scispace - formally typeset
C

Claudio Bettini

Researcher at University of Milan

Publications -  186
Citations -  7170

Claudio Bettini is an academic researcher from University of Milan. The author has contributed to research in topics: Information privacy & Activity recognition. The author has an hindex of 41, co-authored 171 publications receiving 6837 citations. Previous affiliations of Claudio Bettini include University of Udine & George Mason University.

Papers
More filters
Journal ArticleDOI

A survey of context modelling and reasoning techniques

TL;DR: The requirements that context modelling and reasoning techniques should meet are discussed, including the modelling of a variety ofcontext information types and their relationships, of situations as abstractions of context information facts, of histories of contextInformation, and of uncertainty of context Information.
Book ChapterDOI

Protecting privacy against location-based personal identification

TL;DR: It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi-identifier and may be used to access sensitive information about specific individuals.
Journal ArticleDOI

COSAR: hybrid reasoning for context-aware activity recognition

TL;DR: This paper proposes a solution based on the use of ontologies and ontological reasoning combined with statistical inferencing to recognize complex activities that cannot be derived by statistical methods alone.
Book

Time Granularities in Databases, Data Mining, and Temporal Reasoning

TL;DR: This book deals with several aspects of temporal information and provides a unifying model for granularities and is intended for computer scientists and engineers who are interested in the formal models and technical development of specific issues.
Journal ArticleDOI

An access control model supporting periodicity constraints and temporal reasoning

TL;DR: An access control model in which periodic temporal intervals are associated with authorizations is presented, which provides a high degree of flexibility and supports the specification of several protection requirements that cannot be expressed in traditional access control models.