Foundations of Computing group
Title | Foundations of Computing group |
---|
Latest research outputs
Sort by Date Title
ProEva: runtime proactive performance evaluation based on continuous-time markov chains
Su, G., Chen, T., Feng, Y. and Rosenblum, D. 2017. ProEva: runtime proactive performance evaluation based on continuous-time markov chains. 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). Buenos Aires, Argentina 20 - 28 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-495 https://doi.org/10.1109/ICSE.2017.51Conference paper
Analyzing APIs documentation and code to detect directive defects
Zhou, Y., Gu, R., Chen, T., Huang, Z., Panichella, S. and Gall, H. 2017. Analyzing APIs documentation and code to detect directive defects. 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE). Buenos Aires, Argentina 20 - 28 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 27-37 https://doi.org/10.1109/ICSE.2017.11Conference paper
The packing chromatic number of the infinite square lattice is between 13 and 15
Martin, B., Raimondi, F., Chen, T. and Martin, J. 2017. The packing chromatic number of the infinite square lattice is between 13 and 15. Discrete Applied Mathematics. 225, pp. 136-142. https://doi.org/10.1016/j.dam.2017.03.013Article
Managing software uninstall with negative trust
Primiero, G. and Boender, J. 2017. Managing software uninstall with negative trust. 11th IFIP WG 11.11 International Conference, IFIPTM 2017. Gothenburg, Sweden 12 - 16 Jun 2017 Springer. pp. 79-93 https://doi.org/10.1007/978-3-319-59171-1_7Conference paper
Trust and distrust in contradictory information transmission
Primiero, G., Raimondi, F., Bottone, M. and Tagliabue, J. 2017. Trust and distrust in contradictory information transmission. Applied Network Science. 2 (1). https://doi.org/10.1007/s41109-017-0029-0Article
Rohit Parikh on logic, language and society
Baskent, C., Moss, L. and Ramanujam, R. (ed.) 2017. Rohit Parikh on logic, language and society. Springer.Edited Book
Algorithmic iteration for computational intelligence
Primiero, G. 2017. Algorithmic iteration for computational intelligence. Minds and Machines. 27 (3), pp. 521-543. https://doi.org/10.1007/s11023-017-9423-8Article
Quantum Bootstrap Aggregation
Windridge, D. and Nagarajan, R. 2017. Quantum Bootstrap Aggregation. de Barros, J., Coecke, B. and Pothos, E. (ed.) Quantum Interaction. San Francisco, CA, USA 20 - 22 Jul 2016 Springer. pp. 115-121 https://doi.org/10.1007/978-3-319-52289-0_9Conference paper
Preliminary investigation of self-as-context in people with fibromyalgia
Yu, L., Norton, S., Almarzooqi, S. and McCracken, L. 2017. Preliminary investigation of self-as-context in people with fibromyalgia. British Journal of Pain. 11 (3), pp. 134-143. https://doi.org/10.1177/2049463717708962Article
A novel symbolic approach to verifying epistemic properties of programs
Gorogiannis, N., Raimondi, F. and Boureanu, I. 2017. A novel symbolic approach to verifying epistemic properties of programs. Twenty-Sixth International Joint Conference on Artificial Intelligence. Melbourne, Australia 19 - 25 Aug 2017 International Joint Conferences on Artificial Intelligence. pp. 206-212 https://doi.org/10.24963/ijcai.2017/30Conference paper
CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees
Bauereiß, T., Pesenti Gritti, A., Popescu, A. and Raimondi, F. 2017. CoSMeDis: a distributed social media platform with formally verified confidentiality guarantees. 38th IEEE Symposium on Security and Privacy. San Jose, CA, USA 22 - 26 May 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 729-748 https://doi.org/10.1109/SP.2017.24Conference paper
Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition
Tirunagari, S., Poh, N., Wells, K., Bober, M., Gorden, I. and Windridge, D. 2017. Movement correction in DCE-MRI through windowed and reconstruction dynamic mode decomposition. Machine Vision and Applications. 28 (3-4), pp. 393-407. https://doi.org/10.1007/s00138-017-0835-5Article
Encoding monomorphic and polymorphic types
Blanchette, J., Böhme, S., Popescu, A. and Smallbone, N. 2017. Encoding monomorphic and polymorphic types. Logical Methods in Computer Science. 12 (4). https://doi.org/10.2168/LMCS-12(4:13)2016Article
Minimum cell connection in line segment arrangements
Alt, H., Cabello, S., Giannopoulos, P. and Knauer, C. 2017. Minimum cell connection in line segment arrangements. International Journal of Computational Geometry and Applications. 27 (3), pp. 159-176. https://doi.org/10.1142/s0218195917500017Article
Contradictory information flow in networks with trust and distrust
Primiero, G., Bottone, M., Raimondi, F. and Tagliabue, J. 2016. Contradictory information flow in networks with trust and distrust. 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016). Milan 01 - 06 Dec 2016 Springer. https://doi.org/10.1007/978-3-319-50901-3_29Conference paper
A model for trustworthy orchestration in the internet of things
Bottone, M., Primiero, G., Raimondi, F. and De Florio, V. 2016. A model for trustworthy orchestration in the internet of things. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 171-174 https://doi.org/10.1109/IE.2016.37Conference paper
Towards formal analysis of insider threats for auctions
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963Conference paper
A calculus for distrust and mistrust
Primiero, G. 2016. A calculus for distrust and mistrust. Tenth IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016. Darmstadt, Germany 18 - 22 Jul 2016 Springer. https://doi.org/10.1007/978-3-319-41354-9_15Conference paper
Isabelle Modelchecking for insider threats
Kammueller, F. 2016. Isabelle Modelchecking for insider threats. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 196-210 https://doi.org/10.1007/978-3-319-47072-6_13Conference paper
Refactoring preserves security
Kammueller, F. 2016. Refactoring preserves security. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 238-245 https://doi.org/10.1007/978-3-319-47072-6_17Conference paper
Verifying pushdown multi-agent systems against strategy logics
Chen, T., Song, F. and Wu, Z. 2016. Verifying pushdown multi-agent systems against strategy logics. IJCAI 2016: 25th International Joint Conferences on Artificial Intelligence (IJCAI). New York, New York, USA 09 - 15 Jul 2016 AAAI Press / International Joint Conferences on Artificial Intelligence. pp. 180-186Conference paper
Information in the philosophy of computer science
Primiero, G. 2016. Information in the philosophy of computer science. in: Floridi, L. (ed.) The Routledge Handbook of Philosophy of Information Routledge. pp. 90-106Book chapter
When logic meets engineering: introduction to logical issues in the history and philosophy of computer science
De Mol, L. and Primiero, G. 2015. When logic meets engineering: introduction to logical issues in the history and philosophy of computer science. History and Philosophy of Logic. 36 (3), pp. 195-204. https://doi.org/10.1080/01445340.2015.1084183Article
Towards a novel approach for defect localization based on part-of-speech and invocation
Tong, Y., Zhou, Y., Fang, L. and Chen, T. 2015. Towards a novel approach for defect localization based on part-of-speech and invocation. Internetware 2015: 7th Asia-Pacific Symposium on Internetware. Wuhan, China 06 Nov 2016 Association for Computing Machinery (ACM). pp. 52-61 https://doi.org/10.1145/2875913.2875919Conference paper
A computationally grounded, weighted doxastic logic
Chen, T., Primiero, G., Raimondi, F. and Rungta, N. 2016. A computationally grounded, weighted doxastic logic. Studia Logica. 104 (4), pp. 679-703. https://doi.org/10.1007/s11225-015-9621-4Article
Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking
Gu, J., Zhou, Y., Wu, W. and Chen, T. 2015. Analyzing eventual leader election protocols for dynamic systems by probabilistic model checking. First International Conference on Cloud Computing and Security (ICCCS 2015). Nanjing, China 13 - 15 Aug 2015 Springer. pp. 192-205 https://doi.org/10.1007/978-3-319-27051-7_17Conference paper
Minimizing transitive trust threats in software management systems
Boender, J., Primiero, G. and Raimondi, F. 2015. Minimizing transitive trust threats in software management systems. 13th Annual Conference on Privacy, Security and Trust (PST 2015). Izmir, Turkey 21 - 23 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 191-198 https://doi.org/10.1109/PST.2015.7232973Conference paper
A complete decision procedure for linearly compositional separation logic with data constraints
Gu, X., Chen, T. and Wu, Z. 2016. A complete decision procedure for linearly compositional separation logic with data constraints. IJCAR 2016: 8th International Joint Conference on Automated Reasoning. University of Coimbra, Portugal 27 Jun - 02 Jul 2016 Springer. pp. 532-549 https://doi.org/10.1007/978-3-319-40229-1_36Conference paper
Disproving inductive entailments in separation logic via base pair approximation
Brotherston, J. and Gorogiannis, N. 2015. Disproving inductive entailments in separation logic via base pair approximation. TABLEAUX 2015: 24th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods. Wroclaw, Poland 21 - 24 Sep 2015 Springer. https://doi.org/10.1007/978-3-319-24312-2_20Conference paper
Game theoretical semantics for some non-classical logics
Baskent, C. 2016. Game theoretical semantics for some non-classical logics. Journal of Applied Non-Classical Logics. 26 (3), pp. 208-239. https://doi.org/10.1080/11663081.2016.1225488Article
An iterative decision-making scheme for Markov decision processes and its application to self-adaptive systems
Su, G., Chen, T., Feng, Y., Rosenblum, D. and Thiagarajan, P. 2016. An iterative decision-making scheme for Markov decision processes and its application to self-adaptive systems. 19th International Conference Fundamental Approaches to Software Engineering (FASE 2016). Eindhoven, The Netherlands 02 - 08 Apr 2016 Springer. pp. 269-286 https://doi.org/10.1007/978-3-662-49665-7_16Conference paper
Asymptotic perturbation bounds for probabilistic model checking with empirically determined probability parameters
Su, G., Feng, Y., Chen, T. and Rosenblum, D. 2016. Asymptotic perturbation bounds for probabilistic model checking with empirically determined probability parameters. IEEE Transactions on Software Engineering. 42 (7), pp. 623-639. https://doi.org/10.1109/TSE.2015.2508444Article
Model checking for symbolic-heap separation logic with inductive predicates
Brotherston, J., Gorogiannis, N., Kanovich, M. and Rowe, R. 2016. Model checking for symbolic-heap separation logic with inductive predicates. POPL 2016: 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. St. Petersburg, FL, USA 20 - 22 Jan 2016 ACM SIGPLAN Notices. pp. 84-96 https://doi.org/10.1145/2837614.2837621Conference paper
Perspectives on interrogative models of inquiry: developments in Inquiry and Questions
Baskent, C. (ed.) 2016. Perspectives on interrogative models of inquiry: developments in Inquiry and Questions. Switzerland Springer.Edited Book
On the satisfiability of indexed linear temporal logics
Chen, T., Song, F. and Wu, Z. 2015. On the satisfiability of indexed linear temporal logics. 26th International Conference on Concurrency Theory, CONCUR 2015. Madrid, Spain 01 - 04 Sep 2015 Schloss Dagstuhl Leibniz-Zentrum für Informatik. pp. 254-267 https://doi.org/10.4230/LIPIcs.CONCUR.2015.254Conference paper
A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP)
Raheem, A., Lasebae, A. and Loo, J. 2014. A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP). 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Beijing, China Institute of Electrical and Electronics Engineers (IEEE). pp. 840-845 https://doi.org/10.1109/TrustCom.2014.135Conference paper
A framework for trustworthiness assessment based on fidelity in cyber and physical domains
De Florio, V. and Primiero, G. 2015. A framework for trustworthiness assessment based on fidelity in cyber and physical domains. 2nd International Workshop on Computational Antifragility and Antifragile Engineering (ANTIFRAGILE 2015). London, UK 02 - 05 Jun 2015 Elsevier. https://doi.org/10.1016/j.procs.2015.05.092Conference paper
Formalization of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2015. Formalization of quantum protocols using Coq. The 12th International Workshop on Quantum Physics and Logic (QPL 2015). Oxford, United Kingdom 15 - 17 Jul 2015 pp. 71-83Conference paper
From complexity to algebra and back: digraph classes, collapsibility and the PGP
Carvalho, C., Madelaine, F. and Martin, B. 2015. From complexity to algebra and back: digraph classes, collapsibility and the PGP. 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). Kyoto, Japan 06 - 10 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 462-474Conference paper
Constraint satisfaction with counting quantifiers 2
Martin, B. and Stacho, J. 2014. Constraint satisfaction with counting quantifiers 2. 9th International Computer Science Symposium in Russia, CSR 2014. Moscow, Russia 07 - 11 Jun 2014 Springer. pp. 259-272Conference paper
0
total views0
total downloads0
views this month0
downloads this month