Journal

2D-VSR-Sim: a Simulation Tool for the Optimization of 2-D Voxel-based Soft Robots

Voxel-based soft robots (VSRs) are robots composed of many small, cubic blocks of a soft material with mechanical properties similar to those of living tissues and that can change their volume based on signals emitted by the robot controller, i.e., …

Interactive Example-Based Finding of Text Items

We consider the problem of identifying within a given document all text items which follow a certain pattern to be specified by a user. In particular, we focus on scenarios in which the task is to be completed very quickly and the user is not able to …

On the Impact of the Rules on Autonomous Drive Learning

Autonomous vehicles raise many ethical and moral issues that are not easy to deal with and that, if not addressed correctly, might be an obstacle to the advent of such a technological revolution. These issues are critical because autonomous vehicles …

Visualizing the Outcome of Dynamic Analysis of Android Malware with VizMal

Malware detection techniques based on signature extraction require security analysts to manually inspect samples to find evidences of malicious behavior. This time-consuming task received little attention by researchers and practitioners, as most of …

Automatic Search-and-Replace from Examples with Coevolutionary Genetic Programming

We describe the design and implementation of a system for executing search-and-replace text processing tasks automatically, based only on examples of the desired behavior. The examples consist of pairs describing the original string and the desired …

Cellular geometric semantic genetic programming

Among the different variants of Genetic Programming (GP), Geometric Semantic GP (GSGP) has proved to be both efficient and effective in finding good solutions. The fact that the operators of GSGP operate on the semantics of the individuals in a clear …

Enterprise Wi-Fi: we need devices that are secure by default

Wireless networks have become an essential component of virtually every enterprise. The security technology for these networks (WPA2 Enterprise) has been designed for a world that is very different from today’s world. Basic assumptions for secure …

Genetic programming in the 21st century: a bibliometric and content-based analysis from both sides of the fence

In this work we present an extensive bibliometric and content-based analysis of the scientific literature about genetic programming in the 21st century. Our work has two key peculiarities. First, we revealed the topics emerging from the literature …

Multi-level Diversity Promotion Strategies for Grammar-guided Genetic Programming

Grammar-guided Genetic Programming (G3P) is a family of Evolutionary Algorithms that can evolve programs in any language described by a context-free grammar. The most widespread members of this family are based on an indirect representation: a …

A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration

Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential …