Giuseppe Primiero

Orcid: 0000-0003-3264-7100

Affiliations:
  • University of Milan, Italy


According to our database1, Giuseppe Primiero authored at least 71 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Pragmatic Theory of Computational Artefacts.
Minds Mach., February, 2024

2023
Imprecise Probabilistic Model Checking for Stochastic Multi-agent Systems.
SN Comput. Sci., September, 2023

Copying safety and liveness properties of computational artefacts.
J. Log. Comput., July, 2023

Data quality dimensions for fair AI.
CoRR, 2023

A Typed Lambda-Calculus for Establishing Trust in Probabilistic Programs.
CoRR, 2023

A Logical Approach to Algorithmic Opacity.
Proceedings of the 2nd Workshop on Bias, 2023

BRIOxAlkemy: a Bias Detecting Tool.
Proceedings of the 2nd Workshop on Bias, 2023

Reasoning With Bias.
Proceedings of the 1st Workshop on Fairness and Bias in AI co-located with 26th European Conference on Artificial Intelligence (ECAI 2023), 2023

2022
Netreason: Reasoning about social networks.
J. Log. Comput., 2022

A logic for biassed information diffusion by paranoid agents in social networks.
J. Log. Comput., 2022

Transparent assessment of information quality of online reviews using formal argumentation theory.
Inf. Syst., 2022

Checking Trustworthiness of Probabilistic Computations in a Typed Natural Deduction System.
CoRR, 2022

A Depth-Bounded Semantics for Becoming Informed.
Proceedings of the Software Engineering and Formal Methods. SEFM 2022 Collocated Workshops, 2022

Proof-checking Bias in Labeling Methods.
Proceedings of 1st Workshop on Bias, 2022

2021
A theory of change for prioritised resilient and evolvable software systems.
Synth., 2021

HTLC: Hyperintensional Typed Lambda Calculus.
FLAP, 2021

Modelling Accuracy and Trustworthiness of Explaining Agents.
Proceedings of the Logic, Rationality, and Interaction - 8th International Workshop, 2021

Introducing k-lingo: a k-depth Bounded Version of ASP System Clingo.
Proceedings of the 18th International Conference on Principles of Knowledge Representation and Reasoning, 2021

Robust Model Checking with Imprecise Markov Reward Models.
Proceedings of the International Symposium on Imprecise Probability: Theories and Applications, 2021

Assessing the Quality of Online Reviews Using Formal Argumentation Theory.
Proceedings of the Web Engineering - 21st International Conference, 2021

Computable Trustworthiness Ranking of Medical Experts in Italy during the SARS-CoV-19 Pandemic.
Proceedings of the GoodIT '21: Conference on Information Technology for Social Good, 2021

Logic and Model Checking by Imprecise Probabilistic Interpreted Systems.
Proceedings of the Multi-Agent Systems - 18th European Conference, 2021

Probabilistic Typed Natural Deduction for Trustworthy Computations.
Proceedings of the 22nd International Workshop on Trust in Agent Societies (TRUST 2021) Co-located with the 20th International Conferences on Autonomous Agents and Multiagent Systems (AAMAS 2021), 2021

2020
A logic of negative trust.
J. Appl. Non Class. Logics, 2020

Effects of misinformation diffusion during a pandemic.
Appl. Netw. Sci., 2020

A Multi-Agent Depth Bounded Boolean Logic.
Proceedings of the Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops, 2020

2019
A Minimalist Epistemology for Agent-Based Simulations in the Artificial Sciences.
Minds Mach., 2019

A logic of efficient and optimal designs.
J. Log. Comput., 2019

A Granular Approach to Source Trustworthiness for Negative Trust Assessment.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

2018
Negative trust for conflict resolution in software management.
Web Intell., 2018

The logic of identity and copy for computational artefacts.
J. Log. Comput., 2018

Simulation of a Trust and Reputation Based Mitigation Protocol for a Black Hole Style Attack on VANETs.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018


Swarm Attack: A Self-organized Model to Recover from Malicious Communication Manipulation in a Swarm of Simple Simulated Agents.
Proceedings of the Swarm Intelligence - 11th International Conference, 2018

Multi-agent Based Simulations of Block-Free Distributed Ledgers.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Algorithmic Iteration for Computational Intelligence.
Minds Mach., 2017

Trust and distrust in contradictory information transmission.
Appl. Netw. Sci., 2017

Managing Software Uninstall with Negative Trust.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

A Proof-Theoretic Trust and Reputation Model for VANET.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2016
A Computationally Grounded, Weighted Doxastic Logic.
Stud Logica, 2016

Teaching Functional Patterns through Robotic Applications.
Proceedings of the 4th and 5th International Workshop on Trends in Functional Programming in Education, 2016

From Raw Data to Agent Perceptions for Simulation, Verification, and Monitoring.
Proceedings of the Intelligent Environments 2016, 2016

A Model for Trustworthy Orchestration in the Internet of Things.
Proceedings of the 12th International Conference on Intelligent Environments, 2016

A Calculus for Distrust and Mistrust.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Contradictory information flow in networks with trust and distrust.
Proceedings of the Complex Networks & Their Applications V - Proceedings of the 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016), Milan, Italy, November 30, 2016

Implementing Virtual Pheromones in BDI Robots Using MQTT and Jason (Short Paper).
Proceedings of the 5th IEEE International Conference on Cloud Networking, 2016

2015
On malfunctioning software.
Synth., 2015

A method for trustworthiness assessment based on fidelity in cyber and physical domains.
CoRR, 2015

An approach to early evaluation of informational privacy requirements.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Minimizing transitive trust threats in software management systems.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Towards Cyber-physical Systems as Services: The ASIP Protocol.
Proceedings of the 1st IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2015

Software Theory Change for Resilient Near-Complete Specifications.
Proceedings of the 6th International Conference on Ambient Systems, 2015

A Framework for Trustworthiness Assessment based on Fidelity in Cyber and Physical Domains.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
A Taxonomy of Errors for Information Systems.
Minds Mach., 2014

Modeling Human Behaviour with Higher Order Logic: Insider Threats.
Proceedings of the 2014 Workshop on Socio-Technical Aspects in Security and Trust, 2014

A typed natural deduction calculus to reason about secure trust.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Racket-Based Robot to Teach First-Year Computer Science.
Proceedings of ELS 2014 - 7th European Lisp Symposium, Paris, France, May 5-6, 2014., 2014

Programming the MIRTO Robot with Neurons.
Proceedings of the 5th Annual International Conference on Biologically Inspired Cognitive Architectures, 2014

Model checking degrees of belief in a system of agents.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

2013
J-Calc: A Typed Lambda Calculus for Intuitionistic Justification Logic.
Proceedings of the 6th Workshop on Intuitionistic Modal Logic and Applications, 2013

2012
Type-Theoretical Dynamics.
Proceedings of the Realism-Antirealism Debate in the Age of Alternative Logics, 2012

A modal type theory for formalizing trusted communications.
J. Appl. Log., 2012

2011
Giovanni Sommaruga (ed): Formal Theories of Information: From Shannon to Semantic Information Theory and General Concepts of Information - Lecture Notes in Computer Science, volume 5363, Springer, New York, 2009, vii+269, $ 64.95, ISBN 978-3-642-00658-6.
Minds Mach., 2011

Alleged Assassins: Realist and Constructivist Semantics for Modal Modification.
Proceedings of the Logic, Language, and Computation, 2011

2010
Charles Parsons: Mathematical Thought and its Objects - Cambridge University Press, Cambridge MA, 2008, xx+378, $50.00, ISBN 9780521452793 (hardback).
Minds Mach., 2010

A Multi-Modal Dependent Type Theory for Representing Data Accessibility in a Network.
Proceedings of the International Workshop on Proof Systems for Program Logics, 2010

2009
An epistemic logic for becoming informed.
Synth., 2009

Two Kinds of Procedural Semantics for Privative Modification.
Proceedings of the New Frontiers in Artificial Intelligence, 2009

2008
Information and Knowledge, A Constructive Type-theoretical Approach
Logic, Epistemology, and the Unity of Science 10, Springer, ISBN: 978-1-4020-6170-7, 2008

Majority merging by adaptive counting.
Synth., 2008

Adaptive arbitration by variant counting on commutative bases with weights.
Proceedings of the 11th International Conference on Information Fusion, 2008


  Loading...