default search action
Alessio Vecchio
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Chiara Caiazza, Valerio Luconi, Alessio Vecchio:
Energy consumption of smartphones and IoT devices when using different versions of the HTTP protocol. Pervasive Mob. Comput. 97: 101871 (2024) - [c49]Giovanni Cisternini, Filippo Lucchesi, Valerio Luconi, Alessio Vecchio:
A Domain Specific Language for Internet Measurements. MedComNet 2024: 1-4 - [i8]Federico Cristofani, Valerio Luconi, Alessio Vecchio:
Age of Information and Energy Consumption in IoT: an Experimental Evaluation. CoRR abs/2405.05849 (2024) - 2023
- [j27]Valerio Luconi, Alessio Vecchio:
Impact of the first months of war on routing and latency in Ukraine. Comput. Networks 224: 109596 (2023) - [j26]Chiara Caiazza, Valerio Luconi, Alessio Vecchio:
Measuring the Energy of Smartphone Communications in the Edge-Cloud Continuum: Approaches, Challenges, and a Case Study. IEEE Internet Comput. 27(6): 29-35 (2023) - [i7]Chiara Caiazza, Claudio Cicconetti, Valerio Luconi, Alessio Vecchio:
Measurement-Driven Design and Runtime Optimization in Edge Computing: Methodology and Tools. CoRR abs/2307.08115 (2023) - [i6]Massimo Candela, Valerio Luconi, Alessio Vecchio:
A worldwide study on the geographic locality of Internet routes. CoRR abs/2307.08120 (2023) - 2022
- [j25]Chiara Caiazza, Silvia Giordano, Valerio Luconi, Alessio Vecchio:
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes. Comput. Commun. 194: 213-225 (2022) - [c48]Giuseppe Cancello Tortora, Mirko Casini, Andrea Lagna, Martina Marino, Alessio Vecchio:
Detection of Distracted Driving: A Smartphone-Based Approach. INTSYS 2022: 157-165 - [c47]Alessio Vecchio, Raffaele Nocerino, Guglielmo Cola:
Gait-based Authentication: Evaluation of Energy Consumption on Commercial Devices. PerCom Workshops 2022: 793-798 - [c46]Chiara Caiazza, Valerio Luconi, Alessio Vecchio:
Saving energy on smartphones through edge computing: an experimental evaluation. NET4us@SIGCOMM 2022: 20-25 - [i5]Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi, Nilo Redini, Alessio Vecchio:
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks. CoRR abs/2206.00378 (2022) - [i4]Valerio Luconi, Alessio Vecchio:
Impact of the First Months of War on Routing and Latency in Ukraine. CoRR abs/2208.09202 (2022) - 2021
- [j24]Chiara Caiazza, Claudio Cicconetti, Valerio Luconi, Alessio Vecchio:
Measurement-driven design and runtime optimization in edge computing: Methodology and tools. Comput. Networks 194: 108140 (2021) - [j23]Massimo Candela, Valerio Luconi, Alessio Vecchio:
A worldwide study on the geographic locality of Internet routes. Comput. Networks 201: 108555 (2021) - [j22]Guglielmo Cola, Alessio Vecchio, Marco Avvenuti:
Continuous authentication through gait analysis on a wrist-worn device. Pervasive Mob. Comput. 78: 101483 (2021) - [c45]Zaccaria Essaid, Dario Lorenzoni, Niccolò Scatena, Riccardo Xefraj, Alessio Vecchio:
Adaptive Distance Sensing in Contact Tracing Applications Through Indoor/Outdoor Detection. MobiHealth 2021: 157-165 - [i3]Gloria Ciavarrini, Valerio Luconi, Alessio Vecchio:
Smartphone-based geolocation of Internet hosts. CoRR abs/2109.11289 (2021) - [i2]Chiara Caiazza, Silvia Giordano, Valerio Luconi, Alessio Vecchio:
Edge Computing vs Centralized Cloud: Impact of Communication Latency on the Energy Consumption of LTE Terminal Nodes. CoRR abs/2111.10076 (2021) - 2020
- [j21]Massimo Candela, Valerio Luconi, Alessio Vecchio:
Impact of the COVID-19 pandemic on the Internet latency: A large-scale study. Comput. Networks 182: 107495 (2020) - [j20]Chiara Caiazza, Valerio Luconi, Alessio Vecchio:
TCP-based traceroute: An evaluation of different probing methods. Internet Technol. Lett. 3(1) (2020) - [c44]Chiara Caiazza, Leonardo Bernardi, Marco Bevilacqua, Alessandro Cabras, Claudio Cicconetti, Valerio Luconi, Gabriele Sciurti, Elisabetta Senore, Emilio Vallati, Alessio Vecchio:
MECPerf: An Application-Level Tool for Estimating the Network Performance in Edge Computing Environments. COMPSAC 2020: 1163-1168 - [c43]Chiara Bonsignori, Fabio Condomitti, Marco Del Gamba, Federico Garzelli, Leonardo Lossi, Francesco Mione, Alessandro Noferi, Alessio Vecchio:
Estimation of User's Orientation via Wearable UWB. Intelligent Environments 2020: 80-83 - [i1]Massimo Candela, Valerio Luconi, Alessio Vecchio:
Impact of the COVID-19 pandemic on the Internet latency: a large-scale study. CoRR abs/2005.06127 (2020)
2010 – 2019
- 2019
- [j19]Massimo Candela, Enrico Gregori, Valerio Luconi, Alessio Vecchio:
Using RIPE Atlas for Geolocating IP Infrastructure. IEEE Access 7: 48816-48829 (2019) - [j18]Enrico Gregori, Valerio Luconi, Alessio Vecchio:
Net neutrality in mobile broadband: A European study based on a large scale testbed. Internet Technol. Lett. 2(5) (2019) - [c42]Luca Brombin, Margherita Gambini, Pietro Gronchi, Roberto Magherini, Lorenzo Nannini, Amedeo Pochiero, Alessandro Sieni, Alessio Vecchio:
User's Authentication Using Information Collected by Smart-Shoes. BODYNETS 2019: 266-277 - [c41]Massimo Candela, Enrico Gregori, Valerio Luconi, Alessio Vecchio:
Dissecting the Speed-of-Internet of Middle East. INFOCOM Workshops 2019: 720-725 - [c40]Alessio Vecchio, Giada Anastasi, Davide Coccomini, Stefano Guazzelli, Sara Lotano, Giuliano Zara:
Labeling of Activity Recognition Datasets: Detection of Misbehaving Users. MobiHealth 2019: 320-331 - [c39]Adriano Arra, Alessio Bianchini, Joana Chavez, Pietro Ciravolo, Fatjon Nebiu, Martina Olivelli, Gabriele Scoma, Simone Tavoletta, Matteo Zagaglia, Alessio Vecchio:
Personalized Gait-based Authentication Using UWB Wearable Devices. UMAP 2019: 206-210 - [c38]Chiara Caiazza, Enrico Gregori, Valerio Luconi, Francesco Mione, Alessio Vecchio:
Application-Level Traceroute: Adopting Mimetic Mechanisms to Increase Discovery Capabilities. WWIC 2019: 66-77 - 2018
- [j17]Gloria Ciavarrini, Maria S. Greco, Alessio Vecchio:
Geolocation of Internet hosts: Accuracy limits through Cramér-Rao lower bound. Comput. Networks 135: 70-80 (2018) - [j16]Guglielmo Cola, Alessio Vecchio:
Wearable systems for e-health and wellbeing. Pers. Ubiquitous Comput. 22(2): 225 (2018) - [c37]Andrea Aliperti, José Corcuera, Chiara Fruzzetti, Gianluca Marchini, Francesco Miliani, Simone Musetti, Andrea Primaverili, Riccardo Rocchi, Davide Ruisi, Alessio Vecchio:
Using an Indoor Localization System for Activity Recognition. BODYNETS 2018: 233-243 - [c36]Enrico Gregori, Valerio Luconi, Alessio Vecchio:
NeutMon: Studying neutrality in European mobile networks. INFOCOM Workshops 2018: 523-528 - 2017
- [j15]Guglielmo Cola, Marco Avvenuti, Alessio Vecchio:
Real-Time Identification Using Gait Pattern Analysis on a Standalone Wearable Accelerometer. Comput. J. 60(8): 1173-1186 (2017) - [j14]Gloria Ciavarrini, Valerio Luconi, Alessio Vecchio:
Smartphone-based geolocation of Internet hosts. Comput. Networks 116: 22-32 (2017) - [c35]Guglielmo Cola, Marco Avvenuti, Fabio Musso, Alessio Vecchio:
Personalized gait detection using a wrist-worn accelerometer. BSN 2017: 173-177 - 2016
- [j13]Marco Avvenuti, Cinzia Bernardeschi, Luca Cassano, Alessio Vecchio:
Adapting the Duty Cycle to Traffic Load in a Preamble Sampling MAC for WSNs: Formal Specification and Performance Evaluation. Ad Hoc Sens. Wirel. Networks 31(1-4): 101-129 (2016) - [j12]Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi, Nilo Redini, Alessio Vecchio:
Smartphone-based crowdsourcing for estimating the bottleneck capacity in wireless networks. J. Netw. Comput. Appl. 64: 62-75 (2016) - [c34]Alessio Vecchio, Guglielmo Cola:
Fall detection using ultra-wideband positioning. IEEE SENSORS 2016: 1-3 - [c33]Guglielmo Cola, Marco Avvenuti, Pierpaolo Piazza, Alessio Vecchio:
Fall Detection Using a Head-Worn Barometer. MobiHealth 2016: 217-224 - [c32]Guglielmo Cola, Marco Avvenuti, Fabio Musso, Alessio Vecchio:
Gait-based authentication using a wrist-worn device. MobiQuitous 2016: 208-217 - 2015
- [c31]Guglielmo Cola, Marco Avvenuti, Alessio Vecchio, Guang-Zhong Yang, Benny Lo:
An unsupervised approach for gait-based authentication. BSN 2015: 1-6 - [c30]Massimiliano Donati, Luca Fanucci, Fabrizio Iacopetti, Alessio Vecchio:
A modular suite to support human-smartphone interaction for people with motor skill impairments. DTIS 2015: 1-5 - [c29]Gloria Ciavarrini, Francesco Disperati, Luciano Lenzini, Valerio Luconi, Alessio Vecchio:
Geolocation of Internet Hosts Using Smartphones and Crowdsourcing. WMNC 2015: 176-183 - [c28]Gloria Ciavarrini, Francesco Marcelloni, Alessio Vecchio:
Improving Wi-Fi Based Localization Using External Constraints. NGMAST 2015: 126-131 - 2014
- [j11]Adriano Faggiani, Enrico Gregori, Luciano Lenzini, Valerio Luconi, Alessio Vecchio:
Smartphone-based crowdsourcing for network monitoring: Opportunities, challenges, and a case study. IEEE Commun. Mag. 52(1): 106-113 (2014) - [j10]Francesco Marcelloni, Daniele Puccinelli, Alessio Vecchio:
Special issue on sensing and mobility in pervasive computing. J. Ambient Intell. Humaniz. Comput. 5(3): 263-264 (2014) - [j9]Guglielmo Cola, Alessio Vecchio, Marco Avvenuti:
Improving the performance of fall detection systems through walk recognition. J. Ambient Intell. Humaniz. Comput. 5(6): 843-855 (2014) - [c27]Gloria Ciavarrini, Valerio Luconi, Luciano Lenzini, Alessio Vecchio:
Supporting the Development of Network-Aware Reactive Applications on Smartphones. NGMAST 2014: 24-30 - 2013
- [c26]Salvatore Distefano, Giovanni Merlino, Antonio Puliafito, Alessio Vecchio:
A hypervisor for infrastructure-enabled sensing Clouds. ICC Workshops 2013: 1362-1366 - [c25]Enrico Gregori, Luciano Lenzini, Valerio Luconi, Alessio Vecchio:
Sensing the Internet through crowdsourcing. PerCom Workshops 2013: 248-254 - [c24]Adriano Faggiani, Enrico Gregori, Luciano Lenzini, Valerio Luconi, Alessio Vecchio:
Lessons learned from the design, implementation, and management of a smartphone-based crowdsourcing system. SENSEMINE@SenSys 2013: 2:1-2:6 - [c23]Adriano Faggiani, Enrico Gregori, Luciano Lenzini, Valerio Luconi, Alessio Vecchio:
Network sensing through smartphone-based crowdsourcing. SenSys 2013: 31:1-31:2 - 2012
- [j8]Marco Pellegrini, Maria Elena Renda, Alessio Vecchio:
Ab initio detection of fuzzy amino acid tandem repeats in protein sequences. BMC Bioinform. 13(S-3): S8 (2012) - [j7]Marco Pellegrini, Maria Elena Renda, Alessio Vecchio:
Tandem repeats discovery service (TReaDS) applied to finding novel cis-acting factors in repeat expansion diseases. BMC Bioinform. 13(S-4): S3 (2012) - [j6]Stefano Abbate, Marco Avvenuti, Francesco Bonatesta, Guglielmo Cola, Paolo Corsini, Alessio Vecchio:
A smartphone-based fall detection system. Pervasive Mob. Comput. 8(6): 883-899 (2012) - [j5]Stefano Abbate, Marco Avvenuti, Paolo Corsini, Barbara Panicucci, Mauro Passacantando, Alessio Vecchio:
An Integer Linear Programming Approach for Radio-Based Localization of Shipping Containers in the Presence of Incomplete Proximity Information. IEEE Trans. Intell. Transp. Syst. 13(3): 1404-1419 (2012) - [c22]Adriano Faggiani, Enrico Gregori, Luciano Lenzini, Simone Mainardi, Alessio Vecchio:
On the feasibility of measuring the internet through smartphone-based crowdsourcing. WiOpt 2012: 318-323 - [c21]Stefano Abbate, Marco Avvenuti, Daniel Cesarini, Alessio Vecchio:
Estimation of Energy Consumption for TinyOS 2.x-Based Applications. ANT/MobiWIS 2012: 1166-1171 - 2011
- [c20]Marco Pellegrini, M. Elena Renda, Alessio Vecchio:
Detecting fuzzy amino acid tandem repeats in protein sequences. BCB 2011: 87-95 - [c19]Stefano Abbate, Marco Avvenuti, Guglielmo Cola, Paolo Corsini, Janet Light, Alessio Vecchio:
Recognition of false alarms in fall detection systems. CCNC 2011: 23-28 - [c18]Stefano Abbate, Marco Avvenuti, Alessandro Biondi, Alessio Vecchio:
Estimation of energy consumption in wireless sensor networks using TinyOS 2.x. CCNC 2011: 842-843 - [c17]Antonio Cuomo, Giuseppe Di Modica, Salvatore Distefano, Massimiliano Rak, Alessio Vecchio:
The Cloud@Home Architecture - Building a Cloud Infrastructure from Volunteered Resources. CLOSER 2011: 424-430 - 2010
- [j4]Marco Pellegrini, M. Elena Renda, Alessio Vecchio:
TRStalker: an efficient heuristic for finding fuzzy tandem repeats. Bioinform. 26(12): 358-366 (2010) - [c16]Rocco Aversa, Marco Avvenuti, Antonio Cuomo, Beniamino Di Martino, Giuseppe Di Modica, Salvatore Distefano, Antonio Puliafito, Massimiliano Rak, Orazio Tomarchio, Alessio Vecchio, Salvatore Venticinque, Umberto Villano:
The Cloud@Home Project: Towards a New Enhanced Computing Paradigm. Euro-Par Workshops 2010: 555-562
2000 – 2009
- 2009
- [c15]Stefano Abbate, Marco Avvenuti, Paolo Corsini, Alessio Vecchio:
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks. CSE (2) 2009: 587-592 - [c14]Marco Avvenuti, Alessio Vecchio:
Mobile visual access to legacy voice-based applications. Mobility Conference 2009 - 2008
- [c13]Alessio Vecchio:
Adaptability in wireless sensor networks. ICECS 2008: 1261-1264 - [c12]Marco Avvenuti, Alessio Vecchio:
Adaptability in the B-MAC+ Protocol. ISPA 2008: 946-951 - 2007
- [j3]Marco Avvenuti, Paolo Corsini, Paolo Masci, Alessio Vecchio:
An application adaptation layer for wireless sensor networks. Pervasive Mob. Comput. 3(4): 413-438 (2007) - [c11]Marco Avvenuti, Paolo Corsini, Paolo Masci, Alessio Vecchio:
Opportunistic computing for wireless sensor networks. MASS 2007: 1-6 - 2006
- [j2]Marco Avvenuti, Alessio Vecchio:
Application-level network emulation: the EmuSocket toolkit. J. Netw. Comput. Appl. 29(4): 343-360 (2006) - [c10]Paolo Corsini, Paolo Masci, Alessio Vecchio:
VirtuS: a configurable layer for post-deployment adaptation of sensor network. ICWMC 2006: 8 - [c9]Marco Avvenuti, Alessio Vecchio:
On-demand Loading of Pervasive-oriented Applications Using Mass-market Camera Phones. IWUC 2006: 39-48 - [c8]Paolo Corsini, Paolo Masci, Alessio Vecchio:
Configuration and tuning of sensor network applications through virtual sensors. PerCom Workshops 2006: 316-320 - [c7]Paolo Corsini, Paolo Masci, Alessio Vecchio:
Experiences with the TinyOS Communication Library. Wireless Information Systems 2006: 47-55 - 2005
- [j1]Marco Avvenuti, Alessio Vecchio:
MobileRMI: upgrading Java Remote Method Invocation towards mobility. Softw. Pract. Exp. 35(10): 939-975 (2005) - [c6]Marco Avvenuti, Alessio Vecchio, Giovanni Turi:
A Cross-Layer Approach for Publish/Subscribe in Mobile Ad Hoc Networks. MATA 2005: 203-214 - 2003
- [c5]Marco Avvenuti, Davide Pedroni, Alessio Vecchio:
Core Services in a Middleware for Mobile Ad-Hoc Networks. FTDCS 2003: 152-158 - 2002
- [c4]Marco Avvenuti, Alessio Vecchio:
Internet Emulation for Java Applications through Socket Factories. COMPSAC 2002: 111-116 - 2001
- [c3]Marco Avvenuti, Alessio Vecchio:
Embedding Remote Object Mobility in Java RMI . FTDCS 2001: 98-104 - [c2]Marco Avvenuti, Alessio Vecchio:
Supporting Remote Reference Updating Through Garbage Collection in a Mobile Object System. PDP 2001: 65-70
1990 – 1999
- 1999
- [c1]Marco Avvenuti, Alessio Vecchio:
An Agent-Based Framework for Nomadic Computing. FTDCS 1999: 213-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint