Catuscia Palamidessi

Affiliations:
  • École Polytechnique, Paris, France


According to our database1, Catuscia Palamidessi authored at least 248 papers between 1983 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PRIVIC: A privacy-preserving method for incremental collection of location data.
Proc. Priv. Enhancing Technol., January, 2024

2023
Advancing Personalized Federated Learning: Group Privacy, Fairness, and Beyond.
SN Comput. Sci., November, 2023

Chair's Letter.
ACM SIGLOG News, January, 2023

On the Risks of Collecting Multidimensional Data Under Local Differential Privacy.
Proc. VLDB Endow., 2023

Universal optimality and robust utility bounds for metric differential privacy.
J. Comput. Secur., 2023

Bounding information leakage in machine learning.
Neurocomputing, 2023

On the Impact of Multi-dimensional Local Differential Privacy on Fairness.
CoRR, 2023

Causal Discovery Under Local Privacy.
CoRR, 2023

Online Sensitivity Optimization in Differentially Private Learning.
CoRR, 2023

BaBE: Enhancing Fairness via Estimation of Latent Explaining Variables.
CoRR, 2023

Obfuscation Padding Schemes that Minimize Rényi Min-Entropy for Privacy.
Proceedings of the Information Security Practice and Experience, 2023

On the (Im)Possibility of Estimating Various Notions of Differential Privacy (short paper).
Proceedings of the 24th Italian Conference on Theoretical Computer Science, 2023

On the application and impact of ε-DP and fairness in ambulance engagement time prediction.
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

Group Privacy for Personalized Federated Learning.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Frequency Estimation of Evolving Data Under Local Differential Privacy.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

(Local) Differential Privacy has NO Disparate Impact on Fairness.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

On the Utility Gain of Iterative Bayesian Update for Locally Differentially Private Mechanisms.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Analyzing the Shuffle Model Through the Lens of Quantitative Information Flow.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Bayes Security: A Not So Average Metric.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Local Methods for Privacy Protection and Impact on Fairness.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Information Leakage Games: Exploring Information as a Utility Function.
ACM Trans. Priv. Secur., 2022

Survey on Fairness Notions and Related Tensions.
CoRR, 2022

Minimizing Information Leakage under Padding Constraints.
CoRR, 2022

On the (Im)Possibility of Estimating Various Notions of Differential Privacy.
CoRR, 2022

Reconstruction of the distribution of sensitive data under free-will privacy.
CoRR, 2022

Three-way optimization of privacy and utility of location data.
CoRR, 2022

A privacy preserving querying mechanism with high utility for electric vehicles.
CoRR, 2022

Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response.
CoRR, 2022

Tight Differential Privacy Blanket for Shuffle Model.
CoRR, 2022

Identifiability of Causal-based Fairness Notions: A State of the Art.
CoRR, 2022

Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python.
Proceedings of the Computer Security - ESORICS 2022, 2022

Leveraging Adversarial Examples to Quantify Membership Information Leakage.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Causal Discovery for Fairness.
Proceedings of the Algorithmic Fairness through the Lens of Causality and Privacy Workshop, 2022

On the Impossibility of Non-trivial Accuracy in Presence of Fairness Constraints.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
On the Applicability of Machine Learning Fairness Notions.
SIGKDD Explor., 2021

Machine learning fairness notions: Bridging the gap with real-world applications.
Inf. Process. Manag., 2021

Enhanced models for privacy and utility in continuous-time diffusion networks.
Int. J. Inf. Sec., 2021

On the impossibility of non-trivial accuracy under fairness constraints.
CoRR, 2021

DOCTOR: A Simple Method for Detecting Misclassification Errors.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Public Wireless Packets Anonymously Hurt You.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

An Incentive Mechanism for Trading Personal Data in Data Markets.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2021, 2021

A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

CONCUR Test-Of-Time Award 2021 (Invited Paper).
Proceedings of the 32nd International Conference on Concurrency Theory, 2021

Establishing the Price of Privacy in Federated Data Trading.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Refinement Orders for Quantitative Information Flow and Differential Privacy.
J. Cybersecur. Priv., December, 2020

The Science of Quantitative Information Flow.
Information Security and Cryptography, Springer, ISBN: 978-3-319-96131-6, 2020

A logical characterization of differential privacy.
Sci. Comput. Program., 2020

Dynamic Slicing for Concurrent Constraint Languages.
Fundam. Informaticae, 2020

The Bayes Security Measure.
CoRR, 2020

Survey on Causal-based Machine Learning Fairness Notions.
CoRR, 2020

On the Applicability of ML Fairness Notions.
CoRR, 2020

Feature selection in machine learning: Rényi min-entropy vs Shannon entropy.
CoRR, 2020

Generalized Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Optimal Obfuscation Mechanisms via Machine Learning.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Modern Applications of Game-Theoretic Principles (Invited Paper).
Proceedings of the 31st International Conference on Concurrency Theory, 2020

Estimating g-Leakage via Machine Learning.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Derivation of Constraints from Machine Learning Models and Applications to Security and Privacy.
Proceedings of the Recent Developments in the Design and Implementation of Programming Languages, 2020

2019
An axiomatization of information flow measures.
Theor. Comput. Sci., 2019

Full Convergence of the Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection.
CoRR, 2019

Generating Optimal Privacy-Protection Mechanisms via Machine Learning.
CoRR, 2019

F-BLEAU: Fast Black-Box Leakage Estimation.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Catch me if you can: how geo-indistinguishability affects utility in mobility-based geographic datasets.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-based Recommendations, 2019

Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

Utility-Preserving Privacy Mechanisms for Counting Queries.
Proceedings of the Models, Languages, and Tools for Concurrent and Distributed Programming, 2019

2018
A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
Entropy, 2018

Alonzo Church Award 2018 - Call for Nominations.
Bull. EATCS, 2018

Metric-based local differential privacy for statistical applications.
CoRR, 2018

Leakage and Protocol Composition in a Game-Theoretic Perspective.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

A Logical Characterization of Differential Privacy via Behavioral Metrics.
Proceedings of the Formal Aspects of Component Software - 15th International Conference, 2018

Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Geometric Noise for Locally Private Counting Queries.
Proceedings of the 13th Workshop on Programming Languages and Analysis for Security, 2018

Feature Selection with Rényi Min-Entropy.
Proceedings of the Artificial Neural Networks in Pattern Recognition, 2018

2017
Efficient Utility Improvement for Location Privacy.
Proc. Priv. Enhancing Technol., 2017

On the Compositionality of Quantitative Information Flow.
Log. Methods Comput. Sci., 2017

Quantifying leakage in the presence of unreliable sources of information.
J. Comput. Syst. Sci., 2017

Methods for Location Privacy: A comparative overview.
Found. Trends Priv. Secur., 2017

Alonzo Church Award 2017 - Call for Nominations.
Bull. EATCS, 2017

Trading Optimality for Performance in Location Privacy.
Proceedings of the 11th EAI International Conference on Performance Evaluation Methodologies and Tools, 2017

Information Leakage Games.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

2016
Preserving differential privacy under finite-precision semantics.
Theor. Comput. Sci., 2016

Compositional methods for information-hiding.
Math. Struct. Comput. Sci., 2016

Slicing Concurrent Constraint Programs.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2016

Axioms for Information Leakage.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Up-To Techniques for Generalized Bisimulation Metrics.
Proceedings of the 27th International Conference on Concurrency Theory, 2016

2015
Abstract interpretation of temporal concurrent constraint programs.
Theory Pract. Log. Program., 2015

Location privacy via geo-indistinguishability.
ACM SIGLOG News, 2015

Constructing elastic distinguishability metrics for location privacy.
Proc. Priv. Enhancing Technol., 2015

Preface to the special issue on quantitative information flow.
Math. Struct. Comput. Sci., 2015

On the information leakage of differentially-private mechanisms.
J. Comput. Secur., 2015

Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Geo-indistinguishability: A Principled Approach to Location Privacy.
Proceedings of the Distributed Computing and Internet Technology, 2015

A Declarative View of Signaling Pathways.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Compositionality Results for Quantitative Information Flow.
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014

A Predictive Differentially-Private Mechanism for Mobility Traces.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Additive and Multiplicative Notions of Leakage, and Their Capacities.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Generalized Bisimulation Metrics.
Proceedings of the CONCUR 2014 - Concurrency Theory - 25th International Conference, 2014

Optimal Geo-Indistinguishable Mechanisms for Location Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms.
Proceedings of the Horizons of the Mind. A Tribute to Prakash Panangaden, 2014

2013
A Predictive Differentially-Private Mechanism for Location Privacy.
CoRR, 2013

Quantitative Approaches to Information Protection.
Proceedings of the Logic, Language, Information, and Computation, 2013

A Differentially Private Mechanism of Optimal Utility for a Region of Priors.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Broadening the Scope of Differential Privacy Using Metrics.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Geo-indistinguishability: differential privacy for location-based systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Epistemic Strategies and Games on Concurrent Processes.
ACM Trans. Comput. Log., 2012

Quantitative information flow in interactive systems.
J. Comput. Secur., 2012

Quantitative Security Analysis (Dagstuhl Seminar 12481).
Dagstuhl Reports, 2012

Hide and New in the Pi-Calculus
Proceedings of the Proceedings Combined 19th International Workshop on Expressiveness in Concurrency and 9th Workshop on Structured Operational Semantics, 2012

Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems
Proceedings of the Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, 2012

A non-local method for robustness analysis of floating point programs
Proceedings of the Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, 2012

Measuring Information Leakage Using Generalized Gain Functions.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

Spatial and Epistemic Modalities in Constraint-Based Process Calculi.
Proceedings of the CONCUR 2012 - Concurrency Theory - 23rd International Conference, 2012

2011
Information hiding in probabilistic concurrent systems.
Theor. Comput. Sci., 2011

Differential Privacy: On the Trade-Off between Utility and Information Leakage.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

On the Relation between Differential Privacy and Quantitative Information Flow.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

Deriving Labels and Bisimilarity for Concurrent Constraint Programming.
Proceedings of the Foundations of Software Science and Computational Structures, 2011

Quantitative Information Flow and Applications to Differential Privacy.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

2010
Making random choices invisible to the scheduler.
Inf. Comput., 2010

Differential Privacy versus Quantitative Information Flow
CoRR, 2010

Computing the Leakage of Information-Hiding Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Reconciling Belief and Vulnerability in Information Flow.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Compositionality of Secure Information Flow.
Proceedings of the Mathematics of Program Construction, 10th International Conference, 2010

Probabilistic Information Flow.
Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, 2010

Safe Equivalences for Security Properties.
Proceedings of the Theoretical Computer Science, 2010

Entropy and Attack Models in Information Flow - (Invited Talk).
Proceedings of the Theoretical Computer Science, 2010

Interactive Information Flow - (Invited Talk).
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Information Flow in Interactive Systems.
Proceedings of the CONCUR 2010 - Concurrency Theory, 21th International Conference, 2010

Compositional modelling of signalling pathways in timed concurrent constraint programming.
Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, 2010

Concurrent and Reactive Constraint Programming.
Proceedings of the A 25-Year Perspective on Logic Programming: Achievements of the Italian Association for Logic Programming, 2010

2009
Model Checking Probabilistic and Stochastic Extensions of the pi-Calculus.
IEEE Trans. Software Eng., 2009

Foreword.
Theor. Comput. Sci., 2009

Probabilistic and nondeterministic aspects of anonymity.
Theor. Comput. Sci., 2009

A quantitative doxastic logic for probabilistic processes and applications to information-hiding.
J. Appl. Non Class. Logics, 2009

Quantitative Notions of Leakage for One-try Attacks.
Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics, 2009

Preface.
Proceedings of the 25th Conference on Mathematical Foundations of Programming Semantics, 2009

Explicit fairness in testing semantics
Log. Methods Comput. Sci., 2009

A framework for abstract interpretation of timed concurrent constraint programs.
Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2009

Probable Innocence in the Presence of Independent Knowledge.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

2008
On the Bayes risk in information-hiding protocols.
J. Comput. Secur., 2008

Anonymity protocols as noisy channels.
Inf. Comput., 2008

Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols.
Proceedings of the Trustworthy Global Computing, 4th International Symposium, 2008

On the Asynchronous Nature of the Asynchronous pi-Calculus.
Proceedings of the Concurrency, 2008

2007
Tutorial on separation results in process calculi via leader election problems.
Theor. Comput. Sci., 2007

Preface.
Theor. Comput. Sci., 2007

Axiomatizations for probabilistic finite-state behaviors.
Theor. Comput. Sci., 2007

A framework for analyzing probabilistic protocols and its application to the Partial Secrets Exchange.
Theor. Comput. Sci., 2007

Preface.
Proceedings of the Fifth Workshop on Security Issues in Concurrency, 2007

Formal Approaches to Information-Hiding (Tutorial).
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Symbolic Bisimulations for Probabilistic Systems.
Proceedings of the Fourth International Conference on the Quantitative Evaluaiton of Systems (QEST 2007), 2007

Model checking the probabilistic pi-calculus.
Proceedings of the Fourth International Conference on the Quantitative Evaluaiton of Systems (QEST 2007), 2007

Universal Timed Concurrent Constraint Programming.
Proceedings of the Logic Programming, 23rd International Conference, 2007

Declarative Diagnosis of Temporal Concurrent Constraint Programs.
Proceedings of the Logic Programming, 23rd International Conference, 2007

Probability of Error in Information-Hiding Protocols.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

A Probabilistic Applied Pi-Calculus.
Proceedings of the Programming Languages and Systems, 5th Asian Symposium, 2007

2006
Probable innocence revisited.
Theor. Comput. Sci., 2006

Expressiveness of Probabilistic pi.
Proceedings of the 4th International Workshop on Quantitative Aspects of Programming Languages, 2006

Preface.
Proceedings of the LIX Colloquium on Emerging Trends in Concurrency Theory, 2006

Fair Pi.
Proceedings of the 13th International Workshop on Expressiveness in Concurrency, 2006

Languages for Concurrency.
Bull. EATCS, 2006

On the Expressiveness of Linearity vs Persistence in the Asychronous Pi-Calculus.
Proceedings of the 21th IEEE Symposium on Logic in Computer Science (LICS 2006), 2006

A Declarative Framework for Security: Secure Concurrent Constraint Programming.
Proceedings of the Logic Programming, 22nd International Conference, 2006

On Recursion, Replication and Scope Mechanisms in Process Calculi.
Proceedings of the Formal Methods for Components and Objects, 5th International Symposium, 2006

2005
A randomized encoding of the Pi-calculus with mixed choice.
Theor. Comput. Sci., 2005

A Congruence Format for Name-passing Calculi.
Proceedings of the Second Workshop on Structural Operational Semantics, 2005

Anonymity in Probabilistic and Nondeterministic Systems.
Proceedings of the Workshop "Essays on Algebraic Process Calculi", 2005

Probabilistic and Nondeterministic Aspects of Anonymity.
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005

Weak Probabilistic Anonymity.
Proceedings of the International Workshop on Security and Concurrency, SecCo@CONCUR 2005, 2005

Metrics for Action-labelled Quantitative Transition Systems.
Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages, 2005

Separation of Synchronous and Asynchronous Communication Via Testing.
Proceedings of the 12th Workshop on Expressiveness on Concurrency, 2005

Recursion vs Replication in Process Calculi: Expressiveness.
Bull. EATCS, 2005

Separation Results Via Leader Election Problems.
Proceedings of the Formal Methods for Components and Objects, 4th International Symposium, 2005

Probabilistic Anonymity.
Proceedings of the Foundations of Global Computing, 20.-25. February 2005, 2005

Compositional Reasoning for Probabilistic Finite-State Behaviors.
Proceedings of the Processes, 2005

2003
Comparing The Expressive Power Of The Synchronous And Asynchronous Pi-Calculi.
Math. Struct. Comput. Sci., 2003

2002
Temporal Concurrent Constraint Programming: Denotation, Logic and Applications.
Nord. J. Comput., 2002

On the Expressive Power of Temporal Concurrent Constraint Programming Languages (invited talk).
Proceedings of the 9th International Workshop on Expressiveness in Concurrency, 2002

Mobile calculi for distributed programming.
Proceedings of the 4th international ACM SIGPLAN conference on Principles and practice of declarative programming, 2002

On the expressive power of temporal concurrent constraint programming languages.
Proceedings of the 4th international ACM SIGPLAN conference on Principles and practice of declarative programming, 2002

A Randomized Solution to the Distributed Resource Allocation Problem.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002

A Randomized Distributed Encoding of the Pi-Calculus with Mixed Choice.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

2001
Foreword.
Theor. Comput. Sci., 2001

On the generalized dining philosophers problem.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

A Temporal Concurrent Constraint Programming Calculus.
Proceedings of the Principles and Practice of Constraint Programming, 2001

2000
Preface.
Inf. Comput., 2000

Probabilistic Asynchronous pi-Calculus.
Proceedings of the Foundations of Software Science and Computation Structures, 2000

Concurrent Constraint Programming with Process Mobility.
Proceedings of the Computational Logic, 2000

1999
Editorial: Selected Papers from the Joint International Symposium PLILP/ALP'98
J. Funct. Log. Program., 1999

Foundational Aspects of Syntax.
ACM Comput. Surv., 1999

Expressiveness and Distributed Implementation of Conciurrent Calculi with Link Mobility.
Proceedings of the CONCUR '99: Concurrency Theory, 1999

The Replacement Operation for CCP Programs.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1998
Preface.
Proceedings of the Fifth International Workshop on Expressiveness in Concurrency, 1998

1997
Complementation in Abstract Interpretation.
ACM Trans. Program. Lang. Syst., 1997

Proving Concurrent Constraint Programs Correct.
ACM Trans. Program. Lang. Syst., 1997

Confluence in Concurrent Constraint Programming.
Theor. Comput. Sci., 1997

An Algebraic Perspective of Constraint Logic Programming.
J. Log. Comput., 1997

Constraint Logic Programming with Dynamic Scheduling: A Semantics Based on Closure Operators.
Inf. Comput., 1997

Foreword.
Proceedings of the International Workshop on Expressiveness in Concurrency, 1997

Comparing the Expressive Power of the Synchronous and the Asynchronous pi-calculus.
Proceedings of the Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997

Constraint programming for concurrent and distributed computing.
Proceedings of the JFPLC'97, 1997

Partial Order and SOS Semantics for Linear Constraint Programs.
Proceedings of the Coordination Languages and Models, Second International Conference, 1997

1996
Encoding Transition Systems in Sequent Calculus.
Proceedings of the Linear Logic Tokyo Meeting 1996, Keio University, Mita Campus, Tokyo, Japan, March 29, 1996

Proving Correctness of Constraint Logic Programs with Dynamic Scheduling.
Proceedings of the Static Analysis, Third International Symposium, 1996

Linear Constraint Systems as High-Level Nets.
Proceedings of the CONCUR '96, 1996

1995
Negation as Instantiation
Inf. Comput., August, 1995

Nondeterminism and Infinite Computations in Constraint Programming.
Theor. Comput. Sci., 1995

Concurrent Constraint Programming with Information Removal.
Proceedings of the First International Workshop on Concurrent Constraint Programming, 1995

1994
Embedding as a Tool for Language Comparison
Inf. Comput., January, 1994

A Declarative Approach for First-Order Built-in's of Prolog.
Appl. Algebra Eng. Commun. Comput., 1994

Denotational semantics for Concurrent Constraint Programs analyses.
Proceedings of the ICLP 1994 Workshop W2: Verification and Analysis of (Concurrent) Logic Languages, 1994

Proving correctness of Concurrent Constraint Programs.
Proceedings of the ICLP 1994 Workshop W2: Verification and Analysis of (Concurrent) Logic Languages, 1994

A Logical Denotational Semantics for Constraint Logic Programming.
Proceedings of the Programming Languages and Systems, 1994

Concurrent Constraint Programming.
Proceedings of the Algebraic and Logic Programming, 4th International Conference, 1994

Fixpoint Semantics of L lambda.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

Confluence and Concurrent Constraint Programming.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994

1993
A Model-Theoretic Reconstruction of the Operational Semantics of Logic Programs
Inf. Comput., March, 1993

Fixpoint Semantics of L-lambda.
Proceedings of the Logic Programming, 1993

Non-monotonic Concurrent Constraint Programming.
Proceedings of the Logic Programming, 1993

Compositional Analysis for Concurrent Constraint Programming
Proceedings of the Eighth Annual Symposium on Logic in Computer Science (LICS '93), 1993

1992
From Failure to Success: Comparing a Denotational and a Declarative Semantics for Horn Clause Logic.
Theor. Comput. Sci., 1992

Structural operational semantics for AKL.
Future Gener. Comput. Syst., 1992

On Blocks: Locality and Asynchronous Communication (Extended Abstract).
Proceedings of the Sematics: Foundations and Applications, 1992

Asynchronous Communication in Process Algebra
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992

A Process Algebra of Concurrent Constraint Programming.
Proceedings of the Logic Programming, 1992

On the Semantics of Concurrent Constraint Programming.
Proceedings of the ALPUK92, Proceedings of the 4th UK Conference on Logic Programming, London, 30 March, 1992

A Theory of First-Order Built-in's of Prolog.
Proceedings of the Algebraic and Logic Programming, 1992

1991
Semantic Models for Concurrent Logic Languages.
Theor. Comput. Sci., 1991

Comments on "Logic-Programming with Equations".
J. Log. Program., 1991

Kernel-LEAF: A Logic plus Functional Language.
J. Comput. Syst. Sci., 1991

A Fully Abstract Model for Concurrent Constraint Programming.
Proceedings of the TAPSOFT'91: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1991

Structural Operational Semantics for Kernel Andorra Prolog.
Proceedings of the PARLE '91: Parallel Architectures and Languages Europe, 1991

Negation as Instantitation: A New Rule for the Treatment of Negation in Logic Programming.
Proceedings of the Logic Programming, 1991

Embedding as a Tool for Language Comparison: On the CSP Hierarchy.
Proceedings of the CONCUR '91, 1991

The Failure of Failures in a Paradigm for Asynchronous Communication.
Proceedings of the CONCUR '91, 1991

1990
Failure and Success made Symmetric.
Proceedings of the Logic Programming, Proceedings of the 1990 North American Conference, Austin, Texas, USA, October 29, 1990

Concurrent Logic Programming: Asynchronism and Language Comparison.
Proceedings of the Logic Programming, Proceedings of the 1990 North American Conference, Austin, Texas, USA, October 29, 1990

Algebraic Properties of Idempotent Substitutions.
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990

On the Asynchronous Nature of Communication in Concurrent Logic Languages: A Fully Abstract Model Based on Sequences.
Proceedings of the CONCUR '90, 1990

1989
Declarative Modeling of the Operational Behavior of Logic Languages.
Theor. Comput. Sci., 1989

Control Flow versus Logic: A Denotational and a Declarative Model for Guarded Horn Clauses.
Proceedings of the Mathematical Foundations of Computer Science 1989, 1989

Semantic Models for a Version of PARLOG.
Proceedings of the Logic Programming, 1989

1988
Contributions to the Semantics of Logic Perpetual Processes.
Acta Informatica, 1988

A New Declarative Semantics for Logic Languages.
Proceedings of the Logic Programming, 1988

1987
A Complete Semantic Characterization of K-Leaf: A Logic Language with Partial Functions.
Proceedings of the 1987 Symposium on Logic Programming, San Francisco, California, USA, August 31, 1987

A Two-Level Approach to Logic plus Functional Programming Integration.
Proceedings of the PARLE, 1987

An Approach to the Declarative Semantics of Synchronization in Logic Languages.
Proceedings of the Logic Programming, 1987

1985
The Declarative Semantics of Logical Read-Only Variables.
Proceedings of the 1985 Symposium on Logic Programming, 1985

1984
A Synchronization Logic: Axiomatics and Formal Semantics of Generalized Horn Clauses
Inf. Control., 1984

1983
On the Fixed-Point Semantics of Horn Clauses with Infinite Terms.
Proceedings of the Logic Programming Workshop '83, Praia da Falésia, Algarve, Portugal, 26 June, 1983


  Loading...