Stefano Bistarelli

According to our database1, Stefano Bistarelli authored at least 220 papers between 1995 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Labelling Semantics and Strong Admissibility for Weighted Argumentation Frameworks.
J. Log. Comput., 2022

Timed Concurrent Language for Argumentation: An Interleaving Approach.
Proceedings of the Practical Aspects of Declarative Languages, 2022

A Definition of Sceptical Semantics in the Constellations Approach.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2022

Olive Oil as Case Study for the *-Chain Platform.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

On Identifying Repeated Patterns of OT Attacks with LOGistICS.
Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), 2022

An E-Voting System Based on Tornado Cash.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2022

An Argumentative Explanation of Machine Learning Outcomes.
Proceedings of the Computational Models of Argument, 2022

A Four-State Labelling Semantics for Weighted Argumentation Frameworks.
Proceedings of the 37th Italian Conference on Computational Logic, Bologna, Italy, June 29, 2022

Blockchain and IoT Integration for Pollutant Emission Control.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
ConArgLib: an argumentation library with support to search strategies and parallel search.
J. Exp. Theor. Artif. Intell., 2021

Kruskal with embedded C-semirings to solve MST problems with partially-ordered costs.
Inf. Process. Lett., 2021

Weighted Argumentation.
FLAP, 2021

Summary Report for the Third International Competition On Computational Models of Argumentation.
AI Mag., 2021

Highlighting poor anonymity and security practice in the blockchain of Bitcoin.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Introducing a Tool for Concurrent Argumentation.
Proceedings of the Logics in Artificial Intelligence - 17th European Conference, 2021

A Unifying Four-State Labelling Semantics for Bridging Abstract Argumentation Frameworks and Belief Revision.
Proceedings of the 22nd Italian Conference on Theoretical Computer Science, 2021

Extending Labelling Semantics to Weighted Argumentation Frameworks.
Proceedings of the Thirty-Fourth International Florida Artificial Intelligence Research Society Conference, 2021

Towards a Graphical DSL for Tracing Supply Chains on Blockchain.
Proceedings of the Euro-Par 2021: Parallel Processing Workshops, 2021

Timed Concurrent Language for Argumentation.
Proceedings of the 36th Italian Conference on Computational Logic, 2021

*.chain: automatic coding of smart contracts and user interfaces for supply chains.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

A Chatbot Extended with Argumentation.
Proceedings of the 5th Workshop on Advances in Argumentation in Artificial Intelligence 2021 co-located with the 20th International Conference of the Italian Association for Artificial Intelligence (AIxIA 2021), 2021

Concurrent Argumentation with Time: an Overview.
Proceedings of the 5th Workshop on Advances in Argumentation in Artificial Intelligence 2021 co-located with the 20th International Conference of the Italian Association for Artificial Intelligence (AIxIA 2021), 2021

A Medium-Interaction Emulation and Monitoring System for Operational Technology.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Ethereum smart contracts: Analysis and statistics of their source code and opcodes.
Internet Things, 2020

Probabilistic abstract argumentation frameworks, a possible world view.
Int. J. Approx. Reason., 2020

Abstract argumentation and (optimal) stable marriage problems.
Argument Comput., 2020

Energy allocation and payment: a game-theoretic approach.
Ann. Math. Artif. Intell., 2020

A Report on the Security of Home Connections with IoT and Docker Honeypots.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020

Ranking-Based Semantics from the Perspective of Claims.
Proceedings of the Computational Models of Argument, 2020

A Labelling Semantics for Weighted Argumentation Frameworks.
Proceedings of the 35th Italian Conference on Computational Logic, 2020

A Concurrent Language for Argumentation: Preliminary Notes.
Proceedings of the Recent Developments in the Design and Implementation of Programming Languages, 2020

Towards an Implementation of a Concurrent Language for Argumentation.
Proceedings of the AIxIA 2020 - Advances in Artificial Intelligence, 2020

A Concurrent Language for Argumentation.
Proceedings of the Workshop on Advances In Argumentation In Artificial Intelligence 2020 co-located with the 19th International Conference of the Italian Association for Artificial Intelligence (AIxIA 2020), 2020

A First Overview of ICCMA'19.
Proceedings of the Workshop on Advances In Argumentation In Artificial Intelligence 2020 co-located with the 19th International Conference of the Italian Association for Artificial Intelligence (AIxIA 2020), 2020

A Short Introduction to Collective Defense in Weighted Abstract Argumentation Problems.
Proceedings of the Decision Making under Constraints, 2020

2019
Preface to the Special Issue on Advances in Argumentation in Artificial Intelligence.
Intelligenza Artificiale, 2019

Power index-based semantics for ranking arguments in abstract argumentation frameworks.
Intelligenza Artificiale, 2019

End-to-End Voting with Non-Permissioned and Permissioned Ledgers.
J. Grid Comput., 2019

Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017.
Fundam. Informaticae, 2019

An Analysis of Non-standard Transactions.
Frontiers Blockchain, 2019

Implementing Ranking-Based Semantics in ConArg: a Preliminary Report.
CoRR, 2019

Block Argumentation.
Proceedings of the PRIMA 2019: Principles and Practice of Multi-Agent Systems, 2019

A Possible World View and a Normal Form for the Constellation Semantics.
Proceedings of the Logics in Artificial Intelligence - 16th European Conference, 2019

Well-Foundedness in Weighted Argumentation Frameworks.
Proceedings of the Logics in Artificial Intelligence - 16th European Conference, 2019

Studying forward looking bubbles in Bitcoin/USD exchange rates.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Implementing Ranking-Based Semantics in ConArg.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

CapBAC in Hyperledger Sawtooth.
Proceedings of the Distributed Applications and Interoperable Systems, 2019

A Tool For Ranking Arguments Through Voting-Games Power Indexes.
Proceedings of the 34th Italian Conference on Computational Logic, 2019

Analysis of Ethereum Smart Contracts and Opcodes.
Proceedings of the Advanced Information Networking and Applications, 2019

Preliminary Study on Reinstatement Labelling for Weighted Argumentation Frameworks.
Proceedings of the 3rd Workshop on Advances In Argumentation In Artificial Intelligence co-located with the 18th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2019), 2019

An Introduction to Optimal Stable Marriage Problems and Argumentation Frameworks.
Proceedings of the 3rd Workshop on Advances In Argumentation In Artificial Intelligence co-located with the 18th International Conference of the Italian Association for Artificial Intelligence (AI*IA 2019), 2019

2018
Not only size, but also shape counts: abstract argumentation solvers are benchmark-sensitive.
J. Log. Comput., 2018

23rd RCRA International workshop on "Experimental evaluation of algorithms for solving problems with combinatorial explosion".
J. Exp. Theor. Artif. Intell., 2018

A novel weighted defence and its relaxation in abstract argumentation.
Int. J. Approx. Reason., 2018

Architecting the Web of Things for the fog computing era.
IET Softw., 2018

Special Issue: Selected Papers from AI<sup>∧</sup>3 2017, the 1st Workshop on Advances in Argumentation in Artificial Intelligence.
Intelligenza Artificiale, 2018

A Preliminary Report on Probabilistic Attack Normal Form for Constellation Semantics.
CoRR, 2018

A Matrix Approach for Weighted Argumentation Frameworks: a Preliminary Report.
CoRR, 2018

On Looking for Local Expansion Invariants in Argumentation Semantics.
CoRR, 2018

Some Thoughts On Well-Foundedness in Weighted Abstract Argumentation.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Sixteenth International Conference, 2018

Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later.
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018

A Fair Payment Scheme for Virtuous Community Energy Usage.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2018

Preliminary Results on the Modeling of System Level Diagnosis Problems with Abstract Argumentation.
Proceedings of the 19th Italian Conference on Theoretical Computer Science, 2018

Probabilistic Argumentation Frameworks with MetaProbLog and ConArg.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper).
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2018

A Matrix Approach for Weighted Argumentation Frameworks.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

On Looking for Invariant Operators in Argumentation Semantics.
Proceedings of the Thirty-First International Florida Artificial Intelligence Research Society Conference, 2018

A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

An Analysis of Non-standard Bitcoin Transactions.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018

Containerisation and Dynamic Frameworks in ICCMA'19.
Proceedings of the Second International Workshop on Systems and Algorithms for Formal Argumentation (SAFA 2018) co-located with the 7th International Conference on Computational Models of Argument (COMMA 2018), 2018

Studying Dynamics in Argumentation with Rob.
Proceedings of the Computational Models of Argument, 2018

Defence Outsourcing in Argumentation.
Proceedings of the Computational Models of Argument, 2018

Local Expansion Invariant Operators in Argumentation Semantics.
Proceedings of the Dynamics, 2018

Using MetaProbLog and ConArg to compute Probabilistic Argumentation Frameworks.
Proceedings of the 2nd Workshop on Advances In Argumentation In Artificial Intelligence, 2018

A Cooperative-game Approach to Share Acceptability and Rank Arguments.
Proceedings of the 2nd Workshop on Advances In Argumentation In Artificial Intelligence, 2018

2017
On merging two trust-networks in one with bipolar preferences.
Math. Struct. Comput. Sci., 2017

From Argumentation Frameworks to Voting Systems and Back.
Fundam. Informaticae, 2017

An end-to-end voting-system based on bitcoin.
Proceedings of the Symposium on Applied Computing, 2017

A Hasse Diagram for Weighted Sceptical Semantics with a Unique-Status Grounded Semantics.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2017

A Quantitative Partial Model-Checking Function and Its Optimisation.
Proceedings of the LPAR-21, 2017

PrOnto: an Ontology Driven Business Process Mining Tool.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

A ConArg-Based Library for Abstract Argumentation.
Proceedings of the 29th IEEE International Conference on Tools with Artificial Intelligence, 2017

Go with the -Bitcoin- Flow, with Visual Analytics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Theoretical Computer Science in Italy.
Theor. Comput. Sci., 2016

Preface.
Fundam. Informaticae, 2016

Mechanism Design Approach for Energy Efficiency.
CoRR, 2016

Automated adaptation via quantitative partial model checking.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A Relaxation of Internal Conflict and Defence in Weighted Argumentation Frameworks.
Proceedings of the Logics in Artificial Intelligence - 15th European Conference, 2016

A Mechanism Design Approach for Allocation of Commodities.
Proceedings of the 17th Italian Conference on Theoretical Computer Science, 2016

A Collective Defence Against Grouped Attacks for Weighted Abstract Argumentation Frameworks.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016

ConArg: A Tool for Classical and Weighted Argumentation.
Proceedings of the Computational Models of Argument, 2016

2015
Timed soft concurrent constraint programs: An interleaved and a parallel approach.
Theory Pract. Log. Program., 2015

A Comparative Test on the Enumeration of Extensions in Abstract Argumentation.
Fundam. Informaticae, 2015

Towards visualising security with arguments.
Proceedings of the 30th Italian Conference on Computational Logic, 2015

Testing Credulous and Sceptical Acceptance in Small-World Networks.
Proceedings of the 22nd RCRA International Workshop on Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion 2015 (RCRA 2015) A workshop of the XIV International Conference of the Italian Association for Artificial Intelligence (AI*IA 2015), 2015

2014
A Secure Non-monotonic Soft Concurrent Constraint Language.
Fundam. Informaticae, 2014

Two trust networks in one: Using bipolar structures to fuse trust and distrust.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Preface.
Proceedings of the 15th Italian Conference on Theoretical Computer Science, 2014

Abstract argumentation frameworks to promote fairness and rationality in multi-experts multi-criteria decision making.
Proceedings of the 15th Italian Conference on Theoretical Computer Science, 2014

Efficient Solution for Credulous/Sceptical Acceptance in Lower-Order Dung's Semantics.
Proceedings of the 26th IEEE International Conference on Tools with Artificial Intelligence, 2014

A First Comparison of Abstract Argumentation Reasoning-Tools.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

Benchmarking Hard Problems in Random Abstract AFs: The Stable Semantics.
Proceedings of the Computational Models of Argument, 2014

Enumerating Extensions on Random Abstract-AFs with ArgTools, Aspartix, ConArg2, and Dung-O-Matic.
Proceedings of the Computational Logic in Multi-Agent Systems, 2014

On Relating Voting Systems and Argumentation Frameworks.
Proceedings of the 29th Italian Conference on Computational Logic, 2014

An Improved Role-Based Access to Android Applications with JCHR.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Coalitions of Arguments: An Approach with Constraint Programming.
Fundam. Informaticae, 2013

Interchangeability with thresholds and degradation factors for Soft CSPs.
Ann. Math. Artif. Intell., 2013

A First Comparison of Abstract Argumentation Systems: A Computational Perspective.
Proceedings of the 28th Italian Conference on Computational Logic, 2013

2012
Evaluation of complex security scenarios using defense trees and economic indexes.
J. Exp. Theor. Artif. Intell., 2012

Local arc consistency for non-invertible semirings, with an application to multi-objective optimization.
Expert Syst. Appl., 2012

ConArg: a Tool to Solve (Weighted) Abstract Argumentation Frameworks with (Soft) Constraints
CoRR, 2012

A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials.
Comput. Math. Appl., 2012

Towards a similarity-based web service discovery through soft constraint satisfaction problems.
Proceedings of the 2nd International Workshop on Semantic Search over the Web, 2012

Securely Accessing Shared Resources with Concurrent Constraint Programming.
Proceedings of the Software Engineering and Formal Methods - 10th International Conference, 2012

A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming.
Proceedings of the ACM Symposium on Applied Computing, 2012

Solving Fuzzy Distributed CSPs: An Approach with Naming Games.
Proceedings of the Declarative Agent Languages and Technologies X, 2012

Semiring-based constraint models and frameworks for security-related scenarios.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

ConArg: Argumentation with Constraints.
Proceedings of the First International Conference on Agreement Technologies, 2012

2011
Uncertainty in bipolar preference problems.
J. Exp. Theor. Artif. Intell., 2011

A Nonmonotonic Soft Concurrent Constraint Language to Model the Negotiation Process.
Fundam. Informaticae, 2011

Modeling and Solving AFs with a Constraint-Based Tool: ConArg.
Proceedings of the Theorie and Applications of Formal Argumentation, 2011

Finding partitions of arguments with Dung's properties via SCSPs.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

ConArg: A Constraint-Based Computational Framework for Argumentation Systems.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

Solving Fuzzy DCSPs with Naming Games.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

2010
Unicast and multicast QoS routing with soft-constraint logic programming.
ACM Trans. Comput. Log., 2010

Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria.
Secur. Commun. Networks, 2010

From soft constraints to bipolar preferences: modelling framework and solving issues.
J. Exp. Theor. Artif. Intell., 2010

Solving Distributed CSPs Probabilistically.
Fundam. Informaticae, 2010

Extending Soft Arc Consistency Algorithms to Non-invertible Semirings.
Proceedings of the Advances in Artificial Intelligence, 2010

A Common Computational Framework for Semiring-based Argumentation Systems.
Proceedings of the ECAI 2010, 2010

Solving Weighted Argumentation Frameworks with Soft Constraints.
Proceedings of the 25th Italian Conference on Computational Logic, 2010

A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Solving finite domain constraint hierarchies by local consistency and tree search.
J. Exp. Theor. Artif. Intell., 2009

A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation.
Electron. Notes Theor. Comput. Sci., 2009

Soft Constraints for Quality Aspects in Service Oriented Architectures
Proceedings of the Proceedings Fourth European Young Researchers Workshop on Service Oriented Computing, 2009

Fairness as a QoS Measure for Web Services
Proceedings of the Proceedings Fourth European Young Researchers Workshop on Service Oriented Computing, 2009

Capturing Fair Computations on Concurrent Constraint Language.
Proceedings of the Logic Programming, 25th International Conference, 2009

Constraint Based Languages for Biological Reactions.
Proceedings of the Logic Programming, 25th International Conference, 2009

2008
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming.
Electron. Notes Theor. Comput. Sci., 2008

C-semiring Frameworks for Minimum Spanning Tree Problems.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2008

Security Protocol Deployment Risk.
Proceedings of the Security Protocols XVI, 2008

Propagating multitrust within trust networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Soft Constraints for Dependable Service Oriented Architectures.
Proceedings of the Architecting Dependable Systems VI, 2008

A Formal and Practical Framework for Constraint-Based Routing.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

A Soft Approach to Multi-objective Optimization.
Proceedings of the Logic Programming, 24th International Conference, 2008

Solving CSPs with Naming Games.
Proceedings of the Recent Advances in Constraints, 2008

From Marriages to Coalitions: A Soft CSP Approach.
Proceedings of the Recent Advances in Constraints, 2008

Timed Soft Concurrent Constraint Programs.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

Semiring-Based Soft Constraints.
Proceedings of the Concurrency, 2008

A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Weighted Datalog and Levels of Trust.
Proceedings of the The Third International Conference on Availability, 2008

2007
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming.
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, 2007

Soft constraint based pattern mining.
Data Knowl. Eng., 2007

Using CP-nets as a guide for countermeasure selection.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

SCLP for Trust Propagation in Small-World Networks.
Proceedings of the Recent Advances in Constraints, 2007

Constraint Symmetry for the Soft CSP.
Proceedings of the Principles and Practice of Constraint Programming, 2007

Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario.
Proceedings of the Principles and Practice of Constraint Programming, 2007

2006
Multilevel Security and Quality of Protection.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Soft concurrent constraint programming.
ACM Trans. Comput. Log., 2006

An asymmetric fingerprint matching algorithm for Java Card <sup>TM</sup>.
Pattern Anal. Appl., 2006

Editorial.
J. Heuristics, 2006

Augmented Risk Analysis.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

Special track editorial: constraint solving and programming.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Extending the Soft Constraint Based Mining Paradigm.
Proceedings of the Knowledge Discovery in Inductive Databases, 5th International Workshop, 2006

Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration.
Proceedings of the Autonomic Principles of IP Operations and Management, 2006

Strategic Games on Defense Trees.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

Bipolar Preference Problems.
Proceedings of the ECAI 2006, 17th European Conference on Artificial Intelligence, August 29, 2006

Enhancing Constraints Manipulation in Semiring-Based Formalisms.
Proceedings of the ECAI 2006, 17th European Conference on Artificial Intelligence, August 29, 2006

Bipolar Preference Problems: Framework, Properties and Solving Techniques.
Proceedings of the Recent Advances in Constraints, 2006

Defense trees for economic evaluation of security investments.
Proceedings of the The First International Conference on Availability, 2006

2005
A soft constraint-based approach to the cascade vulnerability problem.
J. Comput. Secur., 2005

Relating multiset rewriting and process algebras for security protocol analysis.
J. Comput. Secur., 2005

Information Assurance for security protocols.
Comput. Secur., 2005

Editorial: special track on constraint solving and programming.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2005, 2005

An Asymmetric Fingerprint Matching Algorithm for Java Card™.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005

MOC via TOC Using a Mobile Agent Framework.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005

2004
Soft Constraint Programming to Analysing Security Protocols.
Theory Pract. Log. Program., 2004

Soft Constraints for Security.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

Soft Constraint Propagation and Solving in Constraint Handling Rules.
Comput. Intell., 2004

Editorial message: special track on artificial intelligence, computational logic and image analysis.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Modeling and detecting the cascade vulnerability problem using soft constraints.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Reasoning about Secure Interoperation Using Soft Constraints.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Encoding Partial Constraint Satisfaction in the Semiring-Based Framework for Soft Constraints.
Proceedings of the 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 2004

Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints.
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004

Semirings for Soft Constraint Solving and Programming
Lecture Notes in Computer Science 2962, Springer, ISBN: 3-540-21181-0, 2004

2003
General Properties and Termination Conditions for Soft Constraint Propagation.
Constraints An Int. J., 2003

Biometrics to Enhance Smartcard Security.
Proceedings of the Security Protocols, 2003

A Protocol's Life After Attacks....
Proceedings of the Security Protocols, 2003

A Theoretical Framework for Tradeoff Generation using Soft Constraints.
Proceedings of the Research and Development in Intelligent Systems XX, 2003

Symmetry Breaking in Soft CSPs.
Proceedings of the Research and Development in Intelligent Systems XX, 2003

A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity.
Proceedings of the Computer Safety, 2003

AI and Computational Science Track Editorial.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Analysis of Integrity Policies using Soft Constraints.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.
Proceedings of the Computer Network Security, 2003

Computer Algebra for Fingerprint Matching.
Proceedings of the Computational Science - ICCS 2003, 2003

On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems.
Proceedings of the Sixteenth International Florida Artificial Intelligence Research Society Conference, 2003

On Representing Biological Systems through Multiset Rewriting.
Proceedings of the Computer Aided Systems Theory, 2003

Experimental Evaluation of Interchangeability in Soft CSPs.
Proceedings of the Recent Advances in Constraints, 2003

Abstracting Soft Constraints: Some Experimental Results on Fuzzy CSPs.
Proceedings of the Recent Advances in Constraints, 2003

Tradeoff Generation Using Soft Constraints.
Proceedings of the Recent Advances in Constraints, 2003

Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search.
Proceedings of the Principles and Practice of Constraint Programming, 2003

2002
Soft Constraint Logic Programming and Generalized Shortest Path Problems.
J. Heuristics, 2002

Abstracting soft constraints: Framework, properties, examples.
Artif. Intell., 2002

Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks.
Proceedings of the Security Protocols, 2002

Soft constraint propagation and solving in CHRs.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Interchangeability in Soft CSPs.
Proceedings of the Principles and Practice of Constraint Programming, 2002

2001
Semiring-based contstraint logic programming: syntax and semantics.
ACM Trans. Program. Lang. Syst., 2001

Soft Constraints for Security Protocol Analysis: Confidentiality.
Proceedings of the Practical Aspects of Declarative Languages, 2001

2000
An Abstraction Framework for Soft Constraints and Its Relationship with Constraint Propagation.
Proceedings of the Abstraction, 2000

Labeling and Partial Local Consistency for Soft Constraint Programming.
Proceedings of the Practical Aspects of Declarative Languages, 2000

Constraint Propagation for Soft Constraints: Generalization and Termination Conditions.
Proceedings of the Principles and Practice of Constraint Programming, 2000

1999
Semiring-Based CSPs and Valued CSPs: Frameworks, Properties, and Comparison.
Constraints An Int. J., 1999

Abstracting Soft Constraints.
Proceedings of the New Trends in Contraints, 1999

Labeling and Partial Arc Consistency for Soft Constraints.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1997
Semiring-based constraint satisfaction and optimization.
J. ACM, 1997

Semiring-based Constraint Logic Programming.
Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, 1997

1995
Constraint Solving over Semirings.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995

Semiring-Based CSPs and Valued CSPs: Basic Properties and Comparison.
Proceedings of the Over-Constrained Systems, 1995


  Loading...