Mathematical formulation of Bioventing Optimal Design Strategies

Bioventing is a technology used to abate the presence of pollutants in the subsoil. Microorganisms biodegrade the pollutant but the biochemical reaction requires oxygen and so an airflow is induced in the subsoil by means of injection and/or extraction wells. Costs, final result and decontamination time are reliant on contaminant type, soil permeability and several other factors, but oxygen subsoil concentration plays a very important role.

Le ambre figurate in Italia meridionale tra VIII e V secolo a.C. Note sui centri di produzione e sulle botteghe

The study takes up some issues relating to the location of the workshops that produced the valuable figured ambers that marked the aristocratic burials of southern Italy from the eighth to fifth century BC. The contribution of findings and recent studies enabled us to assign some groups of artifacts to the activity of different workshops and even to identify outstanding artistic personalities, highlighting the undeniable stylistic connections between them.

Beyond Fact-Checking: Network Analysis Tools for Monitoring Disinformation in Social Media

Operated by the H2020 SOMA Project, the recently established Social Observatory for Disinformation and Social Media Analysis supports researchers, journalists and fact-checkers in their quest for quality information. At the core of the Observatory lies the DisInfoNet Toolbox, designed to help a wide spectrum of users understand the dynamics of (fake) news dissemination in social networks. DisInfoNet combines text mining and classification with graph analysis and visualization to offer a comprehensive and user-friendly suite.

Cryptanalysis on GPUs with the Cube Attack: Design, Optimization and Performances Gains

The cube attack is a flexible cryptanalysis technique, with a simple and fascinating theoretical implant. It combines offline exhaustive searches over selected tweakable public/IV bits (the sides of the "cube"), with an online key-recovery phase. Although virtually applicable to any cipher, and generally praised by the research community, the real potential of the attack is still in question, and no implementation so far succeeded in breaking a real-world strong cipher. In this paper, we present, validate and analyze the first thorough implementation of the cube attack on a GPU cluster.

Sixth post-Newtonian nonlocal-in-time dynamics of binary systems

We complete our previous derivation, at the sixth post-Newtonian (6PN) accuracy, of the local-in-time dynamics of a gravitationally interacting two-body system by giving two gauge-invariant characterizations of its complementary nonlocal-in-time dynamics. On the one hand, we compute the nonlocal part of the scattering angle for hyberboliclike motions; and, on the other hand, we compute the nonlocal part of the averaged (Delaunay) Hamiltonian for ellipticlike motions.