Roberto Zunino

According to our database1, Roberto Zunino authored at least 55 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient formulation of the rejection-based algorithm for biochemical reactions with delays.
IJBRA, 2019

Developing secure bitcoin contracts with BitML.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Verifying Liquidity of Bitcoin Contracts.
Proceedings of the Principles of Security and Trust - 8th International Conference, 2019

2018
SoK: Unraveling Bitcoin Smart Contracts.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

Fun with Bitcoin Smart Contracts.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018

BitML: A Calculus for Bitcoin Smart Contracts.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Constant-Time Complexity Algorithm for Stochastic Simulation of Large Reaction Networks.
IEEE/ACM Trans. Comput. Biology Bioinform., 2017

Verifiable abstractions for contract-oriented systems.
J. Log. Algebr. Meth. Program., 2017

A formal model of Bitcoin transactions.
IACR Cryptology ePrint Archive, 2017

Constant-Deposit Multiparty Lotteries on Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Contracts as games on event structures.
J. Log. Algebr. Meth. Program., 2016

Honesty by Typing
Logical Methods in Computer Science, 2016

2015
Choreographies in the wild.
Sci. Comput. Program., 2015

Vicious circles in contracts and in logic.
Sci. Comput. Program., 2015

On the Decidability of Honesty and of Its Variants.
Proceedings of the Web Services, Formal Methods, and Behavioral Types, 2015

Models of Circular Causality.
Proceedings of the Distributed Computing and Internet Technology, 2015

ℓ: An Imperative DSL to Stochastically Simulate Biological Systems.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Debits and Credits in Petri Nets and Linear Logic.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

Compliance in Behavioural Contracts: A Brief Survey.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Adaptive tree-based search for stochastic simulation algorithm.
I. J. Computational Biology and Drug Design, 2014

Circular Causality in Event Structures.
Fundam. Inform., 2014

Modelling and Verifying Contract-Oriented Systems in Maude.
Proceedings of the Rewriting Logic and Its Applications - 10th International Workshop, 2014

A Semantic Deconstruction of Session Types.
Proceedings of the CONCUR 2014 - Concurrency Theory - 25th International Conference, 2014

2013
Contract agreements via logic.
Proceedings of the Proceedings 6th Interaction and Concurrency Experience, 2013

Splitting for rare event simulation in biochemical systems.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

A Theory of Agreements and Protection.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Honesty by Typing.
Proceedings of the Formal Techniques for Distributed Systems, 2013

2012
On computation and synchronization costs in spatial distributed simulation.
J. Simulation, 2012

Contract-Oriented Computing in CO2.
Sci. Ann. Comp. Sci., 2012

An event-based model for contracts
Proceedings of the Proceedings Fifth Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, 2012

A Rule-Based and Imperative Language for Biochemical Modeling and Simulation.
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012

Tree-based search for stochastic simulation algorithm.
Proceedings of the ACM Symposium on Applied Computing, 2012

An imperative language of self-modifying graphs for biological systems.
Proceedings of the ACM Symposium on Applied Computing, 2012

On the Realizability of Contracts in Dishonest Systems.
Proceedings of the Coordination Models and Languages - 14th International Conference, 2012

2011
Contracts in distributed systems
Proceedings of the Proceedings Fourth Interaction and Concurrency Experience, 2011

Trading Computation Time for Synchronization Time in Spatial Distributed Simulation.
Proceedings of the 25th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2011

Call-by-Contract for Service Discovery, Orchestration and Recovery.
Proceedings of the Rigorous Software Engineering for Service-Oriented Systems, 2011

Tools and Verification.
Proceedings of the Rigorous Software Engineering for Service-Oriented Systems, 2011

2010
Primitives for Contract-based Synchronization
Proceedings of the Proceedings Third Interaction and Concurrency Experience: Guaranteed Interaction, 2010

Static Enforcement of Service Deadlines.
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010

A Calculus of Contracting Processes.
Proceedings of the 25th Annual IEEE Symposium on Logic in Computer Science, 2010

2009
Local policies for resource usage analysis.
ACM Trans. Program. Lang. Syst., 2009

Securing Java with Local Policies.
Journal of Object Technology, 2009

Hard Life with Weak Binders.
Electr. Notes Theor. Comput. Sci., 2009

Jalapa: Securing Java with Local Policies: Tool Demonstration.
Electr. Notes Theor. Comput. Sci., 2009

A Logic for Contracts.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009

nu-Types for Effects and Freshness Analysis.
Proceedings of the Theoretical Aspects of Computing, 2009

2008
Semantics-Based Design for Secure Web Services.
IEEE Trans. Software Eng., 2008

Model Checking Usage Policies.
Proceedings of the Trustworthy Global Computing, 4th International Symposium, 2008

2007
Types and Effects for Resource Usage Analysis.
Proceedings of the Foundations of Software Science and Computational Structures, 2007

Secure Service Orchestration.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

2006
Handling exp, × (and Timestamps) in Protocol Analysis.
Proceedings of the Foundations of Software Science and Computation Structures, 2006

2005
Weakening the perfect encryption assumption in Dolev-Yao adversaries.
Theor. Comput. Sci., 2005

2004
Control Flow Analysis for the Applied Pi-calculus.
Electr. Notes Theor. Comput. Sci., 2004

A Note on the Perfect Encryption Assumption in a Process Calculus.
Proceedings of the Foundations of Software Science and Computation Structures, 2004


  Loading...