Il volume introdotto da un lungo saggio è la trascrizione del memoriale di Cesare Gamba conservato al Centro di Servizio Bibliotecario di Architettura "Nino Carboneri" della Facoltà di Architettura dell'Università degli Studi di Genova.
Gamba fu un abile ingegnere, un sensibile architetto ed uno degli ultimi seguaci della scuola classica. Il suo nome è oggi legato alla sua opera maggiore che fu la progettazione e la costruzione di via XX Settembre a Genova. Personaggio polivalente, Gamba fu anche un industriale, un impresario teatrale e molto altro. Durante la sua vita conobbe e frequentò figure storiche di grande rilievo, nel memoriale sono riportati i suoi ricordi degli incontri che ebbe con Garibaldi, Verdi, Puccini, Sarah Bernhardt e tanti altri. Il volume può essere letto come un romanzo storico o un intimo diario biografico, in entrambi i casi la lettura scorre piacevole ed avvincente.
Cesare Gamba
Genova
Giuseppe Garibaldi
Giuseppe Verdi
Grande Guerra
Fascismo
The exploration and analysis of Web graphs has flourished in the recent past, producing a large number of relevant and interesting research results. However, the unique characteristics of the Tor network limit the applicability of standard techniques and demand for specific algorithms to explore and analyze it. The attention of the research community has focused on assessing the security of the Tor infrastructure (i.e., its ability to actually provide the intended level of anonymity) and on discussing what Tor is currently being used for. Since there are no foolproof techniques for automatically discovering Tor hidden services, little or no information is available about the topology of the Tor Web graph. Even less is known on the relationship between content similarity and topological structure. The present article aims at addressing such lack of information. Among its contributions: A study on automatic Tor Web exploration/data collection approaches; the adoption of novel representative metrics for evaluating Tor data; a novel in-depth analysis of the hidden services graph; a rich correlation analysis of hidden services' semantics and topology. Finally, a broad interesting set of novel insights/considerations over the TorWeb organization and content are provided.
Automatic web exploration
Correlation analysis
Network topology
Web graphs
With black-box access to the cipher being its unique requirement, Dinur and Shamir's cube attack is a flexible cryptanalysis technique which can be applied to virtually any cipher. However, gaining a precise understanding of the characteristics that make a cipher vulnerable to the attack is still an open problem, and no implementation of the cube attack so far succeeded in breaking a real-world strong cipher. In this paper, we present a complete implementation of the cube attack on a GPU/CPU cluster able to improve state-of-the-art results against the Trivium cipher. In particular, our attack allows full key recovery up to 781 initialization rounds without brute-force, and yields the first ever maxterm after 800 initialization rounds. The proposed attack leverages a careful tuning of the available resources, based on an accurate analysis of the offline phase, that has been tailored to the characteristics of GPU computing. We discuss all design choices, detailing their respective advantages and drawbacks. Other than providing remarkable results, this paper shows how the cube attack can significantly benefit from accelerators like GPUs, paving the way for future work in the area.
2017Contributo in Atti di convegnometadata only access
CoLLIDE: CLoud Latency-based IDEntification
Daza Vanesa
;
Pietro Roberto Di
;
Lombardi Flavio
;
Signorini Matteo
As services steadily migrate to the Cloud, the availability of an overarching identity framework has become a stringent need. Moreover, such an identity framework is now critical in the Internet of Things. To address this problem, identification solutions have been proposed in the past leveraging software or hardware properties of devices. While those solutions proved feasible, their root of trust was based either within the device or in a remote server. In this paper, we overcome the above paradigm and star investigating novel perspectives offered by an overarching identity framework that is not based on client/server properties, but on the network latency of their communications. The core idea behind our approach is to leverage cloud client/server interactions' latency patterns over the network to derive unique and unpredictable identity factors. Such factors can be used to design and implement effective identification schemes especially suitable for cloud-based services. To the best of our knowledge, our approach is the first one ensuring unclonability and unpredictability properties, relying on neither trusted computing bases (TCBs) nor on classical pseudo-random number generators (PRNGs). The experimental tests presented in this paper, conducted on worst case conditions, show that the network latency (generated between two interacting devices) can produce random values with properties close to the ones generated by most of the well-known PRNGs, that are an ideal fit for providing unique identifiers. Peer-review under responsibility of the Conference Program Chairs.
2017Contributo in Atti di convegnometadata only access
HyBIS: Advanced introspection for effective windows guest protection
Di Pietro Roberto
;
Di Pietro Roberto
;
Franzoni Federico
;
Lombardi Flavio
Effectively protecting the WindowsTM OS is a challenging task, since most implementation details are not publicly known. Windows OS has always been the main target of malware that have exploited numerous bugs and vulnerabilities exposed by its implementations. Recent trusted boot and additional integrity checks have rendered the Windows OS less vulnerable to kernel-level rootkits. Nevertheless, guest Windows Virtual Machines are becoming an increasingly interesting attack target. In this work we introduce and analyze a novel Hypervisor-Based Introspection System (HyBIS) we developed for protecting Windows OSes from malware and rootkits. The HyBIS architecture is motivated and detailed, while targeted experimental results show its effectiveness. Comparison with related work highlights main HyBIS advantages such as: effective semantic introspection, support for 64-bit architectures and for recent Windows versions ( >=>= win 7), and advanced malware disabling capabilities. We believe the research effort reported here will pave the way to further advances in the security of WindowsTM OSes.
A chemo-mechano-biological formulation for the effects of biomechemical alterations on arterial mechanics: the role of molecular transport and multiscale tissue remodelling
This paper presents a chemo-mechano-biological framework for arterialphysiopathology. The model accounts for the fine remodelling in the multi-scale hierarchical arrangement of tissue constituents and for the diffusion of molecular species involved in cell-cell signalling pathways. Effects in terms of alterations in arterial compliance are obtained. A simple instructive example is introduced. Although oversimplified with respect to realistic case studies, the proposed application mimics the biochemical activity of matrix metallo- proteinases, transforming growth factors beta and interleukins on tissue remodelling. Effects of macrophage infiltration, of intimal thickening and of a healing phase are investigated, highlighting the corresponding influence on arterial compliance. The obtained results show that the present approach is able to capture changes in arterial mechanics as a consequence of the alterations in tissue biochemical environment and cellular activity, as well as to incorporate the protective role of both autoimmune responses and pharmacological treatments.
arterial multiphysics
multiscale constitutive modelling
microscale transport mechanisms
tissue remodelling
This paper is focused on the comparison of results obtained by the resolution of the capacitated vehicle routing problem. A modied algorithm of classical articial bee colony (ABC) is described and implemented in this article, in particular, a new type of neighborhood operator is introduced. e idea on the base of ABC is creating an algorithm of Swarm - Intelligence which mimics the behavior of a honey bee swarm. e performance of the proposed metaheuristic is evaluated on two sets of standard benchmark instances and is compared with the well-known results obtained by savings algorithm of Clarke and Wright and with those calculated using ABC-enhanced by Szeto et al. e computational results show that the proposed ABC outperforms the Saving algorithm and that it can produce good solutions when compared with the ABC-enhanced.
Metaheuristics
Capacitated Vehicle Routing Problem
Articial Bee Colony.
The emergencies management in industrial plants is an issue widely discussed in the literature and in the European legislative framework. Despite the large interest shown by the dierent actors involved in emergencies management, neither scientic nor in industrial eld, have developed intelligent tools to support the decisions in these particular contexts. iswork, realized inside an Italian nanced project (DIEM-SSP), faces the problem to evacuate the greater number of persons from a risky area and transfer them in a unique destination outside from this area using the available and limited resources. Supposing that these persons have problem of mobility, the problem to solve becomes this: collect the highest number of persons from several origins and bring them into a unique destination or multiple destination using a limited number of capacitated vehicles respecting a time limit. is problem has been modelled as a Multi origins Capacitated Team Orienteering Problem (Mo-CTOP) and solved implementing Optimization algorithm. At the same time the potentiality of multi-destination are explored in order to analyse the benets in a real application. So that a rst design a solution approach for a Multi origins and Multi destination Capacitated Team Orienteering Problem (Mo-Md-CTOP) is given. e team characteristic of the problem is due to need of simultaneous optimization of multi recovery vehicles. Results and tests are given on simple instances in order to validate the proposed model. Future research could explore the opportunities oered by this tool if implemented in smartphone and tablet application. In this case in fact, the computational time could represent an important constraint to considerer in the algorithms design. Heuristics and metaheuristics approaches could be explored to give sub-optimal solutions to the problem in short time of computation. In this way the designed algorithm could be used also in real time situation in mobile applications available for rescue teams.
Emergency Logistics
Team Orienteering Problem
Metaheuristics
The present investigation focuses on the effects of the stern appendages and the propulsion system on
the hydro-loads generated by the propeller during off-design conditions, with particular emphasis on the
in-plane components. Recent experimental investigations carried out by free running model tests [7,8]
and CFD analysis [5] for a modern twin screw model, highlighted that maneuvers at small drift angles and
yaw rates might be as critical as the tighter ones due to complex propeller-wake interactions. Therefore,
design criteria should take into account also these operative conditions, in order to reduce the effects of
propeller-wake interaction phenomena that degrade the overall propulsive efficiency, induce shaft/hull
structural vibration and increase noise emission. In the present study we analyze the effects of geometric
and propulsive modifications with respect to the twin screw configuration studied in [5]. In particular,
the effect of the centreline skeg, propeller direction of rotation and control strategies of the propulsion
plant on the propeller bearing loads have been investigated from the analysis of the nominal wake in
maneuvring conditions, computed by unsteady RANSE simulations coupled with a propeller model based
on Blade Element Theory. The considered test cases were turning circle maneuvers with different rudder
angles at FN = 0.265.
In this paper we propose a method to couple two or more explicit numerical schemes approximating the same time-dependent PDE, aiming at creating a new scheme which inherits advantages of the original ones. We consider both advection equations and nonlinear conservation laws. By coupling a macroscopic (Eulerian) scheme with a microscopic (Lagrangian) scheme, we get a new kind of multiscale numerical method.
3D printers based on the additive manufacturing technology create objects layer-by-layer dropping fused material. As a consequence, strong overhangs cannot be printed because the new-come material does not find a suitable support over the last deposed layer. In these cases, one can add support structures (scaffolds) which make the object printable, to be removed at the end. In this paper, we propose a level set based method to create object-dependent support structures, specifically conceived to reduce both the amount of additional material and the printing time. We also review some open problems about 3D printing which can be of interests for the mathematical community.
Level set method
Hamilton-Jacobi equations
Support structure
Scaffolding
Additive manufacturing
Fused deposition modelling
This paper investigates the problem of quantifying the impact of unex- pected deviations of mortality trend on a longevity indexed life annuity in a Solvency II perspective. Solvency II quantitative requirements regulate the margins required to offset the insurance risk in a one year risk horizon. Indeed, the idea of deepening the expected changes of future mortality rates over a single year is gaining. In the following the authors propose a com- putational tractable approach to assess the technical provisions by means of an internal model, in line with Solvency II directives. The impact of adverse effects of the mortality dynamics is investigated. Mortality is modelled by means of a stochastic CIR type model; an ex post analysis is proposed relying on Italian mortality data.
CIR model
Longevity indexed life annuities
Solvency II
Stochastic mortality models
Techincal provi- sions
A Leaky Integrate-and-Fire (LIF) model with stochastic current-based linkages is considered to describe the firing activity of neurons interacting in a (2. ×. 2)-size feed-forward network. In the subthreshold regime and under the assumption that no more than one spike is exchanged between coupled neurons, the stochastic evolution of the neuronal membrane voltage is subject to random jumps due to interactions in the network. Linked Gauss-Diffusion processes are proposed to describe this dynamics and to provide estimates of the firing probability density of each neuron. To this end, an iterated integral equation-based approach is applied to evaluate numerically the first passage time density of such processes through the firing threshold. Asymptotic approximations of the firing densities of surrounding neurons are used to obtain closed-form expressions for the mean of the involved processes and to simplify the numerical procedure. An extension of the model to an (N ×. N)-size network is also given. Histograms of firing times obtained by simulations of the LIF dynamics and numerical firings estimates are compared.
Stochastic differential equations
Synaptic current-based linkages
Simulation
First passage time
We discuss the problem of partitioning a macroscopic system into a collection of independent subsystems. The partitioning of a system into replica-like subsystems is nowadays a subject of major interest in several fields of theoretical and applied physics. The thermodynamic approach currently favoured by practitioners is based on a phenomenological definition of an interface energy associated with the partition, due to a lack of easily computable expressions for a microscopic (i.e. particle-based) interface energy. In this article, we outline a general approach to derive sharp and computable bounds for the interface free energy in terms of microscopic statistical quantities. We discuss potential applications in nanothermodynamics and outline possible future directions.
general equilibrium models
finite-size scaling
coarse-graining
The time-reversal properties of charged systems in a constant external magnetic field are reconsidered in this paper. We show that the evolution equations of the system are invariant under a new symmetry operation that implies a new signature property for time-correlation functions under time reversal. We then show how these findings can be combined with a previously identified symmetry to determine, for example, null components of the correlation functions of velocities and currents and of the associated transport coefficients. These theoretical predictions are illustrated by molecular dynamics simulations of superionic AgI.
In the first part of this paper we review a mathematical model for the onset and progression of Alzheimer's disease (AD) that was developed in subsequent steps over several years. The model is meant to describe the evolution of AD in vivo. In Achdou et al (2013 J. Math. Biol. 67 1369-92) we treated the problem at a microscopic scale, where the typical length scale is a multiple of the size of the soma of a single neuron. Subsequently, in Bertsch et al (2017 Math. Med. Biol. 34 193-214) we concentrated on the macroscopic scale, where brain neurons are regarded as a continuous medium, structured by their degree of malfunctioning.
In the second part of the paper we consider the relation between the microscopic and the macroscopic models. In particular we show under which assumptions the kinetic transport equation, which in the macroscopic model governs the evolution of the probability measure for the degree of malfunctioning of neurons, can be derived from a particle-based setting.
The models are based on aggregation and diffusion equations for ?-Amyloid (A? from now on), a protein fragment that healthy brains regularly produce and eliminate. In case of dementia A? monomers are no longer properly washed out and begin to coalesce forming eventually plaques. Two different mechanisms are assumed to be relevant for the temporal evolution of the disease: (i) diffusion and agglomeration of soluble polymers of amyloid, produced by damaged neurons; (ii) neuron-to-neuron prion-like transmission.
In the microscopic model we consider mechanism (i), modelling it by a system of Smoluchowski equations for the amyloid concentration (describing the agglomeration phenomenon), with the addition of a diffusion term as well as of a source term on the neuronal membrane. At the macroscopic level instead we model processes (i) and (ii) by a system of Smoluchowski equations for the amyloid concentration, coupled to a kinetic-type transport equation for the distribution function of the degree of malfunctioning of the neurons. The transport equation contains an integral term describing the random onset of the disease as a jump process localized in particularly sensitive areas of the brain
Alzheimer's disease
Smoluchowski's equation
kinetic-type transport equation
In this article we propose a mathematical model for the onset and progression of Alzheimer's disease based on transport and diffusion equations. We regard brain neurons as a continuous medium and structure them by their degree of malfunctioning. Two different mechanisms are assumed to be relevant for the temporal evolution of the disease: i) diffusion and agglomeration of soluble polymers of amyloid, produced by damaged neurons and ii) neuron-to-neuron prion-like transmission. We model these two processes by a system of Smoluchowski equations for the amyloid concentration, coupled to a kinetic-type transport equation for the distribution function of the degree of malfunctioning of neurons. The second equation contains an integral term describing the random onset of the disease as a jump process localized in particularly sensitive areas of the brain. Our numerical simulations are in good qualitative agreement with clinical images of the disease distribution in the brain which vary from early to advanced stages.
Alzheimer's disease
transport and diffusion equations
Smoluchowski equations
numerical simulations
We present a comprehensive study of concentrated emulsions flowing in microfluidic channels, one wall of which is patterned with micron-size equally spaced grooves oriented perpendicularly to the flow direction. We find a scaling law describing the roughness-induced fluidization as a function of the density of the grooves, thus fluidization can be predicted and quantitatively regulated. This suggests common scenarios for droplet trapping and release, potentially applicable for other jammed systems as well. Numerical simulations confirm these views and provide a direct link between fluidization and the spatial distribution of plastic rearrangements.
The Voronoi diagrams are an important tool having theoretical and practical applications in a large number of fields. We present a new procedure, implemented as a set of CUDA kernels, which detects, in a general and efficient way, topological changes in case of dynamic Voronoi diagrams whose generating points move in time. The solution that we provide has been originally developed to identify plastic events during simulations of soft-glassy materials based on a lattice Boltzmann model with frustrated-short range attractive and mid/long-range repulsive-interactions. Along with the description of our approach, we present also some preliminary physics results.