Paolo Giorgini

Orcid: 0000-0003-4152-9683

Affiliations:
  • University of Trento, Italy


According to our database1, Paolo Giorgini authored at least 230 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Consent Verification Monitoring.
ACM Trans. Softw. Eng. Methodol., January, 2023

Evaluating Heuristic Search Algorithms in Pathfinding: A Comprehensive Study on Performance Metrics and Domain Parameters.
Proceedings of the Third Workshop on Agents and Robots for reliable Engineered Autonomy, 2023

Implementing BDI Continual Temporal Planning for Robotic Agents.
Proceedings of the IEEE International Conference on Web Intelligence and Intelligent Agent Technology, 2023

Towards Large Language Model Architectures for Knowledge Acquisition and Strategy Synthesis.
Proceedings of the Short Paper Proceedings of the 5th Workshop on Artificial Intelligence and Formal Verification, 2023

2022
Editorial.
Inf. Syst., 2022

A Demonstration of BDI-Based Robotic Systems with ROS2.
Proceedings of the Advances in Practical Applications of Agents, Multi-Agent Systems, and Complex Systems Simulation. The PAAMS Collection, 2022

Developing BDI-Based Robotic Systems with ROS2.
Proceedings of the Advances in Practical Applications of Agents, Multi-Agent Systems, and Complex Systems Simulation. The PAAMS Collection, 2022

Real-Time BDI Agents: A Model and Its Implementation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Supporting the Individuation, Analysis and Gamification of Software Components for Acceptance Requirements Fulfilment.
Proceedings of the Practice of Enterprise Modeling, 2022

2021
A data-driven, goal-oriented framework for process-focused enterprise re-engineering.
Inf. Syst. E Bus. Manag., 2021

COPri v.2 - A core ontology for privacy requirements.
Data Knowl. Eng., 2021

2020
A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study.
Proceedings of the Visual Privacy Management, 2020

The Architecture of VisiOn Privacy Platform.
Proceedings of the Visual Privacy Management, 2020

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach.
Softw. Syst. Model., 2020

An Ontology for Privacy Requirements via a Systematic Literature Review.
J. Data Semant., 2020

COPri - A Core Ontology for Privacy Requirements Engineering.
Proceedings of the Research Challenges in Information Science, 2020

RT-BDI: A Real-Time BDI Model.
Proceedings of the Advances in Practical Applications of Agents, Multi-Agent Systems, and Trustworthiness. The PAAMS Collection, 2020

Applying Acceptance Requirements to Requirements Modeling Tools via Gamification: A Case Study on Privacy and Security.
Proceedings of the Practice of Enterprise Modeling, 2020

In-Time Explainability in Multi-Agent Systems: Challenges, Opportunities, and Roadmap.
Proceedings of the Explainable, Transparent Autonomous Agents and Multi-Agent Systems, 2020

2019
Goal-oriented requirements engineering: an extended systematic mapping study.
Requir. Eng., 2019

Information quality requirements engineering with STS-IQ.
Inf. Softw. Technol., 2019

Towards a Real-Time BDI Model for ROS 2.
Proceedings of the 20th Workshop "From Objects to Agents", 2019

Consent Verification Under Evolving Privacy Policies.
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019

Design Thinking and Acceptance Requirements for Designing Gamified Software.
Proceedings of the 13th International Conference on Research Challenges in Information Science, 2019

2018
Multi-objective reasoning with constrained goal models.
Requir. Eng., 2018

Analysis of information quality requirements in business processes, revisited.
Requir. Eng., 2018

Integrating BPMN- and UML-based Security Engineering via Model Transformation.
Proceedings of the Software Engineering und Software Management 2018, 2018

PACAS: A Gamified Platform for Participatory Change Management in ATM Systems.
Proceedings of the Joint Proceedings of REFSQ-2018 Workshops, 2018

The Next Release Problem Revisited: A New Avenue for Goal Models.
Proceedings of the 26th IEEE International Requirements Engineering Conference, 2018

Modeling and Reasoning About Privacy-Consent Requirements.
Proceedings of the Practice of Enterprise Modeling - 11th IFIP WG 8.1. Working Conference, PoEM 2018, Vienna, Austria, October 31, 2018

From Security-by-Design to the Identification of Security-Critical Deviations in Process Executions.
Proceedings of the Information Systems in the Big Data Era, 2018

2017
Designing secure business processes with SecBPMN.
Softw. Syst. Model., 2017

Modeling and Reasoning on Requirements Evolution with Constrained Goal Models.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

From Secure Business Process Modeling to Design-Level Security Verification.
Proceedings of the 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2017

Toward GDPR-Compliant Socio-Technical Systems: Modeling Language and Reasoning Framework.
Proceedings of the Practice of Enterprise Modeling, 2017

Information Security Risk Management.
Proceedings of the Practice of Enterprise Modeling, 2017

Goal Models for Acceptance Requirements Analysis and Gamification Design.
Proceedings of the Conceptual Modeling - 36th International Conference, 2017

Towards an Ontology for Privacy Requirements via a Systematic Literature Review.
Proceedings of the Conceptual Modeling - 36th International Conference, 2017

A Holistic Approach for Privacy Protection in E-Government.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Multi Object Reasoning with Constrained Goal Model.
CoRR, 2016

Ontologies for Privacy Requirements Engineering: A Systematic Literature Review.
CoRR, 2016

Applying Social Norms to Implicit Negotiation among Non-Player Characters in Serious Games.
Proceedings of the 17th Workshop "From Objects to Agents" co-located with 18th European Agent Systems Summer School (EASSS 2016), 2016

Towards an Integrated Platform for Adaptive Socio-technical Systems for Smart Spaces.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Maintaining Secure Business Processes in Light of Socio-Technical Systems' Evolution.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Acceptance Requirements and Their Gamification Solutions.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Goal-Oriented Requirements Engineering: A Systematic Literature Map.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Multi-objective risk analysis with goal models.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

Solving the next adaptation problem with prometheus.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

Applying social norms to high-fidelity pedestrian and traffic simulations.
Proceedings of the IEEE International Smart Cities Conference, 2016

Requirements Evolution and Evolution Requirements with Constrained Goal Models.
Proceedings of the Conceptual Modeling - 35th International Conference, 2016

Modeling Structured and Unstructured Processes: An Empirical Evaluation.
Proceedings of the Conceptual Modeling - 35th International Conference, 2016

2015
Using Goal Models Downstream: A Systematic Roadmap and Literature Review.
Int. J. Inf. Syst. Model. Des., 2015

Modelling and reasoning about security requirements in socio-technical systems.
Data Knowl. Eng., 2015

A Framework for Information Quality Requirements Engineering.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Modeling and Reasoning About Information Quality Requirements.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015

A goal-based approach for automated specification of Information Quality policies.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015

Social specifications of business processes with Azzurra.
Proceedings of the 9th IEEE International Conference on Research Challenges in Information Science, 2015

Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach.
Proceedings of the Practice of Enterprise Modeling, 2015

STS-Tool 3.0: Maintaining Security in Socio-Technical Systems.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

From Secure Business Process Models to Secure Artifact-Centric Specifications.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2015

Modeling and Analyzing Information Quality Requirements of Socio-technical Systems: Experience Report.
Proceedings of the 1st International Workshop on Socio-Technical Perspective in IS Development (STPIS'15) co-located with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

Dealing with Information Quality Requirements.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2015

Modeling and Reasoning about Information Quality Requirements in Business Processes.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2015

2014
Security Requirements Engineering with STS-Tool.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

The Socio-technical Security Requirements Modelling Language for Secure Composite Services.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

STS-Tool: Security Requirements Engineering for Socio-Technical Systems.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Requirements-driven deployment - Customizing the requirements model for the host environment.
Softw. Syst. Model., 2014

Threat Analysis in Goal-Oriented Security Requirements Modelling.
Int. J. Secur. Softw. Eng., 2014

Protos: Foundations for engineering innovative sociotechnical systems.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Taking goal models downstream: A systematic roadmap.
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014

Exploring alternative designs for sociotechnical systems.
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014

Transforming Socio-Technical Security Requirements in SecBPMN Security Policies.
Proceedings of the Seventh International i* Workshop co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014

Designing Sociotechnical Systems with Protos.
Proceedings of the Seventh International i* Workshop co-located with the 26th International Conference on Advanced Information Systems Engineering (CAiSE 2014), 2014

Modeling and verification of ATM security policies with SecBPMN.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

Preserving Compliance with Security Requirements in Socio-Technical Systems.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

Modeling and Verifying Security Policies in Business Processes.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2014

2013
Adaptive socio-technical systems: a requirements-based approach.
Requir. Eng., 2013

Reasoning with contextual requirements: Detecting inconsistency and conflicts.
Inf. Softw. Technol., 2013

Trust-based specification of sociotechnical systems.
Data Knowl. Eng., 2013

STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements.
Proceedings of the 6th International <i>i*</i> Workshop 2013, 2013

Designing Secure Socio-Technical Systems with STS-ml.
Proceedings of the 6th International <i>i*</i> Workshop 2013, 2013

Analysing Information Integrity Requirements in Safety Critical Systems.
Proceedings of the 6th International <i>i*</i> Workshop 2013, 2013

BarterCell: An Agent-Based Bartering Service for Users of Pocket Computing Devices.
Proceedings of the Industrial Applications of Holonic and Multi-Agent Systems, 2013

Specifying and Reasoning over Socio-Technical Security Requirements with STS-Tool.
Proceedings of the Conceptual Modeling - 32th International Conference, 2013

Managing Security Requirements Conflicts in Socio-Technical Systems.
Proceedings of the Conceptual Modeling - 32th International Conference, 2013

Modeling and Analyzing Information Integrity in Safety Critical Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2013

2012
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study.
Int. J. Secur. Softw. Eng., 2012

Implicit: a multi-agent recommendation system for web search.
Auton. Agents Multi Agent Syst., 2012

Service-driven negotiation for autonomous software agents in robotics-oriented multi-agent systems.
Proceedings of the 12th UK Workshop on Computational Intelligence, 2012

STS-tool: Socio-technical Security Requirements through social commitments.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Aligning Service-Oriented Architectures with Security Requirements.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements.
Proceedings of the Advances in Conceptual Modeling, 2012

A NFR-Based Framework for User-Centered Adaptation.
Proceedings of the Conceptual Modeling, 2012

Modelling Security Requirements in Socio-Technical Systems with STS-Tool.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

Aligning Software Configuration with Business and IT Context.
Proceedings of the Advanced Information Systems Engineering, 2012

Optimizing Monitoring Requirements in Self-adaptive Systems.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2012

2011
Goal-driven risk assessment in requirements engineering.
Requir. Eng., 2011

Security requirements engineering via commitments.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Social Software Product Lines.
Proceedings of the First International Workshop on Requirements Engineering for Social Computing, 2011

Security Requirements Engineering for Service-Oriented Applications.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011

Requirements Engineering for Social Applications.
Proceedings of the 5<sup>th</sup> International <i>i</i>* Workshop 2011, 2011

Sociotechnical Trust: An Architectural Approach.
Proceedings of the Conceptual Modeling - ER 2011, 30th International Conference, 2011

Requirements Evolution: From Assumptions to Reality.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2011

Security Requirements Engineering for Secure Business Processes.
Proceedings of the Workshops on Business Informatics Research, 2011

Goal Modeling and Reasoning in Tropos.
Proceedings of the Social Modeling for Requirements Engineering., 2011

The Tropos Methodology and Software Development Environment.
Proceedings of the Social Modeling for Requirements Engineering., 2011

Social Modeling for Requirements Engineering: An Introduction.
Proceedings of the Social Modeling for Requirements Engineering., 2011

2010
An architectural description language for secure Multi-Agent Systems.
Web Intell. Agent Syst., 2010

A goal-based framework for contextual requirements modeling and analysis.
Requir. Eng., 2010

COMPRO: A Methodological Approach for Business Process Contextualisation.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

The Evolution of Tropos: Contexts, Commitments and Adaptivity.
Proceedings of the 4<sup>th</sup> International <i>i</i>* Workshop, 2010

Business Processes Contextualisation via Context Analysis.
Proceedings of the Conceptual Modeling, 2010

Extending Organizational Modeling with Business Services Concepts: An Overview of the Proposed Architecture.
Proceedings of the Conceptual Modeling, 2010

Adaptation in Open Systems: Giving Interaction Its Rightful Place.
Proceedings of the Conceptual Modeling, 2010

Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments.
Proceedings of the Advanced Information Systems Engineering, 22nd International Conference, 2010

Reasoning about agents and protocols via goals and commitments.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain.
Proceedings of the ARES 2010, 2010

Requirements as Goals and Commitments Too.
Proceedings of the Intentional Perspectives on Information Systems Engineering., 2010

2009
Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems.
Proceedings of the Safety and Security in Multiagent Systems, 2009

Designing socio-technical systems: from stakeholder goals to social networks.
Requir. Eng., 2009

Tax and Revenue Service Scenario for Ontology Matching.
Proceedings of the 4th International Workshop on Ontology Matching (OM-2009) collocated with the 8th International Semantic Web Conference (ISWC-2009) Chantilly, 2009

Towards a Unified Framework for Contextual Variability in Requirements.
Proceedings of the Third International Workshop on Software Product Management, 2009

Simulating BDI-Based Wireless Sensor Networks.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2009

An Architecture for Requirements-Driven Self-reconfiguration.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

Goal-Based Self-Contextualization.
Proceedings of the Forum at the CAiSE 2009 Conference, 2009

A Goal Modeling Framework for Self-contextualizable Software.
Proceedings of the Enterprise, 2009

Software self-reconfiguration: a BDI-based approach.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
An evaluation of business solutions in manufacturing enterprises.
Int. J. Bus. Intell. Data Min., 2008

GRAnD: A goal-oriented approach to requirement analysis in data warehouses.
Decis. Support Syst., 2008

Applying Tropos to Socio-Technical System Design and Runtime Configuration.
Proceedings of the 9th Workshop "From Objects to Agents", Palermo, Italy, July 17-18, 2008, 2008

Tropos at the Age of Eight: On-going Research at FBK, UniTN and UT.
Proceedings of the 3rd International i* Workshop, Recife, Brazil, February 11-12, 2008, 2008

A Service-oriented Approach for the i* Framework.
Proceedings of the 3rd International i* Workshop, Recife, Brazil, February 11-12, 2008, 2008

Modeling and Analyzing Variability for Mobile Information Systems.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Location-Based Software Modeling and Analysis: Tropos-Based Approach.
Proceedings of the Conceptual Modeling, 2008

Balancing Business Perspectives in Requirements Analysis.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2008

Balanced Goalcards - Combining Goal Analysis and Balanced Scorecards.
Proceedings of the ENASE 2008, 2008

Location-Based Variability for Mobile Information Systems.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

Analyzing Business Continuity through a Multi-layers Model.
Proceedings of the Business Process Management, 6th International Conference, 2008

2007
Improving Web Service Discovery with Usage Data.
IEEE Softw., 2007

Security Attack Testing (SAT) - testing the security of information systems at design time.
Inf. Syst., 2007

Secure Tropos: a Security-Oriented Extension of the Tropos Methodology.
Int. J. Softw. Eng. Knowl. Eng., 2007

IC-service: a service-oriented approach to the development of recommendation systems.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Secure and Dependable Patterns in Organizations: An Empirical Approach.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Supporting Requirements Analysis in Tropos: A Planning-Based Approach.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

Method Construction by Goal Analysis.
Proceedings of the Information Systems Development, 2007

Reasoning About Risk in Agent's Deliberation Process: A Jadex Implementation.
Proceedings of the Agent-Oriented Software Engineering VIII, 8th International Workshop, 2007

From Trust to Dependability through Risk Analysis.
Proceedings of the The Second International Conference on Availability, 2007

2006
Self-Configuring Socio-Technical Systems: Redesign at Runtime.
Int. Trans. Syst. Sci. Appl., 2006

Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns.
Int. J. Softw. Eng. Knowl. Eng., 2006

Requirements engineering for trust management: model, methodology, and reasoning.
Int. J. Inf. Sec., 2006

Multi-Agent Architectures as Organizational Structures.
Auton. Agents Multi Agent Syst., 2006

Preface.
Auton. Agents Multi Agent Syst., 2006

Smart Ride Seeker Introductory Plan.
Proceedings of the STAIRS 2006, 2006

Reasoning About Willingness in Networks of Agents.
Proceedings of the Software Engineering for Multi-Agent Systems V, 2006

Detecting Conflicts of Interest.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Designing Cooperative IS: Exploring and Evaluating Alternatives.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Modelling Risk and Identifying Countermeasure in Organizations.
Proceedings of the Critical Information Infrastructures Security, 2006

A multi-agent system that facilitates scientific publications search.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Using Risk Analysis to Evaluate Design Alternatives.
Proceedings of the Agent-Oriented Software Engineering VII, 7th International Workshop, 2006

From Early to Late Requirements: A Goal-Based Approach.
Proceedings of the Agent-Oriented Information Systems IV, 2006

ToothAgent: A Multi-agent System for Virtual Communities Support.
Proceedings of the Agent-Oriented Information Systems IV, 2006

2005
Software engineering for large-scale multi-agent systems - SELMAS'05.
ACM SIGSOFT Softw. Eng. Notes, 2005

Software Engineering for Large-Scale Multi-Agent Systems - SELMAS 2005: workshop report.
ACM SIGSOFT Softw. Eng. Notes, 2005

When security meets software engineering: a case of modelling secure information systems.
Inf. Syst., 2005

The Tropos Metamodel and its Use.
Informatica (Slovenia), 2005

Goal-oriented requirements analysis and reasoning in the Tropos methodology.
Eng. Appl. Artif. Intell., 2005

An Implemented Prototype of Bluetooth-based Multi-Agent System.
Proceedings of the WOA 2005: Dagli Oggetti agli Agenti. 6th AI*IA/TABOO Joint Workshop "From Objects to Agents": Simulation and Formal Analysis of Complex Systems, 2005

ST-Tool: A CASE Tool for Security Requirements Engineering.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Modeling Security Requirements Through Ownership, Permission and Delegation.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Modeling Social and Individual Trust in Requirements Engineering Methodologies.
Proceedings of the Trust Management, Third International Conference, 2005

ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements.
Proceedings of the Trust Management, Third International Conference, 2005

Delegation Mechanisms for Agent Architectural Design.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Security and Trust Requirements Engineering.
Proceedings of the Foundations of Security Analysis and Design III, 2005

Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems.
Proceedings of the Conceptual Modeling, 2005

Goal-oriented requirement analysis for data warehouse design.
Proceedings of the DOLAP 2005, 2005

A secure architectural description language for agent systems.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

<i>Implicit</i>: an agent-based recommendation system for web search.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Agent-oriented methodologies.
Information Science Reference, ISBN: 978-1-59140-586-3, 2005

2004
Tropos: An Agent-Oriented Software Development Methodology.
Auton. Agents Multi Agent Syst., 2004

Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning.
Proceedings of the Trust Management, Second International Conference, 2004

Using Security Attack Scenarios to Analyse Security During Information Systems Design.
Proceedings of the ICEIS 2004, 2004

Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.
Proceedings of the Public Key Infrastructure, 2004

From actions to affordances: supporting the work of biologists through laboratory notebooks.
Proceedings of the Cooperative Systems Design, 2004

Simple and Minimum-Cost Satisfiability for Goal Models.
Proceedings of the Advanced Information Systems Engineering, 16th International Conference, 2004

2003
Agent-Oriented software engineering report on the 4<sup>th</sup> AOSE workshop (AOSE 2003).
SIGMOD Rec., 2003

Formal Reasoning Techniques for Goal Models.
J. Data Semant., 2003

Distributed Belief Revision.
Auton. Agents Multi Agent Syst., 2003

A Multi-agent System for Knowledge Management based on the Implicit Culture Framework.
Proceedings of the WM 2003: Professionelles Wissensmanagement, 2003

Evaluating the Potential for Integrating the OPEN and Tropos Metamodels.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Multi-agent Systems and Security Requirements Analysis.
Proceedings of the Software Engineering for Multi-Agent Systems II, 2003

An Ontology for Modelling Security: The Tropos Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Analysing Security Requirements of Information Systems Using Tropos.
Proceedings of the ICEIS 2003, 2003

A Set of Patterns for Secure Agent Systems.
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003

Supporting Tropos Concepts in Agent OPEN.
Proceedings of the Engineering Societies in the Agents World IV, 2003

Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard.
Proceedings of the Conceptual Modeling, 2003

Preface to AOIS 2003.
Proceedings of the Conceptual Modeling for Novel Application Domains, 2003

Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems.
Proceedings of the Advanced Information Systems Engineering, 15th International Conference, 2003

Organizational Patterns for Early Requirements Analysis.
Proceedings of the Advanced Information Systems Engineering, 15th International Conference, 2003

Modelling secure multiagent systems.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Implicit Culture-Based Personal Agents for Knowledge Management.
Proceedings of the Agent Mediated Knowledge Management, 2003

Implicit Culture for Information Agents.
Proceedings of the Intelligent Information Agents - The AgentLink Perspective, 2003

2002
Mental States Recognition from Communication.
J. Log. Comput., 2002

Applying Tropos Methodology to a real case study: Complexity and Criticality Analysis.
Proceedings of the WOA 2002: Dagli Oggetti agli Agenti. 3rd AI*IA/TABOO Joint Workshop "From Objects to Agents": From Information to Knowledge, 2002

Agent-Oriented Software Development.
Proceedings of the Methods and Applications of Artificial Intelligence, 2002

Information systems development through social structures.
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002

Reasoning with Goal Models.
Proceedings of the Conceptual Modeling, 2002

Organizational multi-agent architectures: a mobile robot example.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002

Multi-agent and Software Architectures: A Comparative Case Study.
Proceedings of the Agent-Oriented Software Engineering III, Third International Workshop, 2002

Using Tropos Methodology to Model an Integrated Health Assessment System.
Proceedings of the AOIS '02, 2002

Socio-Intentional Architectures for Multi-Agent Systems: the Mobile Robot Control case.
Proceedings of the AOIS '02, 2002

2001
Towards an Agent Oriented Approach to Software Engineering.
Proceedings of the WOA 2001: Dagli Oggetti agli Agenti. 2nd AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2001

Agent- Oriented Software Development: A Case Study.
Proceedings of the Thirteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2001), 2001

Information systems as social structures.
Proceedings of the 2nd International Conference on Formal Ontology in Information Systems, 2001

Implicit Culture for Multi-agent Interaction Support.
Proceedings of the Cooperative Information Systems, 9th International Conference, 2001

Information Access in Implicit Culture Framework.
Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management, 2001

A Goal-Based Organizational Perspective on Multi-agent Architectures.
Proceedings of the Intelligent Agents VIII, 8th International Workshop, 2001

Modeling Early Requirements in Tropos: A Transformation Based Approach.
Proceedings of the Agent-Oriented Software Engineering II, Second International Workshop, 2001

A knowledge level software engineering methodology for agent oriented programming.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

2000
From Entities and Relationships to Social Actors and Dependencies.
Proceedings of the Conceptual Modeling, 2000

Updating Mental States from Communication.
Proceedings of the Intelligent Agents VII. Agent Theories Architectures and Languages, 2000

Updating mental states from informative communication.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

1998
Sensor Data Validation for Nuclear Power Plants through Bayesian Conditioning and Dempster's Rule of Combination.
Comput. Artif. Intell., 1998

A Self-Diagnosing Distributed Monitoring System for Nuclear Power Plants.
Proceedings of the Methodology and Tools in Knowledge-Based Systems, 1998

1997
Distributed Belief Revision vs. Belief Revision in a Multi-Agent Environment: First Results of a Simulation Experiment.
Proceedings of the Multi-Agent Rationality, 1997

Distributed Knowledge Revision/Integration.
Proceedings of the Sixth International Conference on Information and Knowledge Management (CIKM'97), 1997

1996
Learning Agents' Reliability Through Bayesian Conditioning: A Simulation Experiment.
Proceedings of the Distributed Artificial Intelligence Meets Machine Learning, 1996

Belief Revision Through the Belief-Function Formalism in a Multi-Agent Environment.
Proceedings of the Intelligent Agents III, 1996


  Loading...