scispace - formally typeset
C

Claudio Bettini

Researcher at University of Milan

Publications -  186
Citations -  7170

Claudio Bettini is an academic researcher from University of Milan. The author has contributed to research in topics: Information privacy & Activity recognition. The author has an hindex of 41, co-authored 171 publications receiving 6837 citations. Previous affiliations of Claudio Bettini include University of Udine & George Mason University.

Papers
More filters
Proceedings ArticleDOI

Fine-grained recognition of abnormal behaviors for early detection of mild cognitive impairment

TL;DR: This paper proposes a novel method relying on medical models, provided by cognitive neuroscience researchers, describing abnormal activity routines that may indicate the onset of early symptoms of mild cognitive impairment, and shows that the technique has a high precision while generating a small number of false positives.
Journal ArticleDOI

Hybrid reasoning in the CARE middleware for context awareness

TL;DR: The hybrid reasoning approach adopted by CARE is illustrated and the extensive experimental results on ontology-based context reasoning that support the approach are reported.
Proceedings ArticleDOI

Testing complex temporal relationships involving multiple granularities and its application to data mining (extended abstract)

TL;DR: In this paper, the authors introduce the concept of a timed automaton with granularities (TAGs) that can be used to find in a time sequence occurrences of a particular TCG with instantiated variables.
Proceedings ArticleDOI

Symbolic representation of user-defined time granularities

TL;DR: The paper considers the mathematical characterization of finite and periodical time granularity, and it identifies a user-friendly symbolic formalism which captures exactly that class of granularities.
Journal ArticleDOI

Spatial generalisation algorithms for LBS privacy preservation

TL;DR: A formal characterisation of a privacy attack that has been informally described in previous work is provided, and a new generalisation algorithm is presented that is proved to be a safe defense against that attack.