research… ▽ More

    Submitted 1 June, 2025; v1 submitted 2 May, 2025; originally announced May 2025.

  6. arXiv:2504.12067  [pdf, other

    cs.SE cs.DC cs.NI

    LO2: Microservice API Anomaly Dataset of Logs and Metrics

    Authors: Alexander Bakhtin, Jesse Nyyssölä, Yuqing Wang, Noman Ahmad, Ke Ping, Matteo Esposito, Mika Mäntylä, Davide Taibi

    Abstract: Context. Microservice-based systems have gained significant attention over the past years. A critical factor for understanding and analyzing the behavior of these systems is the collection of monitoring data such as logs, metrics, and traces. These data modalities can be used for anomaly detection and root cause analysis of failures. In particular, multi-modal methods utilizing several types of th… ▽ More

    Submitted 16 April, 2025; originally announced April 2025.

  7. arXiv:2503.23794  [pdf, other

    physics.comp-ph cond-mat.mtrl-sci cs.LG physics.chem-ph

    Force-Free Molecular Dynamics Through Autoregressive Equivariant Networks

    Authors: Fabian L. Thiemann, Thiago Reschützegger, Massimiliano Esposito, Tseden Taddese, Juan D. Olarte-Plata, Fausto Martelli

    Abstract: Molecular dynamics (MD) simulations play a crucial role in scientific research. Yet their computational cost often limits the timescales and system sizes that can be explored. Most data-driven efforts have been focused on reducing the computational cost of accurate interatomic forces required for solving the equations of motion. Despite their success, however, these machine learning interatomic po… ▽ More

    Submitted 31 March, 2025; originally announced March 2025.

    Comments: 25 pages total (19 manuscript, 6 SI). 5 figures in manuscript, 3 figures and 2 tables in SI

  8. arXiv:2503.13310  [pdf, other

    cs.SE cs.AI cs.DC cs.ET

    Generative AI for Software Architecture. Applications, Trends, Challenges, and Future Directions

    Authors: Matteo Esposito, Xiaozhou Li, Sergio Moreschini, Noman Ahmad, Tomas Cerny, Karthik Vaidhyanathan, Valentina Lenarduzzi, Davide Taibi

    Abstract: Context: Generative Artificial Intelligence (GenAI) is transforming much of software development, yet its application in software architecture is still in its infancy, and no prior study has systematically addressed the topic. Aim: We aim to systematically synthesize the use, rationale, contexts, usability, and future challenges of GenAI in software architecture. Method: We performed a multivocal… ▽ More

    Submitted 17 March, 2025; originally announced March 2025.

  9. arXiv:2502.07922  [pdf, other

    cs.RO cs.HC

    Visual-Haptic Model Mediated Teleoperation for Remote Ultrasound

    Authors: David Black, Maria Tirindelli, Septimiu Salcudean, Wolfgang Wein, Marco Esposito

    Abstract: Tele-ultrasound has the potential greatly to improve health equity for countless remote communities. However, practical scenarios involve potentially large time delays which cause current implementations of telerobotic ultrasound (US) to fail. Using a local model of the remote environment to provide haptics to the expert operator can decrease teleoperation instability, but the delayed visual feedb… ▽ More

    Submitted 11 February, 2025; originally announced February 2025.

    Comments: Supplementary video: https://youtu.be/fDLBah7bPeo . This work has been submitted to the IEEE for possible publication

  10. arXiv:2501.13520  [pdf, other

    cs.SE cs.DC cs.DM

    Network Centrality as a New Perspective on Microservice Architecture

    Authors: Alexander Bakhtin, Matteo Esposito, Valentina Lenarduzzi, Davide Taibi

    Abstract: Context: Over the past decade, the adoption of Microservice Architecture (MSA) has led to the identification of various patterns and anti-patterns, such as Nano/Mega/Hub services. Detecting these anti-patterns often involves modeling the system as a Service Dependency Graph (SDG) and applying graph-theoretic approaches. Aim: While previous research has explored software metrics (SMs) such as size,… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  11. arXiv:2501.12728  [pdf, other

    cs.SE cs.AI cs.DL

    A Call for Critically Rethinking and Reforming Data Analysis in Empirical Software Engineering

    Authors: Matteo Esposito, Mikel Robredo, Murali Sridharan, Guilherme Horta Travassos, Rafael Peñaloza, Valentina Lenarduzzi

    Abstract: Context: Empirical Software Engineering (ESE) drives innovation in SE through qualitative and quantitative studies. However, concerns about the correct application of empirical methodologies have existed since the 2006 Dagstuhl seminar on SE. Objective: To analyze three decades of SE research, identify mistakes in statistical methods, and evaluate experts' ability to detect and address these issue… ▽ More

    Submitted 22 January, 2025; originally announced January 2025.

  12. arXiv:2501.05165  [pdf

    cs.SE cs.AI cs.CL cs.CR cs.ET

    Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering

    Authors: Matteo Esposito

    Abstract: Context. Developing secure and reliable software remains a key challenge in software engineering (SE). The ever-evolving technological landscape offers both opportunities and threats, creating a dynamic space where chaos and order compete. Secure software engineering (SSE) must continuously address vulnerabilities that endanger software systems and carry broader socio-economic risks, such as compr… ▽ More

    Submitted 9 January, 2025; originally announced January 2025.

    Comments: PhD thesis

  13. arXiv:2412.11698  [pdf, ps, other

    cs.CR cs.AI cs.ET cs.SE

    On Large Language Models in Mission-Critical IT Governance: Are We Ready Yet?

    Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi

    Abstract: Context. The security of critical infrastructure has been a pressing concern since the advent of computers and has become even more critical in today's era of cyber warfare. Protecting mission-critical systems (MCSs), essential for national security, requires swift and robust governance, yet recent events reveal the increasing difficulty of meeting these challenges. Aim. Building on prior research… ▽ More

    Submitted 10 January, 2025; v1 submitted 16 December, 2024; originally announced December 2024.

  14. arXiv:2407.21007  [pdf, other

    cs.SE

    The Dual-Edged Sword of Technical Debt: Benefits and Issues Analyzed Through Developer Discussions

    Authors: Xiaozhou Li, Matteo Esposito, Andrea Janes, Valentina Lenarduzzi

    Abstract: Background. Technical debt (TD) has long been one of the key factors influencing the maintainability of software products. It represents technical compromises that sacrifice long-term software quality for potential short-term benefits. Objective. This work is to collectively investigate the practitioners' opinions on the various perspectives of TD from a large collection of articles. We find the t… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

  15. An evidence-based methodology for human rights impact assessment (HRIA) in the development of AI data-intensive systems

    Authors: Alessandro Mantelero, Maria Samantha Esposito

    Abstract: Different approaches have been adopted in addressing the challenges of Artificial Intelligence (AI), some centred on personal data and others on ethics, respectively narrowing and broadening the scope of AI regulation. This contribution aims to demonstrate that a third way is possible, starting from the acknowledgement of the role that human rights can play in regulating the impact of data-intensi… ▽ More

    Submitted 30 July, 2024; originally announced July 2024.

    Journal ref: 2021. 41 Computer Law & Security Review 105561

  16. arXiv:2407.18169  [pdf, other

    cs.SE

    In Search of Metrics to Guide Developer-Based Refactoring Recommendations

    Authors: Mikel Robredo, Matteo Esposito, Fabio Palomba, Rafael Peñaloza, Valentina Lenarduzzi

    Abstract: Context. Source code refactoring is a well-established approach to improving source code quality without compromising its external behavior. Motivation. The literature described the benefits of refactoring, yet its application in practice is threatened by the high cost of time, resource allocation, and effort required to perform it continuously. Providing refactoring recommendations closer to what… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

  17. arXiv:2407.17440  [pdf, ps, other

    cs.SE

    Generative AI in Evidence-Based Software Engineering: A White Paper

    Authors: Matteo Esposito, Andrea Janes, Davide Taibi, Valentina Lenarduzzi

    Abstract: Context. In less than a year practitioners and researchers witnessed a rapid and wide implementation of Generative Artificial Intelligence. The daily availability of new models proposed by practitioners and researchers has enabled quick adoption. Textual GAIs capabilities enable researchers worldwide to explore new generative scenarios simplifying and hastening all timeconsuming text generation an… ▽ More

    Submitted 22 August, 2024; v1 submitted 24 July, 2024; originally announced July 2024.

  18. Audio-Language Datasets of Scenes and Events: A Survey

    Authors: Gijs Wijngaard, Elia Formisano, Michele Esposito, Michel Dumontier

    Abstract: Audio-language models (ALMs) generate linguistic descriptions of sound-producing events and scenes. Advances in dataset creation and computational power have led to significant progress in this domain. This paper surveys 69 datasets used to train ALMs, covering research up to September 2024 (https://github.com/GLJS/audio-datasets). It provides a comprehensive analysis of datasets origins, audio an… ▽ More

    Submitted 8 January, 2025; v1 submitted 9 July, 2024; originally announced July 2024.

    Journal ref: IEEE Access 13 (2025) 20328-20360

  19. arXiv:2407.05963  [pdf, ps, other

    cs.SE cs.AI cs.NI cs.SI

    6GSoft: Software for Edge-to-Cloud Continuum

    Authors: Muhammad Azeem Akbar, Matteo Esposito, Sami Hyrynsalmi, Karthikeyan Dinesh Kumar, Valentina Lenarduzzi, Xiaozhou Li, Ali Mehraj, Tommi Mikkonen, Sergio Moreschini, Niko Mäkitalo, Markku Oivo, Anna-Sofia Paavonen, Risha Parveen, Kari Smolander, Ruoyu Su, Kari Systä, Davide Taibi, Nan Yang, Zheying Zhang, Muhammad Zohaib

    Abstract: In the era of 6G, developing and managing software requires cutting-edge software engineering (SE) theories and practices tailored for such complexity across a vast number of connected edge devices. Our project aims to lead the development of sustainable methods and energy-efficient orchestration models specifically for edge environments, enhancing architectural support driven by AI for contempora… ▽ More

    Submitted 9 July, 2024; v1 submitted 8 July, 2024; originally announced July 2024.

  20. arXiv:2406.17354  [pdf, other

    cs.SE cs.DC

    On the correlation between Architectural Smells and Static Analysis Warnings

    Authors: Matteo Esposito, Mikel Robredo, Francesca Arcelli Fontana, Valentina Lenarduzzi

    Abstract: Background. Software quality assurance is essential during software development and maintenance. Static Analysis Tools (SAT) are widely used for assessing code quality. Architectural smells are becoming more daunting to address and evaluate among quality issues. Objective. We aim to understand the relationships between static analysis warnings (SAW) and architectural smells (AS) to guide develop… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  21. arXiv:2406.10273  [pdf, other

    cs.CL cs.AI cs.CR cs.HC

    Beyond Words: On Large Language Models Actionability in Mission-Critical Risk Analysis

    Authors: Matteo Esposito, Francesco Palagiano, Valentina Lenarduzzi, Davide Taibi

    Abstract: Context. Risk analysis assesses potential risks in specific scenarios. Risk analysis principles are context-less; the same methodology can be applied to a risk connected to health and information technology security. Risk analysis requires a vast knowledge of national and international regulations and standards and is time and effort-intensive. A large language model can quickly summarize informat… ▽ More

    Submitted 6 September, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

  22. arXiv:2406.06764  [pdf, other

    cs.SE cs.CL cs.ET cs.PL

    $Classi|Q\rangle$ Towards a Translation Framework To Bridge The Classical-Quantum Programming Gap

    Authors: Matteo Esposito, Maryam Tavassoli Sabzevari, Boshuai Ye, Davide Falessi, Arif Ali Khan, Davide Taibi

    Abstract: Quantum computing, albeit readily available as hardware or emulated on the cloud, is still far from being available in general regarding complex programming paradigms and learning curves. This vision paper introduces $Classi|Q\rangle$, a translation framework idea to bridge Classical and Quantum Computing by translating high-level programming languages, e.g., Python or C++, into a low-level langua… ▽ More

    Submitted 1 July, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

  23. arXiv:2404.19586  [pdf, other

    cs.CV

    AI techniques for near real-time monitoring of contaminants in coastal waters on board future Phisat-2 mission

    Authors: Francesca Razzano, Pietro Di Stasio, Francesco Mauro, Gabriele Meoni, Marco Esposito, Gilda Schirinzi, Silvia L. Ullo

    Abstract: Differently from conventional procedures, the proposed solution advocates for a groundbreaking paradigm in water quality monitoring through the integration of satellite Remote Sensing (RS) data, Artificial Intelligence (AI) techniques, and onboard processing. The objective is to offer nearly real-time detection of contaminants in coastal waters addressing a significant gap in the existing literatu… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: 11 pages, 9 figures, submitted to IEEE JSTARS

  24. arXiv:2403.15756  [pdf

    cs.SE cs.AI cs.CL cs.CR cs.CY

    Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case Study

    Authors: Matteo Esposito, Francesco Palagiano

    Abstract: Preliminary security risk analysis (PSRA) provides a quick approach to identify, evaluate and propose remeditation to potential risks in specific scenarios. The extensive expertise required for an effective PSRA and the substantial ammount of textual-related tasks hinder quick assessments in mission-critical contexts, where timely and prompt actions are essential. The speed and accuracy of human e… ▽ More

    Submitted 23 March, 2024; originally announced March 2024.

  25. arXiv:2403.09219  [pdf

    cs.SE cs.CR cs.CY

    An Extensive Comparison of Static Application Security Testing Tools

    Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi

    Abstract: Context: Static Application Security Testing Tools (SASTTs) identify software vulnerabilities to support the security and reliability of software applications. Interestingly, several studies have suggested that alternative solutions may be more effective than SASTTs due to their tendency to generate false alarms, commonly referred to as low Precision. Aim: We aim to comprehensively evaluate SASTTs… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  26. arXiv:2403.08663  [pdf, other

    cs.SE

    QCSHQD: Quantum computing as a service for Hybrid classical-quantum software development: A Vision

    Authors: Maryam Tavassoli Sabzevari, Matteo Esposito, Arif Ali Khan, Davide Taibi

    Abstract: Quantum Computing (QC) is transitioning from theoretical frameworks to an indispensable powerhouse of computational capability, resulting in extensive adoption across both industrial and academic domains. QC presents exceptional advantages, including unparalleled processing speed and the potential to solve complex problems beyond the capabilities of classical computers. Nevertheless, academic rese… ▽ More

    Submitted 12 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

  27. arXiv:2402.15894  [pdf

    cs.CV

    Multi-graph Graph Matching for Coronary Artery Semantic Labeling

    Authors: Chen Zhao, Zhihui Xu, Pukar Baral, Michel Esposito, Weihua Zhou

    Abstract: Coronary artery disease (CAD) stands as the leading cause of death worldwide, and invasive coronary angiography (ICA) remains the gold standard for assessing vascular anatomical information. However, deep learning-based methods encounter challenges in generating semantic labels for arterial segments, primarily due to the morphological similarity between arterial branches and varying anatomy of art… ▽ More

    Submitted 14 August, 2024; v1 submitted 24 February, 2024; originally announced February 2024.

  28. arXiv:2401.07777  [pdf, other

    cs.CL physics.comp-ph quant-ph

    Quantum Transfer Learning for Acceptability Judgements

    Authors: Giuseppe Buonaiuto, Raffaele Guarasci, Aniello Minutolo, Giuseppe De Pietro, Massimo Esposito

    Abstract: Hybrid quantum-classical classifiers promise to positively impact critical aspects of natural language processing tasks, particularly classification-related ones. Among the possibilities currently investigated, quantum transfer learning, i.e., using a quantum circuit for fine-tuning pre-trained classical models for a specific task, is attracting significant attention as a potential platform for pr… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  29. arXiv:2401.03792  [pdf, other

    cs.CV cs.LG

    Monitoring water contaminants in coastal areas through ML algorithms leveraging atmospherically corrected Sentinel-2 data

    Authors: Francesca Razzano, Francesco Mauro, Pietro Di Stasio, Gabriele Meoni, Marco Esposito, Gilda Schirinzi, Silvia Liberata Ullo

    Abstract: Monitoring water contaminants is of paramount importance, ensuring public health and environmental well-being. Turbidity, a key parameter, poses a significant problem, affecting water quality. Its accurate assessment is crucial for safeguarding ecosystems and human consumption, demanding meticulous attention and action. For this, our study pioneers a novel approach to monitor the Turbidity contami… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

    Comments: 4 pages, 3 figures, IGARSS2024

  30. arXiv:2312.12902  [pdf, other

    cs.DB

    DXP: Billing Data Preparation for Big Data Analytics

    Authors: Luca Gagliardelli, Domenico Beneventano, Marco Esposito, Luca Zecchini, Giovanni Simonini, Sonia Bergamaschi, Fabio Miselli, Giuseppe Miano

    Abstract: In this paper, we present the data preparation activities that we performed for the Digital Experience Platform (DXP) project, commissioned and supervised by Doxee S.p.A.. DXP manages the billing data of the users of different companies operating in various sectors (electricity and gas, telephony, pay TV, etc.). This data has to be processed to provide services to the users (e.g., interactive bill… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  31. arXiv:2312.06667  [pdf

    cs.RO cs.AI cs.CG

    Optimizing Fault-Tolerant Quality-Guaranteed Sensor Deployments for UAV Localization in Critical Areas via Computational Geometry

    Authors: Marco Esposito, Toni Mancini, Enrico Tronci

    Abstract: The increasing spreading of small commercial Unmanned Aerial Vehicles (UAVs, aka drones) presents serious threats for critical areas such as airports, power plants, governmental and military facilities. In fact, such UAVs can easily disturb or jam radio communications, collide with other flying objects, perform espionage activity, and carry offensive payloads, e.g., weapons or explosives. A centra… ▽ More

    Submitted 5 December, 2023; originally announced December 2023.

    ACM Class: I.2.8; J.6

    Journal ref: IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023

  32. arXiv:2311.04999  [pdf, other

    cs.RO

    Implicit Neural Representations for Breathing-compensated Volume Reconstruction in Robotic Ultrasound

    Authors: Yordanka Velikova, Mohammad Farid Azampour, Walter Simson, Marco Esposito, Nassir Navab

    Abstract: Ultrasound (US) imaging is widely used in diagnosing and staging abdominal diseases due to its lack of non-ionizing radiation and prevalent availability. However, significant inter-operator variability and inconsistent image acquisition hinder the widespread adoption of extensive screening programs. Robotic ultrasound systems have emerged as a promising solution, offering standardized acquisition… ▽ More

    Submitted 3 April, 2024; v1 submitted 8 November, 2023; originally announced November 2023.

    Comments: This work has been submitted to the IEEE for possible publication

  33. arXiv:2308.10320  [pdf, other

    cs.CV

    Hyper Association Graph Matching with Uncertainty Quantification for Coronary Artery Semantic Labeling

    Authors: Chen Zhao, Michele Esposito, Zhihui Xu, Weihua Zhou

    Abstract: Coronary artery disease (CAD) is one of the primary causes leading to death worldwide. Accurate extraction of individual arterial branches on invasive coronary angiograms (ICA) is important for stenosis detection and CAD diagnosis. However, deep learning-based models face challenges in generating semantic segmentation for coronary arteries due to the morphological similarity among different types… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

    Comments: 8 pages, 2 figures

  34. arXiv:2303.07722  [pdf, other

    cs.SE

    Early Career Developers' Perceptions of Code Understandability. A Study of Complexity Metrics

    Authors: Matteo Esposito, Andrea Janes, Terhi Kilamo, Valentina Lenarduzzi

    Abstract: Context. Code understandability is fundamental. Developers need to understand the code they are modifying clearly. A low understandability can increase the amount of coding effort, and misinterpreting code impacts the entire development process. Ideally, developers should write clear and understandable code with the least effort. Aim. Our work investigates whether the McCabe Cyclomatic Complexity… ▽ More

    Submitted 15 July, 2024; v1 submitted 14 March, 2023; originally announced March 2023.

  35. AGMN: Association Graph-based Graph Matching Network for Coronary Artery Semantic Labeling on Invasive Coronary Angiograms

    Authors: Chen Zhao, Zhihui Xu, Jingfeng Jiang, Michele Esposito, Drew Pienta, Guang-Uei Hung, Weihua Zhou

    Abstract: Semantic labeling of coronary arterial segments in invasive coronary angiography (ICA) is important for automated assessment and report generation of coronary artery stenosis in the computer-aided diagnosis of coronary artery disease (CAD). Inspired by the training procedure of interventional cardiologists for interpreting the structure of coronary arteries, we propose an association graph-based g… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

    Comments: 26 pages, 7 figures

  36. Seniors' acceptance of virtual humanoid agents

    Authors: Anna Esposito, Terry Amorese, Marialucia Cuciniello, Antonietta M. Esposito, Alda Troncone, Maria Ines Torres, Stephan Schlögl, Gennaro Cordasco

    Abstract: This paper reports on a study conducted as part of the EU EMPATHIC project, whose goal is to develop an empathic virtual coach capable of enhancing seniors' well-being, focusing on user requirements and expectations with respect to participants' age and technology experiences (i.e. participants' familiarity with technological devices such as smartphones, laptops, and tablets). The data shows that… ▽ More

    Submitted 2 May, 2021; originally announced May 2021.

    Comments: 14 pages

  37. arXiv:2102.09685  [pdf, other

    cs.LG stat.ML

    Convolutional Normalization

    Authors: Massimiliano Esposito, Nader Ganaba

    Abstract: As the deep neural networks are being applied to complex tasks, the size of the networks and architecture increases and their topology becomes more complicated too. At the same time, training becomes slow and at some instances inefficient. This motivated the introduction of various normalization techniques such as Batch Normalization and Layer Normalization. The aforementioned normalization method… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

  38. arXiv:2011.00099  [pdf, other

    cs.RO

    Autonomous Robotic Screening of Tubular Structures based only on Real-Time Ultrasound Imaging Feedback

    Authors: Zhongliang Jiang, Zhenyu Li, Matthias Grimm, Mingchuan Zhou, Marco Esposito, Wolfgang Wein, Walter Stechele, Thomas Wendler, Nassir Navab

    Abstract: Ultrasound (US) imaging is widely employed for diagnosis and staging of peripheral vascular diseases (PVD), mainly due to its high availability and the fact it does not emit radiation. However, high inter-operator variability and a lack of repeatability of US image acquisition hinder the implementation of extensive screening programs. To address this challenge, we propose an end-to-end workflow fo… ▽ More

    Submitted 30 June, 2021; v1 submitted 30 October, 2020; originally announced November 2020.

    Comments: Accepted for publication in IEEE Transactions on Industrial Electronics Video: https://www.youtube.com/watch?v=VAaNZL0I5ik

  39. arXiv:1911.01968  [pdf

    cs.CY cs.ET

    Thermodynamic Computing

    Authors: Tom Conte, Erik DeBenedictis, Natesh Ganesh, Todd Hylton, John Paul Strachan, R. Stanley Williams, Alexander Alemi, Lee Altenberg, Gavin Crooks, James Crutchfield, Lidia del Rio, Josh Deutsch, Michael DeWeese, Khari Douglas, Massimiliano Esposito, Michael Frank, Robert Fry, Peter Harsha, Mark Hill, Christopher Kello, Jeff Krichmar, Suhas Kumar, Shih-Chii Liu, Seth Lloyd, Matteo Marsili , et al. (14 additional authors not shown)

    Abstract: The hardware and software foundations laid in the first half of the 20th Century enabled the computing technologies that have transformed the world, but these foundations are now under siege. The current computing paradigm, which is the foundation of much of the current standards of living that we now enjoy, faces fundamental limitations that are evident from several perspectives. In terms of hard… ▽ More

    Submitted 14 November, 2019; v1 submitted 5 November, 2019; originally announced November 2019.

    Comments: A Computing Community Consortium (CCC) workshop report, 36 pages

    Report number: ccc2019report_6

  40. arXiv:1806.01413  [pdf, other

    cs.CV

    CFCM: Segmentation via Coarse to Fine Context Memory

    Authors: Fausto Milletari, Nicola Rieke, Maximilian Baust, Marco Esposito, Nassir Navab

    Abstract: Recent neural-network-based architectures for image segmentation make extensive usage of feature forwarding mechanisms to integrate information from multiple scales. Although yielding good results, even deeper architectures and alternative methods for feature fusion at different resolutions have been scarcely investigated for medical applications. In this work we propose to implement segmentation… ▽ More

    Submitted 4 June, 2018; originally announced June 2018.

    Comments: Accepted for presentation at MICCAI 2018

  41. arXiv:1802.00328  [pdf, other

    cs.RO

    Analysis of Motion Planning by Sampling in Subspaces of Progressively Increasing Dimension

    Authors: Marios P. Xanthidis, Joel M. Esposito, Ioannis Rekleitis, Jason M. O'Kane

    Abstract: Despite the performance advantages of modern sampling-based motion planners, solving high dimensional planning problems in near real-time remains a challenge. Applications include hyper-redundant manipulators, snake-like and humanoid robots. Based on the intuition that many of these problem instances do not require the robots to exercise every degree of freedom independently, we introduce an enhan… ▽ More

    Submitted 30 January, 2018; originally announced February 2018.

    Comments: 8 pages, 11 figures. arXiv admin note: substantial text overlap with arXiv:1612.07333