Institution
Telecom Italia
Company•Rome, Italy•
About: Telecom Italia is a company organization based out in Rome, Italy. It is known for research contribution in the topics: The Internet & Radio access network. The organization has 1392 authors who have published 1796 publications receiving 35026 citations.
Topics: The Internet, Radio access network, Network packet, Context (language use), Service (systems architecture)
Papers published on a yearly basis
Papers
More filters
••
13 Sep 2014TL;DR: The findings show that the most sensitive and valued category of personal information is location, and a reverse second price auction mechanism is employed to obtain honest valuations.
Abstract: In the context of a myriad of mobile apps which collect personally identifiable information (PII) and a prospective market place of personal data, we investigate a user-centric monetary valuation of mobile PII. During a 6-week long user study in a living lab deployment with 60 participants, we collected their daily valuations of 4 categories of mobile PII (communication, e.g. phonecalls made/received, applications, e.g. time spent on different apps, location and media, e.g. photos taken) at three levels of complexity (individual data points, aggregated statistics and processed, i.e. meaningful interpretations of the data). In order to obtain honest valuations, we employ a reverse second price auction mechanism. Our findings show that the most sensitive and valued category of personal information is location. We report statistically significant associations between actual mobile usage, personal dispositions, and bidding behavior. Finally, we outline key implications for the design of mobile services and future markets of personal data.
84 citations
•
31 May 2004TL;DR: In this article, the authors propose a peer-to-peer (P2P) system for content sharing between individual users in a peer topeer fashion, where each user is connected to a respective local access network through a transport network.
Abstract: A method and a system for digital content sharing between individual users in a peer-to-peer fashion, wherein each user is connected to a respective local access network through a transport network. The method and system provide local network storage areas associated with each user arranged for archiving digital contents, and carry out the transferring of contents via the transport network from a storage area associated with a user holding requested contents to a remote network storage area associated with a requesting user on a different access network according to the connectivity available on the transport network. The shared contents are made available for access by the requesting user on its local network storage area. A telecommunications network architecture includes the system so that there is a plurality of services of content sharing between pairs of individual users implementing the above method.
84 citations
•
06 Aug 2003TL;DR: In this article, the authors present a model configuration (M1) for a telecommunications network, which expresses, for at least a function of each element subjected to control, a model for implementing the function itself.
Abstract: The configuration of a telecommunications network (N) is subjected to control by generating a model configuration (M1) which expresses, for at least a function of each element subjected to control, a model for implementing the function itself. For each element subjected to control, at least a respective set of configuration data (. . . , CFkl1, CFk, CFk+l, . . .) of the element itself is collected, subsequently verifying that the function implemented by simulation, hence in the absence of interaction with the element itself, based on the aforesaid set of configuration data corresponds with the implementation model included in the model configuration (M1). The operations in question are carried out for the nodes as well as for the interfacing elements between the nodes (k, k+1) of the network. For all elements in question it is possible to carry out the functions described also in relation to a plurality of respective sets of configuration data (CF, CM) which express, preferably in exhaustive fashion, respective different configuration states of the element.
84 citations
••
TL;DR: A vision of the advantages of the RANaaS is given, its benefits in terms of energy efficiency are presented, and a consistent system-level power model is proposed as a reference for assessing innovative functionalities toward 5G systems.
Abstract: This paper focuses on energy efficiency aspects and related benefits of radio-access-network-as-a-service (RANaaS) implementation (using commodity hardware) as architectural evolution of LTE-advanced networks toward 5G infrastructure. RANaaS is a novel concept introduced recently, which enables the partial centralization of RAN functionalities depending on the actual needs as well as on network characteristics. In the view of future definition of 5G systems, this cloud-based design is an important solution in terms of efficient usage of network resources. The aim of this paper is to give a vision of the advantages of the RANaaS, to present its benefits in terms of energy efficiency and to propose a consistent system-level power model as a reference for assessing innovative functionalities toward 5G systems. The incremental benefits through the years are also discussed in perspective, by considering technological evolution of IT platforms and the increasing matching between their capabilities and the need for progressive virtualization of RAN functionalities. The description is complemented by an exemplary evaluation in terms of energy efficiency, analyzing the achievable gains associated with the RANaaS paradigm.
83 citations
•
09 Apr 2004TL;DR: In this article, a mailbox access request made by a user is intercepted by an apparatus configured in such a way that the apparatus intercepts the request and uses the user identifier obtained from the network as the mailbox access key, without the need for the user to enter this access key himself among the configuration parameters of his mail program.
Abstract: For managing the transmission and/or reception of electronic mail messages by a user connected to a communications network, at least one apparatus is configured in such a way as to request, to another apparatus being part of the communications network, an identifier associated uniquely with the user (for example his telephone number), on the basis of another identifier which the network has assigned to the user in the step of connection to the said network (an IP address, for example). For sending an electronic mail message generated by the user, the user identifier obtained from the network can be used by the apparatus configured in this way to automatically fill in a sender field of the message, without the need for the user to enter it himself among the configuration parameters of his mail program. For access to a mailbox made available to the user, the apparatus configured in this way intercepts a mailbox access request made by the user and uses the user identifier obtained from the network as the mailbox access key, without the need for the user to enter this access key himself among the configuration parameters of his mail program.
81 citations
Authors
Showing all 1395 results
Name | H-index | Papers | Citations |
---|---|---|---|
Paolo Gallo | 57 | 297 | 14322 |
Gail E. Kaiser | 50 | 335 | 8980 |
Francesco Carlo Morabito | 39 | 399 | 5676 |
Claudio Casetti | 38 | 251 | 5721 |
Andrea Zanella | 37 | 279 | 9860 |
Massimo Zancanaro | 36 | 200 | 4375 |
Romano Fantacci | 36 | 478 | 5889 |
Marco Mamei | 35 | 195 | 3901 |
Luciano Lenzini | 33 | 195 | 4358 |
Roberto Tadei | 33 | 162 | 3783 |
Enzo Mingozzi | 31 | 151 | 3536 |
Luca Console | 31 | 126 | 3605 |
Manuele Bicego | 30 | 171 | 3558 |
Sinem Coleri Ergen | 28 | 89 | 4063 |
Davide Micheli | 26 | 82 | 2511 |