Luca Martini

Orcid: 0000-0002-0634-7203

According to our database1, Luca Martini authored at least 46 papers between 2003 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
MPLS Label Switched Path (LSP) Pseudowire (PW) Status Refresh Reduction for Static PWs.
RFC, October, 2017

Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP).
RFC, February, 2017

A Framework for Visual Search in Broadcast archives.
Proceedings of the 8th Italian Information Retrieval Workshop, 2017

2015
Using a Generic Associated Channel Label as a Virtual Circuit Connectivity Verification Channel Indicator.
RFC, November, 2015

Thermal control system based on thin film heaters and amorphous silicon diodes.
Proceedings of the 6th International Workshop on Advances in Sensors and Interfaces, 2015

2014
Explicit Path Routing for Dynamic Multi-Segment Pseudowires.
RFC, December, 2014

Label Advertisement Discipline for LDP Forwarding Equivalence Classes (FECs).
RFC, October, 2014

Inter-Chassis Communication Protocol for Layer 2 Virtual Private Network (L2VPN) Provider Edge (PE) Redundancy.
RFC, June, 2014

Dynamic Placement of Multi-Segment Pseudowires.
RFC, June, 2014

2013
LDP Downstream-on-Demand in Seamless MPLS.
RFC, October, 2013

2012
Packet Pseudowire Encapsulation over an MPLS PSN.
RFC, July, 2012

Pseudowire Status for Static Pseudowires.
RFC, May, 2012

Efficient Genotype Elimination via Adaptive Allele Consolidation.
IEEE ACM Trans. Comput. Biol. Bioinform., 2012

2011
Using the Generic Associated Channel Label for Pseudowire in the MPLS Transport Profile (MPLS-TP).
RFC, November, 2011

Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping.
RFC, July, 2011

Segmented Pseudowire.
RFC, January, 2011

2010
Checking Secure Information Flow in Programs.
PhD thesis, 2010

Using abstract interpretation to add type checking for interfaces in Java bytecode verification.
Theor. Comput. Sci., 2010

Partial model checking via abstract interpretation.
Inf. Process. Lett., 2010

Celer: an Efficient Program for Genotype Elimination
Proceedings of the Proceedings First Workshop on Applications of Membrane computing, 2010

2008
Requirements for Multi-Segment Pseudowire Emulation Edge-to-Edge (PWE3).
RFC, October, 2008

Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) Circuit Emulation Service over MPLS (CEM) Encapsulation.
RFC, February, 2008

Decomposing bytecode verification by abstract interpretation.
ACM Trans. Program. Lang. Syst., 2008

2007
Attachment Individual Identifier (AII) Types for Aggregation.
RFC, September, 2007

Transport of Layer 2 Frames Over MPLS.
RFC, June, 2007

Encapsulation Methods for Transport of Layer 2 Frames over MPLS Networks.
RFC, June, 2007

Wildcard Pseudowire Type.
RFC, May, 2007

Pseudowire Emulation Edge-to-Edge (PWE3) Asynchronous Transfer Mode (ATM) Transparent Cell Transport Service.
RFC, February, 2007

Instruction-level security typing by abstract interpretation.
Int. J. Inf. Sec., 2007

Instruction-level security analysis for information flow in stack-based assembly languages.
Inf. Comput., 2007

2006
Encapsulation Methods for Transport of Asynchronous Transfer Mode (ATM) over MPLS Networks.
RFC, December, 2006

Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs).
RFC, November, 2006

Encapsulation Methods for Transport of Frame Relay over Multiprotocol Label Switching (MPLS) Networks.
RFC, September, 2006

Encapsulation Methods for Transport of PPP/High-Level Data Link Control (HDLC) over MPLS Networks.
RFC, September, 2006

Encapsulation Methods for Transport of Ethernet over MPLS Networks.
RFC, April, 2006

Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP).
RFC, April, 2006

IANA Allocations for Pseudowire Edge to Edge Emulation (PWE3).
RFC, April, 2006

Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for Use over an MPLS PSN.
RFC, February, 2006

Using postdomination to reduce space requirements of data flow analysis.
Inf. Process. Lett., 2006

Using Control Dependencies for Space-Aware Bytecode Verification.
Comput. J., 2006

2005
A Space-Aware Bytecode Verifier for Java Cards.
Proceedings of the First Workshop on Bytecode Semantics, 2005

Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

2004
Checking secure information flow in Java bytecode by code transformation and standard bytecode verification.
Softw. Pract. Exp., 2004

Java bytecode verification with dynamic structures.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

Enforcement of applet boundaries in Java card systems.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

2003
Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs: Extended Abstract.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003


  Loading...