Foundations of Computing group


TitleFoundations of Computing group

Latest research outputs

Sort by Date Title
ProEva: runtime proactive performance evaluation based on continuous-time markov chains
Su, G., Chen, T., Feng, Y. and Rosenblum, D. 2017. ProEva: runtime proactive performance evaluation based on continuous-time markov chains. 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). Buenos Aires, Argentina 20 - 28 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-495 https://doi.org/10.1109/ICSE.2017.51

Conference paper

Analyzing APIs documentation and code to detect directive defects
Zhou, Y., Gu, R., Chen, T., Huang, Z., Panichella, S. and Gall, H. 2017. Analyzing APIs documentation and code to detect directive defects. 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). Buenos Aires, Argentina 20 - 28 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 27-37 https://doi.org/10.1109/ICSE.2017.11

Conference paper

The packing chromatic number of the infinite square lattice is between 13 and 15
Martin, B., Raimondi, F., Chen, T. and Martin, J. 2017. The packing chromatic number of the infinite square lattice is between 13 and 15. Discrete Applied Mathematics. 225, pp. 136-142. https://doi.org/10.1016/j.dam.2017.03.013

Article

Managing software uninstall with negative trust
Primiero, G. and Boender, J. 2017. Managing software uninstall with negative trust. 11th IFIP WG 11.11 International Conference, IFIPTM 2017. Gothenburg, Sweden 12 - 16 Jun 2017 Springer. pp. 79-93 https://doi.org/10.1007/978-3-319-59171-1_7

Conference paper

Trust and distrust in contradictory information transmission
Primiero, G., Raimondi, F., Bottone, M. and Tagliabue, J. 2017. Trust and distrust in contradictory information transmission. Applied Network Science. 2 (1). https://doi.org/10.1007/s41109-017-0029-0

Article

Rohit Parikh on logic, language and society
Baskent, C., Moss, L. and Ramanujam, R. (ed.) 2017. Rohit Parikh on logic, language and society. Springer.

Edited Book

Algorithmic iteration for computational intelligence
Primiero, G. 2017. Algorithmic iteration for computational intelligence. Minds and Machines. 27 (3), pp. 521-543. https://doi.org/10.1007/s11023-017-9423-8

Article

Quantum Bootstrap Aggregation
Windridge, D. and Nagarajan, R. 2017. Quantum Bootstrap Aggregation. de Barros, J., Coecke, B. and Pothos, E. (ed.) Quantum Interaction. San Francisco, CA, USA 20 - 22 Jul 2016 Springer. pp. 115-121 https://doi.org/10.1007/978-3-319-52289-0_9

Conference paper

Preliminary investigation of self-as-context in people with fibromyalgia
Yu, L., Norton, S., Almarzooqi, S. and McCracken, L. 2017. Preliminary investigation of self-as-context in people with fibromyalgia. British Journal of Pain. 11 (3), pp. 134-143. https://doi.org/10.1177/2049463717708962

Article

A novel symbolic approach to verifying epistemic properties of programs
Gorogiannis, N., Raimondi, F. and Boureanu, I. 2017. A novel symbolic approach to verifying epistemic properties of programs. Twenty-Sixth International Joint Conference on Artificial Intelligence. Melbourne, Australia 19 - 25 Aug 2017 International Joint Conferences on Artificial Intelligence. pp. 206-212 https://doi.org/10.24963/ijcai.2017/30

Conference paper

CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees
Bauereiß, T., Pesenti Gritti, A., Popescu, A. and Raimondi, F. 2017. CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. 38th IEEE Symposium on Security and Privacy. San Jose, CA, USA 22 - 26 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 729-748 https://doi.org/10.1109/SP.2017.24

Conference paper

Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition
Tirunagari, S., Poh, N., Wells, K., Bober, M., Gorden, I. and Windridge, D. 2017. Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition. Machine Vision and Applications. 28 (3-4), pp. 393-407. https://doi.org/10.1007/s00138-017-0835-5

Article

Encoding monomorphic and polymorphic types
Blanchette, J., Böhme, S., Popescu, A. and Smallbone, N. 2017. Encoding monomorphic and polymorphic types. Logical Methods in Computer Science. 12 (4). https://doi.org/10.2168/LMCS-12(4:13)2016

Article

Minimum cell connection in line segment arrangements
Alt, H., Cabello, S., Giannopoulos, P. and Knauer, C. 2017. Minimum cell connection in line segment arrangements. International Journal of Computational Geometry and Applications. 27 (3), pp. 159-176. https://doi.org/10.1142/s0218195917500017

Article

Contradictory information flow in networks with trust and distrust
Primiero, G., Bottone, M., Raimondi, F. and Tagliabue, J. 2016. Contradictory information flow in networks with trust and distrust. 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016). Milan 01 - 06 Dec 2016 Springer. https://doi.org/10.1007/978-3-319-50901-3_29

Conference paper

A model for trustworthy orchestration in the internet of things
Bottone, M., Primiero, G., Raimondi, F. and De Florio, V. 2016. A model for trustworthy orchestration in the internet of things. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 171-174 https://doi.org/10.1109/IE.2016.37

Conference paper

Towards formal analysis of insider threats for auctions
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963

Conference paper

A calculus for distrust and mistrust
Primiero, G. 2016. A calculus for distrust and mistrust. Tenth IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016. Darmstadt, Germany 18 - 22 Jul 2016 Springer. https://doi.org/10.1007/978-3-319-41354-9_15

Conference paper

Isabelle Modelchecking for insider threats
Kammueller, F. 2016. Isabelle Modelchecking for insider threats. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 196-210 https://doi.org/10.1007/978-3-319-47072-6_13

Conference paper

Refactoring preserves security
Kammueller, F. 2016. Refactoring preserves security. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 238-245 https://doi.org/10.1007/978-3-319-47072-6_17

Conference paper

Verifying pushdown multi-agent systems against strategy logics
Chen, T., Song, F. and Wu, Z. 2016. Verifying pushdown multi-agent systems against strategy logics. IJCAI 2016: 25th International Joint Conferences on Artificial Intelligence (IJCAI). New York, New York, USA 09 - 15 Jul 2016 AAAI Press / International Joint Conferences on Artificial Intelligence. pp. 180-186

Conference paper

Information in the philosophy of computer science
Primiero, G. 2016. Information in the philosophy of computer science. in: Floridi, L. (ed.) The Routledge Handbook of Philosophy of Information Routledge. pp. 90-106

Book chapter

When logic meets engineering: introduction to logical issues in the history and philosophy of computer science
De Mol, L. and Primiero, G. 2015. When logic meets engineering: introduction to logical issues in the history and philosophy of computer science. History and Philosophy of Logic. 36 (3), pp. 195-204. https://doi.org/10.1080/01445340.2015.1084183

Article

Towards a novel approach for defect localization based on part-of-speech and invocation
Tong, Y., Zhou, Y., Fang, L. and Chen, T. 2015. Towards a novel approach for defect localization based on part-of-speech and invocation. Internetware 2015: 7th Asia-Pacific Symposium on Internetware. Wuhan, China 06 Nov 2016 Association for Computing Machinery (ACM). pp. 52-61 https://doi.org/10.1145/2875913.2875919

Conference paper

A computationally grounded, weighted doxastic logic
Chen, T., Primiero, G., Raimondi, F. and Rungta, N. 2016. A computationally grounded, weighted doxastic logic. Studia Logica. 104 (4), pp. 679-703. https://doi.org/10.1007/s11225-015-9621-4

Article

Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking
Gu, J., Zhou, Y., Wu, W. and Chen, T. 2015. Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking. First International Conference on Cloud Computing and Security (ICCCS 2015). Nanjing, China 13 - 15 Aug 2015 Springer. pp. 192-205 https://doi.org/10.1007/978-3-319-27051-7_17

Conference paper

Minimizing transitive trust threats in software management systems
Boender, J., Primiero, G. and Raimondi, F. 2015. Minimizing transitive trust threats in software management systems. 13th Annual Conference on Privacy, Security and Trust (PST 2015). Izmir, Turkey 21 - 23 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 191-198 https://doi.org/10.1109/PST.2015.7232973

Conference paper

A complete decision procedure for linearly compositional separation logic with data constraints
Gu, X., Chen, T. and Wu, Z. 2016. A complete decision procedure for linearly compositional separation logic with data constraints. IJCAR 2016: 8th International Joint Conference on Automated Reasoning. University of Coimbra, Portugal 27 Jun - 02 Jul 2016 Springer. pp. 532-549 https://doi.org/10.1007/978-3-319-40229-1_36

Conference paper

Disproving inductive entailments in separation logic via base pair approximation
Brotherston, J. and Gorogiannis, N. 2015. Disproving inductive entailments in separation logic via base pair approximation. TABLEAUX 2015: 24th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods. Wroclaw, Poland 21 - 24 Sep 2015 Springer. https://doi.org/10.1007/978-3-319-24312-2_20

Conference paper

Game theoretical semantics for some non-classical logics
Baskent, C. 2016. Game theoretical semantics for some non-classical logics. Journal of Applied Non-Classical Logics. 26 (3), pp. 208-239. https://doi.org/10.1080/11663081.2016.1225488

Article

An iterative decision-making scheme for Markov decision processes and its application to self-adaptive systems
Su, G., Chen, T., Feng, Y., Rosenblum, D. and Thiagarajan, P. 2016. An iterative decision-making scheme for Markov decision processes and its application to self-adaptive systems. 19th International Conference Fundamental Approaches to Software Engineering (FASE 2016). Eindhoven, The Netherlands 02 - 08 Apr 2016 Springer. pp. 269-286 https://doi.org/10.1007/978-3-662-49665-7_16

Conference paper

Asymptotic perturbation bounds for probabilistic model checking with empirically determined probability parameters
Su, G., Feng, Y., Chen, T. and Rosenblum, D. 2016. Asymptotic perturbation bounds for probabilistic model checking with empirically determined probability parameters. IEEE Transactions on Software Engineering. 42 (7), pp. 623-639. https://doi.org/10.1109/TSE.2015.2508444

Article

Model checking for symbolic-heap separation logic with inductive predicates
Brotherston, J., Gorogiannis, N., Kanovich, M. and Rowe, R. 2016. Model checking for symbolic-heap separation logic with inductive predicates. POPL 2016: 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. St. Petersburg, FL, USA 20 - 22 Jan 2016 ACM SIGPLAN Notices. pp. 84-96 https://doi.org/10.1145/2837614.2837621

Conference paper

Perspectives on interrogative models of inquiry: developments in Inquiry and Questions
Baskent, C. (ed.) 2016. Perspectives on interrogative models of inquiry: developments in Inquiry and Questions. Switzerland Springer.

Edited Book

On the satisfiability of indexed linear temporal logics
Chen, T., Song, F. and Wu, Z. 2015. On the satisfiability of indexed linear temporal logics. 26th International Conference on Concurrency Theory, CONCUR 2015. Madrid, Spain 01 - 04 Sep 2015 Schloss Dagstuhl Leibniz-Zentrum für Informatik. pp. 254-267 https://doi.org/10.4230/LIPIcs.CONCUR.2015.254

Conference paper

A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP)
Raheem, A., Lasebae, A. and Loo, J. 2014. A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP). 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Beijing, China Institute of Electrical and Electronics Engineers (IEEE). pp. 840-845 https://doi.org/10.1109/TrustCom.2014.135

Conference paper

A framework for trustworthiness assessment based on fidelity in cyber and physical domains
De Florio, V. and Primiero, G. 2015. A framework for trustworthiness assessment based on fidelity in cyber and physical domains. 2nd International Workshop on Computational Antifragility and Antifragile Engineering (ANTIFRAGILE 2015). London, UK 02 - 05 Jun 2015 Elsevier. https://doi.org/10.1016/j.procs.2015.05.092

Conference paper

Formalization of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2015. Formalization of quantum protocols using Coq. The 12th International Workshop on Quantum Physics and Logic (QPL 2015). Oxford, United Kingdom 15 - 17 Jul 2015 pp. 71-83

Conference paper

From complexity to algebra and back: digraph classes, collapsibility and the PGP
Carvalho, C., Madelaine, F. and Martin, B. 2015. From complexity to algebra and back: digraph classes, collapsibility and the PGP. 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). Kyoto, Japan 06 - 10 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 462-474

Conference paper

Constraint satisfaction with counting quantifiers 2
Martin, B. and Stacho, J. 2014. Constraint satisfaction with counting quantifiers 2. 9th International Computer Science Symposium in Russia, CSR 2014. Moscow, Russia 07 - 11 Jun 2014 Springer. pp. 259-272

Conference paper

  • 0
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month