Search Results - "DellAmico, Matteo"

Refine Results
  1. 1

    PSBS: Practical Size-Based Scheduling by DellAmico, Matteo, Carra, Damiano, Michiardi, Pietro

    Published in IEEE transactions on computers (01-07-2016)
    “…Size-based schedulers have very desirable performance properties: optimal or near-optimal response time can be coupled with strong fairness. Despite this,…”
    Get full text
    Journal Article
  2. 2

    HFSP: Bringing Size-Based Scheduling To Hadoop by Pastorelli, Mario, Carra, Damiano, DellAmico, Matteo, Michiardi, Pietro

    Published in IEEE transactions on cloud computing (01-01-2017)
    “…Size-based scheduling with aging has been recognized as an effective approach to guarantee fairness and near-optimal system response times. We present HFSP, a…”
    Get full text
    Journal Article
  3. 3

    Unsupervised Detection and Clustering of Malicious TLS Flows by Gomez, Gibran, Kotzias, Platon, Dell’Amico, Matteo, Bilge, Leyla, Caballero, Juan

    Published in Security and communication networks (12-01-2023)
    “…Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious…”
    Get full text
    Journal Article
  4. 4

    Adaptive redundancy management for durable P2P backup by Dell’Amico, Matteo, Michiardi, Pietro, Toka, Laszlo, Cataldi, Pasquale

    “…We design and analyze the performance of a redundancy management mechanism for peer-to-peer backup applications. Armed with the realization that a backup…”
    Get full text
    Journal Article
  5. 5

    MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations by Camurati, Giovanni, Dell’Amico, Matteo, Standaert, François-Xavier

    “…Key rank estimation provides a measure of the effort that the attacker has to spend bruteforcing the key of a cryptographic algorithm, after having gained some…”
    Get full text
    Journal Article
  6. 6

    OS-Assisted Task Preemption for Hadoop by Pastorelli, Mario, Dell'Amico, Matteo, Michiardi, Pietro

    “…This work introduces a new task preemption primitive for Hadoop, that allows tasks to be suspended and resumed exploiting existing memory management mechanisms…”
    Get full text
    Conference Proceeding
  7. 7

    The Supermarket Model With Known and Predicted Service Times by Mitzenmacher, Michael, DellaAmico, Matteo

    “…The supermarket model refers to a system with a large number of queues, where new customers choose <inline-formula><tex-math notation="LaTeX">d</tex-math>…”
    Get full text
    Journal Article
  8. 8

    Password Strength: An Empirical Analysis by Dell'Amico, Matteo, Michiardi, Pietro, Roudier, Yves

    Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)
    “…It is a well known fact that user-chosen passwords are somewhat predictable: by using tools such as dictionaries or probabilistic models, attackers and…”
    Get full text
    Conference Proceeding
  9. 9

    Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships by Sanchez-Rola, Iskander, Dell'Amico, Matteo, Balzarotti, Davide, Vervier, Pierre-Antoine, Bilge, Leyla

    “…Web pages have been steadily increasing in complexity over time, including code snippets from several distinct origins and organizations. While this may be a…”
    Get full text
    Conference Proceeding
  10. 10

    On User Availability Prediction and Network Applications by Dell'Amico, Matteo, Filippone, Maurizio, Michiardi, Pietro, Roudier, Yves

    Published in IEEE/ACM transactions on networking (01-08-2015)
    “…User connectivity patterns in network applications are known to be heterogeneous and to follow periodic (daily and weekly) patterns. In many cases, the…”
    Get full text
    Journal Article
  11. 11

    Neighbourhood maps: decentralized ranking in small-world P2P networks by Dell'Amico, Matteo

    Published in Concurrency and computation (25-04-2008)
    “…Reputation in P2P networks is an important tool to encourage cooperation among peers. It is based on ranking of peers according to their past behaviour. In…”
    Get full text
    Journal Article
  12. 12

    Revisiting Size-Based Scheduling with Estimated Job Sizes by Dell'Amico, Matteo, Carra, Damiano, Pastorelli, Mario, Michiardi, Pietro

    “…We study size-based schedulers, and focus on the impact of inaccurate job size information on response time and fairness. Our intent is to revisit previous…”
    Get full text
    Conference Proceeding
  13. 13

    FISHDBC: Flexible, Incremental, Scalable, Hierarchical Density-Based Clustering for Arbitrary Data and Distance by Dell'Amico, Matteo

    Published 16-10-2019
    “…FISHDBC is a flexible, incremental, scalable, and hierarchical density-based clustering algorithm. It is flexible because it empowers users to work on…”
    Get full text
    Journal Article
  14. 14

    Scheduling With Inexact Job Sizes: The Merits of Shortest Processing Time First by Dell'Amico, Matteo

    Published 10-07-2019
    “…It is well known that size-based scheduling policies, which take into account job size (i.e., the time it takes to run them), can perform very desirably in…”
    Get full text
    Journal Article
  15. 15

    Scalable and flexible clustering solutions for mobile phone-based population indicators by Lulli, Alessandro, Gabrielli, Lorenzo, Dazzi, Patrizio, Dell’Amico, Matteo, Michiardi, Pietro, Nanni, Mirco, Ricci, Laura

    “…Mobile phones have an unprecedented rate of penetration across the world. Such devices produce a large amount of data that have been used on different domains…”
    Get full text
    Journal Article
  16. 16

    The Supermarket Model with Known and Predicted Service Times by Mitzenmacher, Michael, Dell'Amico, Matteo

    Published 17-02-2022
    “…The supermarket model refers to a system with a large number of queues, where new customers choose d queues at random and join the one with the fewest…”
    Get full text
    Journal Article
  17. 17

    SBOM Generation Tools in the Python Ecosystem: an In-Detail Analysis by Cofano, Serena, Benedetti, Giacomo, Dell'Amico, Matteo

    Published 02-09-2024
    “…Software Bills of Material (SBOMs), which improve transparency by listing the components constituting software, are a key countermeasure to the mounting…”
    Get full text
    Journal Article
  18. 18

    Improving population estimation from mobile calls: A clustering approach by Lulli, Alessandro, Gabrielli, Lorenzo, Dazzi, Patrizio, Dell'Amico, Matteo, Michiardi, Pietro, Nanni, Mirco, Ricci, Laura

    “…Statistical authorities promote and safeguard the production and publication of official statistics that serve the public good. One of their duties is to…”
    Get full text
    Conference Proceeding
  19. 19

    Unsupervised Detection and Clustering of Malicious TLS Flows by Gomez, Gibran, Kotzias, Platon, Dell'Amico, Matteo, Bilge, Leyla, Caballero, Juan

    Published 23-12-2022
    “…Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious…”
    Get full text
    Journal Article
  20. 20

    Sonic: Fast and Transferable Data Poisoning on Clustering Algorithms by Villani, Francesco, Lazzaro, Dario, Cinà, Antonio Emanuele, Dell'Amico, Matteo, Biggio, Battista, Roli, Fabio

    Published 14-08-2024
    “…Data poisoning attacks on clustering algorithms have received limited attention, with existing methods struggling to scale efficiently as dataset sizes and…”
    Get full text
    Journal Article