default search action
Claudio Bettini
Person information
- affiliation: University of Milan, Italy
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Daniele Spoladore, Francesco Stella, Martina Tosi, Erna Cecilia Lorenzini, Claudio Bettini:
A knowledge-based decision support system to support family doctors in personalizing type-2 diabetes mellitus medical nutrition therapy. Comput. Biol. Medicine 180: 109001 (2024) - [c103]Marco Colussi, Dragan Ahmetovic, Gabriele Civitarese, Claudio Bettini, Aiman Solyman, Roberta Gualtierotti, Flora Peyvandi, Sergio Mascetti:
LoRIS - Weakly-Supervised Anomaly Detection for Ultrasound Images. ASMUS@MICCAI 2024: 198-208 - [c102]Claudio Bettini:
Keynote: The Pervasive Hospital Vision: Challenges for Data Management and Context Reasoning. PerCom Workshops 2024: 1 - [c101]Luca Arrotta, Claudio Bettini, Gabriele Civitarese, Michele Fiori:
ContextGPT: Infusing LLMs Knowledge into Neuro-Symbolic Activity Recognition Models. SMARTCOMP 2024: 55-62 - [c100]Dragan Ahmetovic, Alessio Angileri, Sara Arcudi, Claudio Bettini, Gabriele Civitarese, Marco Colussi, Andrea Giachi, Roberta Gualtierotti, Sergio Mascetti, Matteo Manzoni, Flora Peyvandi, Aiman Solyman, Addolorata Truma:
Insights on the Development of PRACTICE, A Research-Oriented Healthcare Platform. SMARTCOMP 2024: 380-385 - [i20]Luca Arrotta, Claudio Bettini, Gabriele Civitarese, Michele Fiori:
ContextGPT: Infusing LLMs Knowledge into Neuro-Symbolic Activity Recognition Models. CoRR abs/2403.06586 (2024) - [i19]Sannara Ek, Riccardo Presotto, Gabriele Civitarese, François Portet, Philippe Lalanda, Claudio Bettini:
Comparing Self-Supervised Learning Techniques for Wearable Human Activity Recognition. CoRR abs/2404.15331 (2024) - [i18]Gabriele Civitarese, Michele Fiori, Priyankar Choudhary, Claudio Bettini:
Large Language Models are Zero-Shot Recognizers for Activities of Daily Living. CoRR abs/2407.01238 (2024) - [i17]Michele Fiori, Gabriele Civitarese, Claudio Bettini:
Using Large Language Models to Compare Explainable Models for Smart Home Human Activity Recognition. CoRR abs/2408.06352 (2024) - 2023
- [j58]Luca Arrotta, Claudio Bettini, Gabriele Civitarese:
MICAR: multi-inhabitant context-aware activity recognition in home environments. Distributed Parallel Databases 41(4): 571-602 (2023) - [j57]Luca Arrotta, Gabriele Civitarese, Claudio Bettini:
Semantic Loss: A New Neuro-Symbolic Approach for Context-Aware Human Activity Recognition. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(4): 147:1-147:29 (2023) - [j56]Marco Colussi, Gabriele Civitarese, Dragan Ahmetovic, Claudio Bettini, Roberta Gualtierotti, Flora Peyvandi, Sergio Mascetti:
Ultrasound detection of subquadricipital recess distension. Intell. Syst. Appl. 17: 200183 (2023) - [j55]Riccardo Presotto, Gabriele Civitarese, Claudio Bettini:
Federated Clustering and Semi-Supervised learning: A new partnership for personalized Human Activity Recognition. Pervasive Mob. Comput. 88: 101726 (2023) - [j54]Luca Arrotta, Gabriele Civitarese, Claudio Bettini:
Probabilistic knowledge infusion through symbolic features for context-aware activity recognition. Pervasive Mob. Comput. 91: 101780 (2023) - [c99]Luca Arrotta, Gabriele Civitarese, Riccardo Presotto, Claudio Bettini:
DOMINO: A Dataset for Context-Aware Human Activity Recognition using Mobile Devices. MDM 2023: 346-351 - [c98]Marco Colussi, Sergio Mascetti, Dragan Ahmetovic, Gabriele Civitarese, Marco Cacciatori, Flora Peyvandi, Roberta Gualtierotti, Sara Arcudi, Claudio Bettini:
GAJA - Guided self-Acquisition of Joint ultrAsound images. ASMUS@MICCAI 2023: 132-141 - [c97]Riccardo Presotto, Gabriele Civitarese, Claudio Bettini:
Is Querying Users Acceptable for Human Activity Recognition Based on Active Learning? PerCom Workshops 2023: 521-526 - [c96]Riccardo Presotto, Sannara Ek, Gabriele Civitarese, François Portet, Philippe Lalanda, Claudio Bettini:
Combining Public Human Activity Recognition Datasets to Mitigate Labeled Data Scarcity. SMARTCOMP 2023: 33-40 - [i16]Luca Arrotta, Gabriele Civitarese, Samuele Valente, Claudio Bettini:
SelfAct: Personalized Activity Recognition based on Self-Supervised and Active Learning. CoRR abs/2304.09530 (2023) - [i15]Luca Arrotta, Gabriele Civitarese, Claudio Bettini:
Neuro-Symbolic Approaches for Context-Aware Human Activity Recognition. CoRR abs/2306.05058 (2023) - [i14]Riccardo Presotto, Sannara Ek, Gabriele Civitarese, François Portet, Philippe Lalanda, Claudio Bettini:
Combining Public Human Activity Recognition Datasets to Mitigate Labeled Data Scarcity. CoRR abs/2306.13735 (2023) - 2022
- [j53]Luca Arrotta, Gabriele Civitarese, Claudio Bettini:
DeXAR: Deep Explainable Sensor-Based Activity Recognition in Smart-Home Environments. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 1:1-1:30 (2022) - [j52]Riccardo Presotto, Gabriele Civitarese, Claudio Bettini:
Semi-supervised and personalized federated activity recognition based on active learning and label propagation. Pers. Ubiquitous Comput. 26(5): 1281-1298 (2022) - [c95]Luca Arrotta, Gabriele Civitarese, Michele Fiori, Claudio Bettini:
Explaining Human Activities Instances Using Deep Learning Classifiers. DSAA 2022: 1-10 - [c94]Riccardo Presotto, Gabriele Civitarese, Claudio Bettini:
FedCLAR: Federated Clustering for Personalized Sensor-Based Human Activity Recognition. PerCom 2022: 227-236 - [c93]Riccardo Presotto, Gabriele Civitarese, Claudio Bettini:
Preliminary Results on Sensitive Data Leakage in Federated Human Activity Recognition. PerCom Workshops 2022: 304-309 - [c92]Luca Arrotta, Gabriele Civitarese, Claudio Bettini:
Knowledge Infusion for Context-Aware Sensor-Based Human Activity Recognition. SMARTCOMP 2022: 1-8 - [i13]Marco Colussi, Gabriele Civitarese, Dragan Ahmetovic, Claudio Bettini, Roberta Gualtierotti, Flora Peyvandi, Sergio Mascetti:
Ultrasound Detection of Subquadricipital Recess Distension. CoRR abs/2211.12089 (2022) - 2021
- [j51]Gabriele Civitarese, Juan Ye, Matteo Zampatti, Claudio Bettini:
Collaborative activity recognition with heterogeneous activity sets and privacy preferences. J. Ambient Intell. Smart Environ. 13(6): 433-452 (2021) - [j50]Gabriele Civitarese, Timo Sztyler, Daniele Riboni, Claudio Bettini, Heiner Stuckenschmidt:
POLARIS: Probabilistic and Ontological Activity Recognition in Smart-Homes. IEEE Trans. Knowl. Data Eng. 33(1): 209-223 (2021) - [c91]Luca Arrotta, Claudio Bettini, Gabriele Civitarese:
The MARBLE Dataset: Multi-inhabitant Activities of Daily Living Combining Wearable and Environmental Sensors Data. MobiQuitous 2021: 451-468 - [c90]Claudio Bettini, Gabriele Civitarese, Michele Fiori:
Explainable Activity Recognition over Interpretable Models. PerCom Workshops 2021: 32-37 - [i12]Claudio Bettini, Gabriele Civitarese, Riccardo Presotto:
Personalized Semi-Supervised Federated Learning for Human Activity Recognition. CoRR abs/2104.08094 (2021) - 2020
- [j49]Claudio Bettini, Gabriele Civitarese, Davide Giancane, Riccardo Presotto:
ProCAVIAR: Hybrid Data-Driven and Probabilistic Knowledge-Based Activity Recognition. IEEE Access 8: 146876-146886 (2020) - [j48]Claudio Bettini, Salil S. Kanhere, Marc Langheinrich, Archan Misra, Delphine Reinhardt:
Is Privacy Regulation Slowing Down Research on Pervasive Computing? Computer 53(6): 44-52 (2020) - [j47]Claudio Bettini, Gabriele Civitarese, Riccardo Presotto:
CAVIAR: Context-driven Active and Incremental Activity Recognition. Knowl. Based Syst. 196: 105816 (2020) - [j46]Sergio Mascetti, Gabriele Civitarese, Omar El Malak, Claudio Bettini:
SmartWheels: Detecting urban features for wheelchair users' navigation. Pervasive Mob. Comput. 62: 101115 (2020) - [c89]Dragan Ahmetovic, Claudio Bettini, Mariano Ciucci, Filippo Dacarro, Paolo Dubini, Alberto Gotti, Gerard O'Reilly, Alessandra Marino, Sergio Mascetti, Denis Sarigiannis:
Emergency navigation assistance for industrial plants workers subject to situational impairment. ASSETS 2020: 66:1-66:3 - [c88]Luca Arrotta, Claudio Bettini, Gabriele Civitarese, Riccardo Presotto:
Context-Aware Data Association for Multi-Inhabitant Sensor-Based Activity Recognition. MDM 2020: 125-130 - [c87]Claudio Bettini, Gabriele Civitarese:
Towards Active Learning Interfaces for Multi-Inhabitant Activity Recognition. PerCom Workshops 2020: 1-6
2010 – 2019
- 2019
- [j45]Gabriele Civitarese, Claudio Bettini, Timo Sztyler, Daniele Riboni, Heiner Stuckenschmidt:
newNECTAR: Collaborative active learning for knowledge-based probabilistic activity recognition. Pervasive Mob. Comput. 56: 88-105 (2019) - [c86]Gabriele Civitarese, Riccardo Presotto, Claudio Bettini:
Hybrid data-driven and context-aware activity recognition with mobile devices. UbiComp/ISWC Adjunct 2019: 266-267 - [c85]Claudio Bettini:
Is Privacy Regulation Slowing Down or Enabling the Wide Adoption of Pervasive Systems? Panel Summary. PerCom 2019: 1-2 - [c84]Gabriele Civitarese, Sergio Mascetti, Alberto Butifar, Claudio Bettini:
Automatic Detection of Urban Features from Wheelchair Users' Movements. PerCom 2019: 1-10 - [i11]Gabriele Civitarese, Riccardo Presotto, Claudio Bettini:
Context-driven Active and Incremental Activity Recognition. CoRR abs/1906.03033 (2019) - 2018
- [j44]Eran Toch, Claudio Bettini, Erez Shmueli, Laura Radaelli, Andrea Lanzi, Daniele Riboni, Bruno Lepri:
The Privacy Implications of Cyber Security Systems: A Technological Survey. ACM Comput. Surv. 51(2): 36:1-36:27 (2018) - [j43]Sergio Mascetti, Nadia Metoui, Andrea Lanzi, Claudio Bettini:
EPIC: a Methodology for Evaluating Privacy Violation Risk in Cybersecurity Systems. Trans. Data Priv. 11(3): 239-277 (2018) - [c83]Gabriele Civitarese, Claudio Bettini, Timo Sztyler, Daniele Riboni, Heiner Stuckenschmidt:
NECTAR: Knowledge-based Collaborative Active Learning for Activity Recognition. PerCom 2018: 1-10 - [e3]Aris Gkoulalas-Divanis, Claudio Bettini:
Handbook of Mobile Data Privacy. Springer 2018, ISBN 978-3-319-98160-4 [contents] - [r8]Claudio Bettini, X. Sean Wang, Sushil Jajodia:
Temporal Granularity. Encyclopedia of Database Systems (2nd ed.) 2018 - [r7]Aris Gkoulalas-Divanis, Claudio Bettini:
Introduction to Mobility Data Privacy. Handbook of Mobile Data Privacy 2018: 1-9 - [r6]Claudio Bettini:
Privacy Protection in Location-Based Services: A Survey. Handbook of Mobile Data Privacy 2018: 73-96 - 2017
- [c82]Claudio Bettini:
Personal data protection in pervasive health systems. PerCom Workshops 2017: 381 - [c81]Gabriele Civitarese, Claudio Bettini:
Monitoring objects manipulations to detect abnormal behaviors. PerCom Workshops 2017: 388-393 - [r5]Claudio Bettini, Sergio Mascetti, X. Sean Wang:
Privacy Threats in Location-Based Services. Encyclopedia of GIS 2017: 1652-1661 - 2016
- [j42]Daniele Riboni, Claudio Bettini, Gabriele Civitarese, Zaffar Haider Janjua, Rim Helaoui:
SmartFABER: Recognizing fine-grained abnormal behaviors for early detection of mild cognitive impairment. Artif. Intell. Medicine 67: 57-74 (2016) - [j41]Kim-Kwang Raymond Choo, Lior Rokach, Claudio Bettini:
Mobile security and privacy: Advances, challenges and future research directions. Pervasive Mob. Comput. 32: 1-2 (2016) - [c80]Gabriele Civitarese, Stefano Belfiore, Claudio Bettini:
Let the objects tell what you are doing. UbiComp Adjunct 2016: 773-782 - [c79]Claudio Bettini:
On the impact of activity recognition in monitoring cognitive decline. PerCom Workshops 2016: 1 - [c78]Daniele Riboni, Gabriele Civitarese, Claudio Bettini:
Analysis of long-term abnormal behaviors for early detection of cognitive decline. PerCom Workshops 2016: 1-6 - [c77]Zaffar Haider Janjua, Daniele Riboni, Claudio Bettini:
Towards automatic induction of abnormal behavioral patterns for recognizing mild cognitive impairment. SAC 2016: 143-148 - 2015
- [j40]Claudio Bettini, Daniele Riboni:
Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive Mob. Comput. 17: 159-174 (2015) - [j39]Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obfuscation of Sensitive Data for Incremental Release of Network Flows. IEEE/ACM Trans. Netw. 23(2): 672-686 (2015) - [c76]Daniele Riboni, Claudio Bettini, Gabriele Civitarese, Zaffar Haider Janjua, Rim Helaoui:
Fine-grained recognition of abnormal behaviors for early detection of mild cognitive impairment. PerCom 2015: 149-154 - [c75]Gabriele Civitarese, Zaffar Haider Janjua, Daniele Riboni, Claudio Bettini:
Demo abstract: Demonstration of the FABER system for fine-grained recognition of abnormal behaviors. PerCom Workshops 2015: 199-201 - [c74]Daniele Riboni, Claudio Bettini, Gabriele Civitarese, Zaffar Haider Janjua, Viola Bulgari:
From lab to life: Fine-grained behavior monitoring in the elderly's home. PerCom Workshops 2015: 342-347 - [i10]Daniele Riboni, Claudio Bettini, Gabriele Civitarese, Zaffar Haider Janjua, Rim Helaoui:
Extended Report: Fine-grained Recognition of Abnormal Behaviors for Early Detection of Mild Cognitive Impairment. CoRR abs/1501.05581 (2015) - 2014
- [j38]Claudio Bettini, Marco Gruteser, Christine Julien, Marius Portmann:
Editorial. Pervasive Mob. Comput. 10: 1-2 (2014) - [j37]Sergio Mascetti, Letizia Bertolaja, Claudio Bettini:
SafeBox: adaptable spatio-temporal generalization for location privacy protection. Trans. Data Priv. 7(2): 131-163 (2014) - [c73]Daniele Riboni, Claudio Bettini:
Differentially-private release of check-in data for venue recommendation. PerCom 2014: 190-198 - 2013
- [c72]Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. INFOCOM 2013: 7-8 - [c71]Antonio Villani, Daniele Riboni, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obsidian: A scalable and efficient framework for NetFlow obfuscation. INFOCOM Workshops 2013: 73-74 - [c70]Sergio Mascetti, Letizia Bertolaja, Claudio Bettini:
A Practical Location Privacy Attack in Proximity Services. MDM (1) 2013: 87-96 - [c69]Daniele Riboni, Claudio Bettini:
A Platform for Privacy-Preserving Geo-social Recommendation of Points of Interest. MDM (1) 2013: 347-349 - 2012
- [j36]Daniele Riboni, Claudio Bettini:
Context provenance to enhance the dependability of ambient intelligence systems. Pers. Ubiquitous Comput. 16(7): 799-818 (2012) - [j35]Daniele Riboni, Linda Pareschi, Claudio Bettini:
JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks. IEEE Trans. Dependable Secur. Comput. 9(3): 387-400 (2012) - [c68]Sergio Mascetti, Letizia Bertolaja, Claudio Bettini:
Location privacy attacks based on distance and density information. SIGSPATIAL/GIS 2012: 514-517 - [c67]Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini:
Obfuscation of sensitive data in network flows. INFOCOM 2012: 2372-2380 - [c66]Daniele Riboni, Claudio Bettini:
Private context-aware recommendation of points of interest: An initial investigation. PerCom Workshops 2012: 584-589 - 2011
- [j34]Carmen Ruiz Vicente, Dario Freni, Claudio Bettini, Christian S. Jensen:
Location-Related Privacy in Geo-Social Networks. IEEE Internet Comput. 15(3): 20-27 (2011) - [j33]Daniele Riboni, Claudio Bettini:
OWL 2 modeling and reasoning with complex human activities. Pervasive Mob. Comput. 7(3): 379-395 (2011) - [j32]Jadwiga Indulska, Claudio Bettini, Roy H. Campbell, Cecilia Mascolo:
Editorial. Pervasive Mob. Comput. 7(6): 641-642 (2011) - [j31]Daniele Riboni, Claudio Bettini:
COSAR: hybrid reasoning for context-aware activity recognition. Pers. Ubiquitous Comput. 15(3): 271-289 (2011) - [j30]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4): 541-566 (2011) - [c65]Chatschik Bisdikian, Bernhard Mitschang, Dino Pedreschi, Vincent S. Tseng, Claudio Bettini:
Challenges for Mobile Data Management in the Era of Cloud and Social Computing. Mobile Data Management (1) 2011: 6 - [c64]Daniele Riboni, Linda Pareschi, Claudio Bettini:
Integrating Identity, Location, and Absence Privacy in Context-Aware Retrieval of Points of Interest. Mobile Data Management (1) 2011: 135-140 - [c63]Daniele Riboni, Linda Pareschi, Laura Radaelli, Claudio Bettini:
Is ontology-based activity recognition really effective? PerCom Workshops 2011: 427-431 - [r4]Claudio Bettini:
Temporal Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1284-1285 - [i9]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang:
Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets. CoRR abs/1110.2213 (2011) - 2010
- [j29]Claudio Bettini, Oliver Brdiczka, Karen Henricksen, Jadwiga Indulska, Daniela Nicklas, Anand Ranganathan, Daniele Riboni:
A survey of context modelling and reasoning techniques. Pervasive Mob. Comput. 6(2): 161-180 (2010) - [j28]Delfina Malandrino, Francesca Mazzoni, Daniele Riboni, Claudio Bettini, Michele Colajanni, Vittorio Scarano:
MIMOSA: context-aware adaptation for ubiquitous web access. Pers. Ubiquitous Comput. 14(4): 301-320 (2010) - [c62]Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti, Claudio Bettini, Christian S. Jensen:
Preserving location and absence privacy in geo-social networks. CIKM 2010: 309-318 - [c61]Dario Freni, Sergio Mascetti, Claudio Bettini, Marco Cozzi:
Pcube: A System to Evaluate and Test Privacy-Preserving Proximity Services. Mobile Data Management 2010: 273-275 - [c60]Claudio Bettini:
IEEE PerCom 2010 PhD Forum: Message from the PhD Forum chair. PerCom Workshops 2010 - [c59]Daniele Riboni, Linda Pareschi, Claudio Bettini:
Towards the adaptive integration of multiple context reasoners in pervasive computing environments. PerCom Workshops 2010: 25-29 - [i8]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. CoRR abs/1007.0408 (2010) - [i7]Daniele Riboni, Linda Pareschi, Claudio Bettini:
Preserving Privacy in Sequential Data Release against Background Knowledge Attacks. CoRR abs/1010.0924 (2010)
2000 – 2009
- 2009
- [j27]Alessandra Agostini, Claudio Bettini, Daniele Riboni:
Hybrid reasoning in the CARE middleware for context awareness. Int. J. Web Eng. Technol. 5(1): 3-23 (2009) - [j26]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability. J. Comput. Secur. 17(1): 5-42 (2009) - [c58]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia:
Anonymity and Historical-Anonymity in Location-Based Services. Privacy in Location-Based Applications 2009: 1-30 - [c57]Daniele Riboni, Linda Pareschi, Claudio Bettini:
Privacy in Georeferenced Context-Aware Services: A Survey. Privacy in Location-Based Applications 2009: 151-172 - [c56]Sergio Mascetti, Claudio Bettini, Dario Freni, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy-Aware Proximity Based Services. Mobile Data Management 2009: 31-40 - [c55]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia:
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. Mobile Data Management 2009: 172-181 - [c54]Sergio Mascetti, Claudio Bettini, Dario Freni:
Longitude: Centralized Privacy-Preserving Computation of Users' Proximity. Secure Data Management 2009: 142-157 - [c53]Dario Freni, Sergio Mascetti, Claudio Bettini:
Hide & Crypt: Protecting Privacy in Proximity-Based Services. SSTD 2009: 441-444 - [c52]Daniele Riboni, Claudio Bettini:
Cor-Split: Defending Privacy in Data Re-publication from Historical Correlations and Compromised Tuples. SSDBM 2009: 562-579 - [c51]Daniele Riboni, Linda Pareschi, Claudio Bettini, Sushil Jajodia:
Preserving Anonymity of Recurrent Location-Based Queries. TIME 2009: 62-69 - [c50]Daniele Riboni, Claudio Bettini:
Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning. UIC 2009: 39-53 - [e2]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang:
Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]. Lecture Notes in Computer Science 5599, Springer 2009, ISBN 978-3-642-03510-4 [contents] - [r3]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Temporal Granularity. Encyclopedia of Database Systems 2009: 2968-2973 - 2008
- [j25]Claudio Bettini, Linda Pareschi, Daniele Riboni:
Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. Pervasive Mob. Comput. 4(5): 697-718 (2008) - [j24]Daniele Riboni, Linda Pareschi, Claudio Bettini:
Shadow attacks on users' anonymity in pervasive computing environments. Pervasive Mob. Comput. 4(6): 819-835 (2008) - [c49]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. PiLBA 2008 - [c48]Daniele Riboni, Linda Pareschi, Claudio Bettini:
Privacy in Georeferenced Context-aware Services: A Survey. PiLBA 2008 - [c47]Linda Pareschi, Daniele Riboni, Claudio Bettini:
Protecting Users' Anonymity in Pervasive Computing Environments. PerCom 2008: 11-19 - [c46]Linda Pareschi, Daniele Riboni, Alessandra Agostini, Claudio Bettini:
Composition and Generalization of Context Data for Privacy Preservation. PerCom 2008: 429-433 - [c45]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
How Anonymous Is k-Anonymous? Look at Your Quasi-ID. Secure Data Management 2008: 1-15 - [p1]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang:
Privacy Protection through Anonymity in Location-based Services. Handbook of Database Security 2008: 509-530 - [e1]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang:
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008. CEUR Workshop Proceedings 397, CEUR-WS.org 2008 [contents] - [r2]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang:
Privacy Threats in Location-Based Services. Encyclopedia of GIS 2008: 906-912 - 2007
- [j23]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang:
Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets. J. Artif. Intell. Res. 28: 299-348 (2007) - [j22]Sergio Mascetti, Claudio Bettini, Dario Freni, Xiaoyang Sean Wang:
Spatial generalisation algorithms for LBS privacy preservation. J. Locat. Based Serv. 1(3): 179-207 (2007) - [j21]Claudio Bettini, Dario Maggiorini, Daniele Riboni:
Distributed Context Monitoring for the Adaptation of Continuous Services. World Wide Web 10(4): 503-528 (2007) - [c44]Claudio Bettini, Daniele Riboni:
Context-aware Web Services for Distributed Retrieval of Points of Interest. ICIW 2007: 36 - [c43]Linda Pareschi, Daniele Riboni, Sergio Mascetti, Claudio Bettini:
Towards Privacy Protection in a Middleware for Context-awareness. CAT@IFIPTM 2007 - [c42]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Sushil Jajodia:
Anonymity in Location-Based Services: Towards a General Framework. MDM 2007: 69-76 - [c41]Sergio Mascetti, Claudio Bettini:
A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation. MDM 2007: 258-262 - [c40]Alessandra Agostini, Claudio Bettini, Daniele Riboni:
A Performance Evaluation of Ontology-Based Context Reasoning. PerCom Workshops 2007: 3-8 - [c39]Claudio Bettini, Sushil Jajodia, Linda Pareschi:
Anonymity and Diversity in LBS: A Preliminary Investigation. PerCom Workshops 2007: 577-580 - [c38]Linda Pareschi, Claudio Bettini:
Beyond Anonymity in Location Based Services. SEBD 2007: 447-454 - 2006
- [c37]Alessandra Agostini, Claudio Bettini, Daniele Riboni:
Online Ontological Reasoning for Context-Aware Internet Services. C&O@ECAI 2006 - [c36]Alessandra Agostini, Claudio Bettini, Daniele Riboni:
Experience Report: Ontological Reasoning for Context-aware Internet Services. PerCom Workshops 2006: 8-12 - [c35]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
k-Anonymity in Databases with Timestamped Data. TIME 2006: 177-186 - [r1]Alessandra Agostini, Claudio Bettini, Daniele Riboni:
Integrated Profiling of Users, Terminals, and Provisioning Environments. The Handbook of Mobile Middleware 2006: 901-934 - [i6]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
The Role of Quasi-identifiers in k-Anonymity Revisited. CoRR abs/cs/0611035 (2006) - 2005
- [j20]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Information Release Control: A Learning-Based Architecture. J. Data Semant. 2: 176-198 (2005) - [c34]Claudio Bettini, Nicolò Cesa-Bianchi, Daniele Riboni:
A Distributed Architecture for Management and Retrieval of Extended Points of Interest. ICDCS Workshops 2005: 266-272 - [c33]Alessandra Agostini, Claudio Bettini, Daniele Riboni:
Demo: ontology-based context-aware delivery of extended points of interest. Mobile Data Management 2005: 322-323 - [c32]Alessandra Agostini, Claudio Bettini, Daniele Riboni:
Loosely Coupling Ontological Reasoning with an Efficient Middleware for Context-awareness. MobiQuitous 2005: 175-182 - [c31]Claudio Bettini, Dario Maggiorini, Daniele Riboni:
Distributed Context Monitoring for Continuous Mobile Services. MOBIS 2005: 123-137 - [c30]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Protecting Privacy Against Location-Based Personal Identification. Secure Data Management 2005: 185-199 - [c29]Claudio Bettini, Sergio Mascetti:
An Efficient Algorithm for Minimizing Time Granularity Periodical Representations. TIME 2005: 20-25 - 2004
- [j19]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Reasoning with advanced policy rules and its application to access control. Int. J. Digit. Libr. 4(3): 156-170 (2004) - [c28]Claudio Bettini, Sergio Mascetti, Vincenzo Pupillo:
A System Prototype for Solving Multi-granularity Temporal CSP. CSCLP 2004: 142-156 - [c27]Alessandra Agostini, Claudio Bettini, Nicolò Cesa-Bianchi, Dario Maggiorini, Daniele Riboni, Michele Ruberl, Cristiano Sala, Davide Vitali:
Towards Highly Adaptive Services for Mobile Computing. MOBIS 2004: 121-134 - [c26]Claudio Bettini, Daniele Riboni:
Profile Aggregation and Policy Evaluation for Adaptive Internet Services. MobiQuitous 2004: 290-298 - [c25]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Identifying Sensitive Associations in Databases for Release Control. Secure Data Management 2004: 187-201 - [c24]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang:
Mapping Calendar Expressions into Periodical Granularities. TIME 2004: 96-102 - 2003
- [j18]Claudio Bettini, Angelo Montanari:
Temporal representation and reasoning. Data Knowl. Eng. 44(2): 139-141 (2003) - [j17]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Provisions and Obligations in Policy Rule Management. J. Netw. Syst. Manag. 11(3): 351-372 (2003) - [j16]Claudio Bettini, Simone Ruffini:
Direct Granularity Conversions among Temporal Constraints. J. Univers. Comput. Sci. 9(9): 1123-1136 (2003) - [c23]Claudio Bettini, Sergio Mascetti, Vincenzo Pupillo:
GSTP: A Temporal Reasoning System Supporting Multi-Granularity Temporal Constraints. IJCAI 2003: 1633-1634 - [c22]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A Learning-based Approach to Information Release Control. IICIS 2003: 83-105 - [c21]Claudio Bettini:
Web services for time granularity reasoning. TIME 2003: 2-4 - 2002
- [j15]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Solving multi-granularity temporal constraint networks. Artif. Intell. 140(1/2): 107-152 (2002) - [j14]Claudio Bettini, Angelo Montanari:
Research Issues and Trends in Spatial and Temporal Granularities. Ann. Math. Artif. Intell. 36(1-2): 1-4 (2002) - [j13]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Temporal Reasoning in Workflow Systems. Distributed Parallel Databases 11(3): 269-306 (2002) - [c20]Claudio Bettini, Simone Ruffini:
Deriving Abstract Views of Multi-granularity Temporal Constraint Networks. DEXA 2002: 454-463 - [c19]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Obligation Monitoring in Policy Management. POLICY 2002: 2-12 - [c18]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513 - 2001
- [j12]Yves Lespérance, Gerd Wagner, William P. Birmingham, Kurt D. Bollacker, Alexander Nareyek, J. Paul Walser, David W. Aha, Timothy W. Finin, Benjamin N. Grosof, Nathalie Japkowicz, Robert Holte, Lise Getoor, Carla P. Gomes, Holger H. Hoos, Alan C. Schultz, Miroslav Kubat, Tom M. Mitchell, Jörg Denzinger, Yolanda Gil, Karen L. Myers, Claudio Bettini, Angelo Montanari:
AAAI 2000 Workshop Reports. AI Mag. 22(1): 127-136 (2001) - [c17]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. SEBD 2001: 339-346 - [c16]Claudio Bettini:
Semantic Compression of Temporal Data. WAIM 2001: 267-278 - 2000
- [b1]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang:
Time granularities in databases, data mining, and temporal reasoning. Springer 2000, ISBN 978-3-540-66997-5, pp. I-XI, 1-230 - [j11]Claudio Bettini, Roberto De Sibi:
Symbolic representation of user-defined time granularities. Ann. Math. Artif. Intell. 30(1-4): 53-92 (2000) - [c15]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Free Schedules for Free Agents in Workflow Systems. TIME 2000: 31-37 - [i5]Claudio Bettini:
Review - Time Constraints in Workflow Systems. ACM SIGMOD Digit. Rev. 2 (2000) - [i4]Claudio Bettini:
Review - Temporal Entity-Relationship Models - A Survey. ACM SIGMOD Digit. Rev. 2 (2000) - [i3]Claudio Bettini:
Review - On Modeling and Verification of Temporal Constraints in Production Workflows. ACM SIGMOD Digit. Rev. 2 (2000) - [i2]Claudio Bettini:
Review - Temporal Logic in Information Systems. ACM SIGMOD Digit. Rev. 2 (2000)
1990 – 1999
- 1999
- [c14]Claudio Bettini, Roberto De Sibi:
Symbolic Representation of User-Defined Time Granularities. TIME 1999: 17-28 - [i1]Claudio Bettini:
Review - Temporal Entity-Relationship Models - A Survey. ACM SIGMOD Digit. Rev. 1 (1999) - 1998
- [j10]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A General Framework for Time Granularity and Its Application to Temporal Reasoning. Ann. Math. Artif. Intell. 22(1-2): 29-58 (1998) - [j9]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Mining Temporal Relationships with Multiple Granularities in Time Sequences. IEEE Data Eng. Bull. 21(1): 32-38 (1998) - [j8]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin:
Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. IEEE Trans. Knowl. Data Eng. 10(2): 222-237 (1998) - [j7]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Temporal Semantic Assumptions and Their Use in Databases. IEEE Trans. Knowl. Data Eng. 10(2): 277-296 (1998) - [j6]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Trans. Database Syst. 23(3): 231-285 (1998) - 1997
- [j5]Claudio Bettini:
Time-Dependent Concepts: Representation and Reasoning Using Temporal Description Logics. Data Knowl. Eng. 22(1): 1-38 (1997) - [j4]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
Decentralized Administration for a Temporal Access Control Model. Inf. Syst. 22(4): 223-248 (1997) - [j3]Xiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia:
Logical Design for Temporal Databases with Multiple Granularities. ACM Trans. Database Syst. 22(2): 115-170 (1997) - [c13]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. CP 1997: 435-449 - [c12]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
An Architecture for Supporting Interoperability among Temporal Databases. Temporal Databases, Dagstuhl 1997: 36-55 - [c11]Claudio Bettini, Curtis E. Dyreson, William S. Evans, Richard T. Snodgrass, Xiaoyang Sean Wang:
A Glossary of Time Granularity Concepts. Temporal Databases, Dagstuhl 1997: 406-413 - 1996
- [j2]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
A Temporal Access Control Mechanism for Database Systems. IEEE Trans. Knowl. Data Eng. 8(1): 67-80 (1996) - [c10]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. PODS 1996: 68-78 - [c9]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
A decentralized temporal autoritzation model. SEC 1996: 271-280 - [c8]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A General Framework and Reasoning Model for Time Granularity. TIME 1996: 104-111 - [c7]Elena Ferrari, Elisa Bertino, Claudio Bettini, Alberto Motta, Pierangela Samarati:
On Using Materialization Strategies for a Temporal Authorization Model. VIEWS 1996: 34-42 - [c6]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. VLDB 1996: 472-483 - 1995
- [c5]Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia:
Semantic Assumptions and Query Evaluation in Temporal Databases. SIGMOD Conference 1995: 257-268 - 1994
- [c4]Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A Temporal Authorization Model. CCS 1994: 126-135 - [c3]Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A discretionary access control model with temporal authorizations. NSPW 1994: 102-107 - 1993
- [c2]Claudio Bettini:
A Family of Temporal Terminological Logics. AI*IA 1993: 120-131 - 1992
- [j1]Claudio Bettini, Luca Spampinato:
The connection machine opportunity for the implementation of a concurrent functional language. Future Gener. Comput. Syst. 7(2-3): 231-245 (1992) - [c1]Claudio Bettini:
A Formalization of Interval-Based Temporal Subsumption in First Order Logic. ECAI Workshop on Knowledge Representation and Reasoning 1992: 53-73
Coauthor Index
aka: X. Sean Wang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint