Alberto Bartoli

Orcid: 0000-0003-4132-416X

According to our database1, Alberto Bartoli authored at least 124 papers between 1991 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Commentary on "Jaws 30", by W. B. Langdon.
Genet. Program. Evolvable Mach., December, 2023

Factors Impacting Diversity and Effectiveness of Evolved Modular Robots.
ACM Trans. Evol. Learn. Optim., March, 2023

Network architecture and ROA protection of government mail domains: A case study.
Comput. Commun., 2023

2022
One-Shot Learning of Ensembles of Temporal Logic Formulas for Anomaly Detection in Cyber-Physical Systems.
Proceedings of the Genetic Programming - 25th European Conference, 2022

2021
Automatic Search-and-Replace From Examples With Coevolutionary Genetic Programming.
IEEE Trans. Cybern., 2021

Robustness analysis of DNS paths and web access paths in public administration websites.
Comput. Commun., 2021

Biodiversity in evolved voxel-based soft robots.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

2020
Specializing Context-Free Grammars With a (1 + 1)-EA.
IEEE Trans. Evol. Comput., 2020

Weighted Hierarchical Grammatical Evolution.
IEEE Trans. Cybern., 2020

2D-VSR-Sim: A simulation tool for the optimization of 2-D voxel-based soft robots.
SoftwareX, 2020

Genetic programming in the twenty-first century: a bibliometric and content-based analysis from both sides of the fence.
Genet. Program. Evolvable Mach., 2020

Interactive example-based finding of text items.
Expert Syst. Appl., 2020

2D-VSR-Sim: an Optimization-friendly Simulator of 2-D Voxel-based Soft Robots.
CoRR, 2020

Evolutionary optimization of sliding contact positions in powered floor systems for mobile robots.
Autom., 2020

Communication in Decision Making: Competition favors Inequality.
Proceedings of the 2020 Conference on Artificial Life, 2020

Mechanisms of Social Learning in Evolved Artificial Life.
Proceedings of the 2020 Conference on Artificial Life, 2020

Evolution of distributed neural controllers for voxel-based soft robots.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Exploring the Potential of GPT-2 for Generating Fake Reviews of Research Papers.
Proceedings of the Fuzzy Systems and Data Mining VI, 2020

Evolutionary Optimization of Graphs with GraphEA.
Proceedings of the AIxIA 2020 - Advances in Artificial Intelligence, 2020

2019
Designing automatically a representation for grammatical evolution.
Genet. Program. Evolvable Mach., 2019

Enterprise wi-fi: we need devices that are secure by default.
Commun. ACM, 2019

Multi-level diversity promotion strategies for Grammar-guided Genetic Programming.
Appl. Soft Comput., 2019

Communication-based cooperative tasks: how the language expressiveness affects reinforcement learning.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Evolutionary Synthesis of Sensing Controllers for Voxel-based Soft Robots.
Proceedings of the 2019 Conference on Artificial Life, 2019

An analysis of dimensionality reduction techniques for visualizing evolution.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Active Learning of Predefined Models for Information Extraction: Selecting Regular Expressions from Examples.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Design of Powered Floor Systems for Mobile Robots with Differential Evolution.
Proceedings of the Applications of Evolutionary Computation, 2019

2018
Active Learning of Regular Expressions for Entity Extraction.
IEEE Trans. Cybern., 2018

Observing the Population Dynamics in GE by means of the Intrinsic Dimension.
CoRR, 2018

Evil twins and WPA2 Enterprise: A coming security disaster?
Comput. Secur., 2018

GOMGE: Gene-Pool Optimal Mixing on Grammatical Evolution.
Proceedings of the Parallel Problem Solving from Nature - PPSN XV, 2018

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Back To The Basics: Security of Software Downloads for Smart Objects.
Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good, 2018

Selfish vs. global behavior promotion in car controller evolution.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Exploring the application of GOMEA to bit-string GE.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

On the Automatic Design of a Representation for Grammar-Based Genetic Programming.
Proceedings of the Genetic Programming - 21st European Conference, 2018

Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning.
Proceedings of the Risks and Security of Internet and Systems, 2018

(In)Secure Configuration Practices of WPA2 Enterprise Supplicants.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Detection of Obfuscation Techniques in Android Applications.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A Language for UAV Traffic Rules in an Urban Environment and Decentralized Scenario.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

An effective diversity promotion mechanism in grammatical evolution.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Road Traffic Rules Synthesis Using Grammatical Evolution.
Proceedings of the Applications of Evolutionary Computation - 20th European Conference, 2017

2016
Correction to "Inference of Regular Expressions for Text Extraction from Examples".
IEEE Trans. Knowl. Data Eng., 2016

Inference of Regular Expressions for Text Extraction from Examples.
IEEE Trans. Knowl. Data Eng., 2016

An Architecture for Anonymous Mobile Coupons in a Large Network.
J. Comput. Networks Commun., 2016

Can a Machine Replace Humans in Building Regular Expressions? A Case Study.
IEEE Intell. Syst., 2016

Predicting the effectiveness of pattern-based entity extractor inference.
Appl. Soft Comput., 2016

"Best Dinner Ever!!!": Automatic Generation of Restaurant Reviews with LSTM-RNN.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

A Language and an Inference Engine for Twitter Filtering Rules.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Active learning approaches for learning regular expressions with genetic programming.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Syntactical Similarity Learning by Means of Grammatical Evolution.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016

Segmentation of Mosaic Images Based on Deformable Models Using Genetic Algorithms.
Proceedings of the Smart Objects and Technologies for Social Good, 2016

On the Automatic Construction of Regular Expressions from Examples (GP vs. Humans 1-0).
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Data Quality Challenge: Toward a Tool for String Processing by Examples.
ACM J. Data Inf. Qual., 2015

Evolutionary Learning of Syntax Patterns for Genic Interaction Extraction.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Learning Text Patterns Using Separate-and-Conquer Genetic Programming.
Proceedings of the Genetic Programming - 18th European Conference, 2015

Evolutionary Inference of Attribute-Based Access Control Policies.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2015

An Author Profiling Approach Based on Language-dependent Content and Stylometric Features.
Proceedings of the Working Notes of CLEF 2015, 2015

An Author Verification Approach Based on Differential Features: Notebook for PAN at CLEF 2015.
Proceedings of the Working Notes of CLEF 2015, 2015

2014
Semisupervised Wrapper Choice and Generation for Print-Oriented Documents.
IEEE Trans. Knowl. Data Eng., 2014

Bibliometric Evaluation of Researchers in the Internet Age.
Inf. Soc., 2014

Automatic Synthesis of Regular Expressions from Examples.
Computer, 2014

Compressing Regular Expression Sets for Deep Packet Inspection.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014

Publication Venue Recommendation Based on Paper Abstract.
Proceedings of the 26th IEEE International Conference on Tools with Artificial Intelligence, 2014

Playing regex golf with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse Dynamics.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Citation Counts and Evaluation of Researchers in the Internet Age.
CoRR, 2013

A novel estimation methodology for tracheal pressure in mechanical ventilation control.
Proceedings of the 8th International Symposium on Image and Signal Processing and Analysis, 2013

Automatic string replace by examples.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Brand-Related Events Detection, Classification and Summarization on Twitter.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Recording and Replaying Navigations on AJAX Web Sites.
Proceedings of the Web Engineering - 12th International Conference, 2012

Automatic generation of regular expressions from examples with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2012

A look at hidden web pages in Italian public administrations.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
A probabilistic approach to printed document understanding.
Int. J. Document Anal. Recognit., 2011

Anomaly detection techniques for a web defacement monitoring service.
Expert Syst. Appl., 2011

Automatic Face Annotation in News Images by Mining the Web.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Rainbow crypt: Securing communication through a protected visual channel.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

GP-Based Electricity Price Forecasting.
Proceedings of the Genetic Programming - 14th European Conference, 2011

2010
A Framework for Large-Scale Detection of Web Site Defacements.
ACM Trans. Internet Techn., 2010

Open world classification of printed invoices.
Proceedings of the 2010 ACM Symposium on Document Engineering, 2010

2009
The Reaction Time to Web Site Defacements.
IEEE Internet Comput., 2009

2008
A Comparative Study of Anomaly Detection Techniques in Web Site Defacement Detection.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Camera-based Scrolling Interface for Hand-held Devices.
Proceedings of the 12th International Conference on Information Visualisation, 2008

2007
Adaptive Performance Control of Internet-based Grids in a Dynamic Environment.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Multi-objective Genetic Programming for Improving the Performance of TCP.
Proceedings of the Genetic Programming, 10th European Conference, 2007

On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements.
Proceedings of the Detection of Intrusions and Malware, 2007

Adaptive Performance Tuning for Internet-BasedWorkflows.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Symbolic regression of discontinuous and multivariate functions by Hyper-Volume Error Separation (HVES).
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Detection of Web Defacements by means of Genetic Programming.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Automatic Integrity Checks for Remote Web Resources.
IEEE Internet Comput., 2006

A replication framework for program-to-program interaction across unreliable networks and its implementation in a servlet container.
Concurr. Comput. Pract. Exp., 2006

On-line self-checking of replication consistency for autonomic computing.
Clust. Comput., 2006

On the performance of inter-organizational design optimization systems.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

A Divide & Conquer Strategy for Improving Efficiency and Probability of Success in Genetic Programming.
Proceedings of the Genetic Programming, 9th European Conference, 2006

2004
Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation.
Wirel. Networks, 2004

On Causal Broadcasting with Positive Acknowledgments and Bounded-Length Counters.
IEEE Trans. Computers, 2004

Implementing a replicated service with group communication.
J. Syst. Archit., 2004

A Framework for Prototyping J2EE Replication Algorithms.
Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, 2004

2003
Application-based dynamic primary views in asynchronous distributed systems.
J. Parallel Distributed Comput., 2003

On the Structuring of Reliable Multicast Protocols for Distributed Mobile Systems.
Comput. J., 2003

Online Consistency Checking for Replicated Objects.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Adaptive Message Packing for Group Communication Systems.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

2002
Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems.
Proceedings of the NETWORKING 2002, 2002

2001
A Reliable Multicast Protocol for Distributed Mobile Systems: Design and Evaluation.
IEEE Trans. Parallel Distributed Syst., 2001

Application-controlled memory management in a single address space environment.
Int. J. Softw. Tools Technol. Transf., 2001

Efficient Verification of a Multicast Protocol for Mobile Computing.
Comput. J., 2001

Online Reconfiguration in Replicated Databases Based on Group Communication.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Single address space implementation in distributed systems.
Concurr. Pract. Exp., 2000

1999
Group Multicast in Distributed Mobile Systems with Unreliable Wireless Network.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Programming Partition-Aware Network Applications.
Proceedings of the Advances in Distributed Systems, 1999

1998
Group-Based Multicast and Dynamic Membership in Wireless Networks with Incomplete Spatial Coverage.
Mob. Networks Appl., 1998

Mechanisms for application-level recoverable-persistence in a single address space.
Microprocess. Microsystems, 1998

1997
Enriched View Synchrony: A Programming Paradigm for Partitionable Asynchronous Distributed Systems.
IEEE Trans. Computers, 1997

A Novel Approach to Marshalling.
Softw. Pract. Exp., 1997

Selecting a "Primary Partition" in Partitionable Asynchronous Distributed Systems.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

1996
On Programming with View Synchrony.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

1995
Implementing distributed process farms.
Microprocess. Microsystems, 1995

Graphical design of distributed applications through reusable components.
IEEE Parallel Distributed Technol. Syst. Appl., 1995

Reusing sequential software in a distributed environment.
Distributed Syst. Eng., 1995

1994
Replicated File Management in Large-Scale Distributed Systems.
Proceedings of the Distributed Algorithms, 8th International Workshop, 1994

1993
Wide-Address Spaces - Exploring the Design Space.
ACM SIGOPS Oper. Syst. Rev., 1993

1991
Supporting load distribution strategies in message-passing multiprocessors: a case study.
Microprocess. Microsystems, 1991


  Loading...