Semirings for Soft Constraint Solving and Programming Springer, Lecture Notes in Computer Science, Vol. 2962 (2004) ISBN: 3-540-21181-0 |
Semiring-based Constraint Satisfaction and Optimization Journal of ACM, vol.44, n.2, pp. 201-236, ACM Press, (March 1997) ISSN:0004-5411 |
||
Semiring-Based CSPs and Valued CSPs: Frameworks, Properties, and Comparison CONSTRAINTS: An international journal, vol. 4, n. 3, pp. 199-240, Kluwer, (September 1999) ISSN 1383-7133 |
||
Semiring-Based Constraint Logic Programming: Syntax and Semantics ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 23, n. 1, pp. 1-29, ACM, (January 2001) ISSN:0164-0925 |
||
Soft Constraint logic Programming and Generalized Shortest Path Problems Journal of Heuristics, vol. 8, n. 1, pp. 25-41, Kluwer, (January 2002) ISSN:1381-1231 |
||
Abstracting soft constraints: Framework, properties, examples Artificial Intelligence, n. 139, pp. 175-211, Elsevier, (July 2002) ISSN 0004-3702 |
||
General Properties and Termination Conditions for Soft Constraint Propagation CONSTRAINTS: An international journal, vol. 8, n. 1, pp. 79-97, Kluwer, (January 2003) ISSN 1383-7133 |
||
Soft Constraint Propagation and Solving in Constraint Handling Rules Computational Intelligence: An International Journal, (Special Issue on Preferences in AI and CP), vol. 20, n. 2, pp. 287 - 307, BlackWell Publishing, 2004 ISSN 0824-7935 |
||
Soft Constraint Programming to Analysing Security Protocol Theory and Practice of Logic Programming (TPLP), (Special Issue on Verification and Computational Logic), vol. 4, n. 5, pp. 1-28, Cambridge University Press, 2004 ISSN 1471-0684 |
||
Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis Journal of Computer Security, (Special issue on WITS'03), vol. 13, n. 1, IOS Press, 2005 ISSN 0926-227X |
||
Information Assurance for Security Protocols Computers & Security, vol. 24, issue 4, pp. 322-333, Elsevier, June 2005 ISSN: 0167-4048 |
||
A soft constraint-based approach to the cascade vulnerability problem Journal of Computer Security, vol. 13, n. 5, pp. 699-720, IOS Press, 2005 ISSN 0926-227X |
||
Soft Concurrent Constraint Programming ACM Transactions on Computational Logic (TOCL), vol. 7, n. 3, pp. 1-27, ACM, 2006 ISSN 1529-3785 |
||
Soft Constraint Based Pattern Mining Data & Knowledge Engineering, vol. 62, n. 1, pp. 118-137, Elsevier, July 2007 ISSN 0169-023X |
||
An Asymmetric Fingerprint Matching Algorithm for Java Card Pattern Analysis and Application Journal, vol. 9, n. 4, pp. 359-376, Springer, 2006 ISSN: 1433-7541 |
||
Retaliation Against Protocol Attacks Journal of Information Assurance and Security Accepted for publication Dynamic Publisher Inc., Atlanta, GA, USA To appear by end of 2008 ISSN: 1554-1010 |
Semiring-based CSPs and Valued CSPs: Basic Properties and Comparison Over-Constrained Systems Springer, Lecture Notes in Computer Science, Vol. 1106, pp. 111-150, (August 1996) ISBN 3-540-61479-6 |
||
Retaliation: Can We Live with Flaws? Information Assurance and Computer Security, chapter 1 selected papers from the NATO ARW Information Security Assurance and Security 2005 (ARWIAS'05) workshop, 3 Jun 2005 - 4 Jun 2005 : Tetuan, Morocco, IOS Press, NATO Security through Science Series, Vol. 6, pp. 111-150, November 2006 ISBN 1-58603-678-5 |
Constraint Solving over Semirings Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI95), Montr�al, Qu�bec, Canada, August 20-25, 1995 Morgan Kauffman, pp. 624-630, (October 1995) ISBN 1-55860-363-8 |
||
Semiring-based Constraint Logic Programming Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCAI97), Nagoya, Japan, August 23-29, 1997 Morgan Kauffman, pp. 352-357, (August 1997) ISBN 1-55860-480-4 |
||
Labeling and Partial Local Consistency for Soft Constraint Programming Practical Aspects of Declarative Languages: Second International Workshop, PADL 2000, Proceedings, Boston, MA, USA, January 2000 Springer, Lecture Notes in Computer Science, Vol. 1753, pp. 230-248, (2000) ISBN 3-540-66992-2 |
||
Abstracting Soft Constraints New Trends in Constraints: Joint ERCIM/Compulog Net Workshop. Selected Papers, Paphos, Cyprus, October 1999 Springer, Lecture Notes in Artificial Intelligence, Vol. 1865, pp. 108-133, (2000) ISBN 3-540-67865-9 |
||
An Abstraction Framework for Soft Constraint and Its Relationship with Constraint Propagation Abstraction, Reformulation, and Approximation: 4th International Symposium, SARA 2000, Proceedings. Horseshoe Bay, Texas, USA, July 2000 Springer, Lecture Notes in Artificial Intelligence, Vol. 1864, pp. 71-86, (2000) ISBN 3-540-67839-5 |
||
Constraint Propagation for Soft Constraint Satisfaction Problems: Generalization and Termination Conditions Principles and Practice of Constraint Programming - CP 2000: 6th International Conference, CP 2000, Proceedings, Singapore, September 2000 Springer, Lecture Notes in Computer Science, Vol. 1894, pp. 83-97, (2000) ISBN 3-540-41053-8 |
||
Soft Constraints for Security Protocol Analysis: Confidentiality Practical Aspects of Declarative Languages: Third International Symposium, PADL 2001, Proceedings, Las Vegas, Nevada, March 2001 Springer, Lecture Notes in Computer Science, Vol. 1990, pp. 108-122, (2001) ISBN 3-540-41768-0 |
||
Soft Constraint Propagation and Solving in CHR ACM Symposium on Applied Computing (SAC 2002), Proceedings, MArch 10-14, 2002, Madrid, Spain ACM Press, pp. 1-5, (2002) ISBn 1-58113-445-2 |
||
Soft Concurrent Constraint Programming Programming Languages and Systems: 11th European Symposium on Programming, ESOP 2002 held as Part of the Joint European Conference on Theory and Practice of Software, ETAPS 2002, Proceedings, Grenoble, France, April 8-12, 2002 Springer, Lecture Notes in Computer Science, Vol. 2305, pp. 53-67, (2002) ISBN 3-540-43363-5 |
||
Confidentiality levels and deliberate/indeliberate protocol attacks Security Protocols: 10th International Workshop, Revised Papers, Cambridge, UK, April 17-19, 2002 Springer, Lecture Notes in Computer Science, Vol. 2845, pp. 104-119, (2002) ISBN 3-540-20830-5 |
||
Interchangeability in Soft CSPs Principles and Practice of Constraint Programming - CP 2002 : 8th International Conference, CP 2002, Proceedings, Ithaca, NY, USA, September 9-13, 2002 Springer, Lecture Notes in Computer Science, Vol. 2470, pp. 726-731, (2002) ISBN 3-540-44120-4 |
||
Interchangeability in Soft CSPs Recent Advances in Constraints: Joint ERCIM/CologNet International Workshop on Constraint Solving and Constraint Logic Programming, Selected Papers, Cork, Ireland, June 19-21, 2002 Springer, Lecture Notes in Artificial Intelligence, Vol. 2627, pp. 31-46, (2003) ISSN 0302-9743 |
||
On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems Special Track on Constraint Solving and Programming at the 16th International FLAIRS Conference, 2003 (FLAIR2003), Casa Monica Hotel, St. Augustine, Florida, USA - May 12-14, 2003, AAAI Press, pp. 187-191, (2003) ISBN 1-57735-177-0 |
||
Computer Algebra for Fingerprint Matching Proceedings of the International Conference on Computational Science (ICCS 2003), Track on Computer Algebra Systems and Their Applications, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003 Springer, Lecture Notes in Computer Science, Vol. 2657 pp. 811 - 820 (2003) ISSN 0302-9743 |
||
Analysis of Integrity Policies using Soft Constraints Proceedings IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY2003), Lake Como,Italy, June 4-6, 2003. IEEE, pp. 77-80, (2003) ISBN 0-7695-1933-4 |
||
Biometrics to Enhance Smartcard Security (Simulating MOC using TOC) Proceedings 11th International Workshop on Security Protocols, Cambridge, England 2-4 April 2003 Springer, Lecture Notes in Computer Science, Vol. 3364 pp. 324-335 2005 ISSN 0302-9743 |
||
A protocol's life after attacks... Proceedings 11th International Workshop on Security Protocols, Cambridge, England 2-4 April 2003 Springer, Lecture Notes in Computer Science, Vol. 3364 pp. 3-10 2005 ISSN 0302-9743 |
||
Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search Proceedings of the 18th International Joint Conference on Artificial Intelligence (IJCAI2003), Acapulco, Mexico, August 9-15, 2003 Morgan Kauffman, pp. 1364-1365, (2003) ISBN 0-127-05661-0 |
||
On representing biological systems through multiset rewriting (extended version) Workshop on Computational Methods in Biomathematics - CMB'03 - Ninth International Conference on Computer Aided Systems Theory (EUROCAST 2003), Selected papers, Las Palmas de Gran Canaria, Spain, 26 February 2003, Springer, Lecture Notes in Computer Science, Vol. 2809 pp. 415-426 (2003) ISSN 0302-9743 |
||
A Constraint Based Framework for Dependability Goals: Integrity 22nd International Conference on Computer Safety, Reliability and Security (SAFECOMP2003), Proceedings, 23-26 September 2003, Edinburgh, Scotland, United Kingdom, Springer, Lecture Notes in Computer Science, Vol. 2788 pp. 130-143 (2003) ISBN 3-540-20126-2 |
||
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols Proceedings Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security - MMM'03 St. Petersburg, Russia, 20-24 September 2003, Springer, Lecture Notes in Artificial Intelligence, Vol. 2776 pp. 88-101 (2003) ISSN 3-540-40476-7 |
||
Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search Proceedings 9th International Conference Principles and Practice of Constraint Programming (CP 2003) Kinsale, Ireland, September 29 - October 3, 2003, Springer, Lecture Notes in Computer Science, Vol. 2833 pp. 138-152 (2003) ISBN 3-540-20202-1 |
||
Symmetry Breaking in Soft CSPs Research and Development in Intelligent Systems XX, Proceedings of AI-2003, the Twenty-third SGAI International Conference on Knowledge-Based Systems and Applied Artificial Intelligence, Springer, BCS Conference Series "Research and Development in Intelligent Systems xx", pp. 199-212 (2003) ISBN 1-85233-780-X |
||
A Theoretical Framework for Tradeoff Generation using Soft Constraints Research and Development in Intelligent Systems XX, Proceedings of AI-2003, the Twenty-third SGAI International Conference on Knowledge-Based Systems and Applied Artificial Intelligence, Springer, BCS Conference Series "Research and Development in Intelligent Systems xx", pp. 69-82 (2003) ISBN 1-85233-780-X |
||
Experimental Evaluation of Interchangeability in Soft CSPs Recent Advances in Constraints, Joint ERCIM/CoLogNET International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP'03, Selected Papers, Budapest, Hungary, June 30-July 2, 2003, Springer, Lecture Notes in Computer Science, Vol. 3010 pp. 140-153 (2003) ISBN 3-540-21834-3 |
||
Tradeoff Generation using Soft Constraints Recent Advances in Constraints, Joint ERCIM/CoLogNET International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP'03, Selected Papers, Budapest, Hungary, June 30-July 2, 2003, Springer, Lecture Notes in Computer Science, Vol. 3010 pp. 124-139 (2003) ISBN 3-540-21834-3 |
||
Abstracting Soft Constraints: Some experimental results on Fuzzy CSPs Recent Advances in Constraints, Joint ERCIM/CoLogNET International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP'03, Selected Papers, Budapest, Hungary, June 30-July 2, 2003, Springer, Lecture Notes in Computer Science, Vol. 3010 pp. 107-123 (2003) ISBN 3-540-21834-3 |
||
Modelling and Detecting the Cascade Vulnerabiliy Problem using Soft Constraints ACM Symposium on Applied Computing (SAC 2004), Proceedings, March 14-17, 2004, Nicosia, Cyprus ACM Press, pp. 383-390, (2004) ISBN 1-58113-812-1 |
||
Detecting and Eliminating the Cascade Vulnerability Problem from Multi-level Security Networks using Soft Constraints Proceedings Innovative Applications of Artificial Intelligence Conference (IAAI-04), July 25-29, 2004, San Jose, California AAAI Press, pp. 808�813, 2004 ISBN 0-262-51183-5 |
||
Advancing Assurance for Secure Distributed Communications Proceedings 5th Annual IEEE Information Assurance Workshop, "The West Point Workshop", 10-11 June 2004, United States Military Academy, West Point, New York IEEE, pp. 306-313, 2004 ISBN: 0-7803-8572-1 |
||
Encoding Partial Constraint Satisfaction in the Semiring-Based Framework for Soft Constraints, Proceedings 16th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2004), 15-17 November 2004, Boca Raton, FL, USA. IEEE Computer Society 2004, IEEE, pp. 240-245, 2004 ISBN 0-7695-2236-X |
||
Reasoning about Secure Interoperation using Soft Constraints, Proceedings IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France, Series: IFIP International Federation for Information Processing, Vol. 173, Kluwer, pp. 173-186, 2005 ISBN: 0-387-24050-0 |
||
MOC via TOC Using a Mobile Agent Framework, Proceedings of Audio- and Video-based Biometric Person Authentication 2005 (AVBPA2005), Springer, Lecture Notes in Computer Science, Vol. 3546 pp. 464-473 (2005) ISBN 3-540-21834-3 |
||
An Asymmetric Fingerprint Matching Algorithm for Java CardTM, Proceedings of Audio- and Video-based Biometric Person Authentication 2005 (AVBPA2005), Springer, Lecture Notes in Computer Science, Vol. 3546 pp. 279-288 (2005) ISBN 3-540-21834-3 |
||
Interestingness is not a Dichotomy: Introducing Softness in Constrained Pattern Mining, Proceedings of the Ninth European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD'05), October 3-7, 2005, Porto, Portugal Springer, Lecture Notes in Computer Science, Vol. 3721 pp. 22-33 (2005) ISBN 3-540-21834-3 |
||
Multilevel Security and Quality of Protection, Quality Of Protection, Security Measurements and Metrics (Proceedings of the First Workshop on Quality of Protection, 2005), Springer, Advances in Information Security, Vol. 26 pp. 93-105 (2005) ISBN 978-0-387-29016-4 |
||
Soft Constraints for Security Electronic Notes in Theoretical Computer Science (ENTCS), First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, Italy 16-17 September 2006 Elsevier, Vol. 142 pp. 11-29, 2006 ISSN: 1571-0661 |
||
Defense trees for economic evaluation of security investments, Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, IEEE, pp. 416-423, 2006 ISBN: 0-7695-2567-9 |
||
Bipolar preference problems ECAI 2006 (poster paper), Riva del Garda, August 28-September 1, 2006, IOS Press, pp. 705-706, 2006 ISBN 1-58603-642-4 |
||
Enhancing constraints manipulation in semiring-based formalisms ECAI 2006 (poster paper), Riva del Garda, August 28-September 1, 2006, IOS Press, pp. 63-67, 2006 ISBN 1-58603-642-4 |
||
Modelling and solving bipolar preference problems Recent Advances in Constraints, ERCIM International Workshop on Constraint Solving and Constraint Logic Programming, CSCLP'03, Selected Papers, Lisbon, June 2006, Springer, Lecture Notes in Artificial Intelligence, Vol. 4651 pp. 78-92 (2006) ISBN 3-540-21834-3 |
||
Principles of Secure Network Configuration: Towards a Formal Basis for Self-Configuration, IPOM 2006, 6th IEEE International Workshop on IP Operations and Management, October 23-25, Dublin, Ireland - held as part of Manweek 2006, IEEE, Lecture Notes in Computer Science, Vol. 4268 pp. 168--180, 2006 ISBN 3-540-47701-2 |
||
Augmented Risk Analysis Electronic Notes in Theoretical Computer Science (ENTCS), Second International Workshop on Views on Designing Complex Architectures (VODCA 2006), Bertinoro, Italy 16-17 September 2006 Elsevier, Vol. 168 pp. 1-248, 2006 ISBN 1-55860-363-8 |
||
Strategic games on defense trees 4th International Workshop in Formal Aspects in Security and Trust (FAST 2006), Springer, Lecture Notes in Computer science, Vol. 4691 pp. 1-15, 2006 ISBN 978-3-540-75226-4 |
||
Using CP-nets as a guide for countermeasure selection 22nd ACM Symposium on Applied Computing (SAC2007), Track on Computer Security (6th edition), ACM Press, pp. 300-304, 2007 ISBN 1-59593-480-4 |
||
Extending the Soft Constraint Based Mining Paradigm Proceedings of the 5th International Workshop on Knowledge Discovery in Inductive Databases (KDID'06), Springer, Lecture Notes in Computer science, Vol. 4747 pp. 24-41, 2006 ISBN 978-3-540-75548-72 |
||
An Optimization Approach using Soft Constraints for the Cascade Vulnerability Problem, Annual meeting of the North American Fuzzy Information Processing Society (NAFIPS07), IEEE, pp. 372--377, 2007 ISBN: 0-7695-2567-9 |
||
Modelling Multicast Qos Routing by using Best-Tree Search in AND-OR Graphs and Soft Constraint Logic Programming, Proc. Fifth Workshop on Quantitative Aspects of Programming Languages QAPL'07, IEEE, pp. 372--377, 2007 ISBN: 0-7695-2567-9 |
||
Modelling Multicast Qos Routing by using Best-Tree Search in AND-OR Graphs and Soft Constraint Logic Programming, Electronic Notes in Theoretical Computer Science (ENTCS), Proc. Fifth Workshop on Quantitative Aspects of Programming Languages QAPL'07, Elsevier, Vol.190 n. 3, pp. 111-127, 2007 ISSN: 1571-0661 |
||
Uncertainty in bipolar preference problems Proc. Principles and Practice of Constraint Programming - CP 2007, (Providence, RH, September 2007), poster paper Springer, Lecture Notes in Computer Science, Vol. 4741, pp. 782-789, (2007) ISBN 978-3-540-74969-1 |
||
Constraint Symmetry for the Soft CSP Proc. Principles and Practice of Constraint Programming - CP 2007, (Providence, RH, September 2007), poster paper Springer, Lecture Notes in Computer Science, Vol. 4741, pp. 872-879, (2007) ISBN 978-3-540-74969-1 |
||
Answer Set Optimization for and/or composition of CP-nets: a security scenario Proc. Principles and Practice of Constraint Programming - CP 2007, (Providence, RH, September 2007), Poster paper Springer, Lecture Notes in Computer Science, Vol. 4741, pp. 773-781, (2007) ISBN 978-3-540-74969-1 |
||
Analyzing security scenarios using Defence Trees and Answer Set Programming Electronic Notes in Theoretical Computer Science (ENTCS), Proc. 3rd International Workshop on Security and Trust Management, (Dresden, Germany, 27 September 2007), Short paper Elsevier, Vol.197 n. 2, pp. 121-129, 2007 ISSN: 1571-0661 |
||
Propagating multitrust within trust networks ACM Symposium on Applied Computing (SAC 2008), Proceedings, Fortaleza, Ceara, Brazil, March 16-20, 2008 ACM Press, pp. 1990-1994, (2008) ISBN 978-1-59593-753-7 |
||
Weighted Datalog and Levels of Trust, Proceedings of the International Conference on Availability, Reliability and Security, ARES 2008, The International Dependability Conference - Bridging Theory and Practice, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, IEEE, pp. 1128-1134, 2008 ISBN: 0-7695-3102-4 |
||
A Formal and Practical Framework for Constraint-Based Routing, Proceedings of ICN 2008, Best Paper Award, IEEE, pp. 162-167, 2008 ISBN: 978-0-7695-3106-9 |
||
Timed Soft Concurrent Constraint Programs, Proceedings of Coordination 2008, Oslo, Norway, June 4-6, 2008 Springer, Lecture Notes in Computer Science, Vol.5052, pp. 50-66, 2008 ISBN: 978-3-540-68264-6 |
||
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily, Proceedings of Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008 Springer, Lecture Notes in Computer Science, Vol.5060, pp. 481-495, 2008 ISBN: 978-3-540-69294-2 |
||
Semiring-Based Soft Constraints, Concurrency, Graphs and Models, Essays Dedicated to Ugo Montanari on the Occasion of His 65th Birthday, Springer, Lecture Notes in Computer Science, Vol.5065, pp. 155-173, 2008 ISBN: 978-3-540-68676-7 |
||
SCLP for Trust Propagation in Small-World Networks "Recent Advances in Constraints" post-proceedings of CSCLP'07, Springer, Lecture Notes in Artificial Intelligence, Vol. 5129 pp. , To appear ISBN |
||
Security Protocol Deployment Risk Security Protocols: 16th International Workshop, Revised Papers, Cambridge, England -- 16-18 April 2008 Springer, Lecture Notes in Computer Science, Vol. , pp. , To appear ISBN |
||
A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation, Third International Workshop on Views On Designing Complex Architectures (VODCA 2008) August 30-31, 2008 at the Bertinoro University Residential Centre, Bertinoro, Italy Elsevier, Vol. pp. , To Appear ISBN |
An operational model for the SCLP Language Proceedings of the ILPS97 Workshop Tools and Environments for (Constraint) Logic Programming, October 16 - 17, 1997, Port Jefferson, NY, USA Technical Report n. CLIP7/97.1, Facultad de Informàtica, Universidad Politècnica de Madrid, (1997) |
||
Constraints and Agents for a Decentralized Network Infrastructure Proceedings of the AAAI97 workshop on Constraints and Agents, July 27-31, 1997, Providence, Rhode Island Technical Report WS-97-05, AAAI, (1997) ISBN 1-57735-032-4 |
||
Soft Constraint Solving and Programming: a general framework Ph.D. Thesis, Technical Report TD-2-01, Computer Science Department, University of Pisa, (2001) |
||
Soft Constraint Programming to Analysing Security Protocols Technical Report TR-IAT-B4-2001-013, Istituto di Informatica e Telematiche, CNR Pisa, (2001) |
||
CHR to model Soft Constraint Propagation Proc. 11th International Workshop on Functional and (constraint) Logic Programming (WFLP2001), Grado, Italy, June 20-22 Research Report UDMI/18/2002/RR, Universit� degli Studi di Udine, pp. 279-292, (2002) |
||
Interchangeability in Soft CSPs Technical Report 07-2002, Istituto di Informatica e Telematiche, CNR Pisa, (2002) |
||
Biometrics authentication with smartcard Technical Report 08-2002, Istituto di Informatica e Telematiche, CNR Pisa, (2002) |
||
Certificati per impronte digitali memorizzati su smartcard Technical Report 09-2002, Istituto di Informatica e Telematiche, CNR Pisa, (2002) |
||
C-semiring Frameworks for MST and ST problems International Workshop on Algebraic Development Techniques (WADT 2008) Technical Report to appear, Technical Report of the Department of Computer Science - Pisa, (to appear) |
||
Designing a Nonmonotonic Soft Concurrent Constraint Language for SLA Management Technical Report n.18-2007, Institute of Informatics and Telematics, CNR Pisa, (2007) |
About arc-consistency in semiring-based constraint problems Proceedings of the 5th International Symposium on Artificial Intelligence and Mathematics, Fort Lauderdale, Florida, January 4-6, 1998 |
||
SCLP Semantics for (Multi-Criteria) Shortest Path Problems Proceedings CP-AI-OR'99 Workshop on Integration of AI and OR techniques in Constraint Programming for Combinatorial Optimization Problems, February 25-26, 1999, University of Ferrara (Italy) |
||
Labeling and Partial Arc Consistency for Soft Constraints Proceedings 1999 Joint Conference on Declarative Programming - AGP99, L'Aquila, Italy, September 6-9, 1999 |
||
Abstracting Soft Constraints Proceedings CP99 Workshop on Modelling and Solving Soft Constraints, October 16, 1999, Alexandria, Virginia, USA |
||
SCSPs for modelling attacks to security protocols Proceedings CP2000 Workshop on Modelling and Solving Soft Constraints, September 22, 2000, Singapore |
||
Higher-Order Semiring Based Constraints Proceedings CP2000 Workshop on Modelling and Solving Soft Constraints, September 22, 2000, Singapore |
||
Soft Constraint Propagation and Solving in CHR (extended version) Proceedings CP2001 Workshop on Rule-based Constraint Reasoning and Programming, December 1, 2001, Paphos, Cyprus |
||
Soft Concurrent Constraint Programming Proceedings CP2001 Workshop on Rule-based Constraint Reasoning and Programming, December 1, 2001, Paphos, Cyprus |
||
Representing biological systems through multiset rewriting Proceedings EUROCAST 2003 Workshop on Computational Methods in Biomathematics CMB'03, Las Palmas de Gran Canaria, Spain, 26 February 2003 |
||
Relating Process Algebras and Multiset Rewriting for Security Protocol Analysis Proceedings Workshop on Issues in the Theory of Security (WITS'03), April 5 - 6, 2003, Warsaw, Poland |
||
A local search framework for semiring-based constraint satisfaction problems Proceedings CP2003 Workshop on Soft Constraints (Soft-2003), 29 September, Actons Hotel, Kinsale, County Cork, Ireland |
||
Symmetry breaking in soft csps Proceedings CP2003 Workshop on Soft Constraints (Soft-2003), 29 September, Actons Hotel, Kinsale, County Cork, Ireland |
||
A Constraint-based Framework for the Cascade Vulnerability Problem ICLP2003 Workshop on Constraint and Logic Programming in Security (COLOPS2003), 9 December, Tata Institute of Fundamental Research (TIFR), Mumbay, India |
||
Combining Branch & Bound and SBDD to solve Soft CSPs CP2004 Fourth International Workshop on Symmetry and Constraint Satisfaction Problems (SymCon'04), |
||
Positive and negative preferences CP 2005 workshop on preferences and soft constraints (Soft 2005), |
||
Modelling Multicast Qos Routing by using Best-Tree Search in AND-OR Graphs and Soft Constraint Logic Programming CP 2006 8th International Workshop on Preferences and Soft Constraints, |
||
Constraints Symmetry for the Soft CSP Proceedings of the International Symmetry Conference,, Edinburgh, 2007 |
||
Modelling Multicast Qos Routing by using Best-Tree Search in AND-OR Graphs and Soft Constraint Logic Programming, CP 2006 8th International Workshop on Preferences and Soft Constraints, September 24-29, 2006 - Cit� des Congr�s - Nantes, France |
||
A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation, 23-esimo Convegno Italiano di Logica Computazionale, CILC08, |
||
Modeling and Selecting Countermeasures using CP-nets and Answer Set Programming, 23-esimo Convegno Italiano di Logica Computazionale, CILC08, |
Integrating Biometric Techniques with Electronic Signature for Remote Authentication ERCIM Mews, n. 49, pp. 35, ERCIM, (April 2002) |
||
Security: Formal Methods at Work ERCIM Mews, n. 49, pp. 23-24, ERCIM, (April 2002) |
||
Soft Constraint Solving and Programming: A General Framework AI*IA Notizie, Anno XV, n. 4, pp. 6-12, AI*IA, (December 2002) |