Dr Giuseppe Primiero


NameDr Giuseppe Primiero
Job titleSenior Lecturer in Computing Science
Research institute
Primary appointmentS&T School Leadership
Contact categoryAcademic staff (past)

Research outputs

Value-sensitive co-design for resilient information systems

Primiero, G., Barn, B. and Barn, R. 2020. Value-sensitive co-design for resilient information systems. Studies in Logic, Grammar and Rhetoric. 63 (1), pp. 141-164. https://doi.org/10.2478/slgr-2020-0032

Annotated natural deduction for adaptive reasoning

Allo, P. and Primiero, G. 2019. Annotated natural deduction for adaptive reasoning. in: Baskent, C. and Ferguson, T. (ed.) Graham Priest on Dialetheism and Paraconsistency Springer.

Negative trust for conflict resolution in software management

Primiero, G. and Boender, J. 2018. Negative trust for conflict resolution in software management. Web Intelligence. 16 (4), pp. 251-271. https://doi.org/10.3233/web-180393

Multi-agent based simulations of block-free distributed ledgers

Bottone, M., Raimondi, F. and Primiero, G. 2018. Multi-agent based simulations of block-free distributed ledgers. The 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA). Krakow, Poland 16 - 18 May 2018 IEEE. pp. 585-590 https://doi.org/10.1109/WAINA.2018.00149

MIRTO: an open-source robotic platform for education

Androutsopoulos, K., Aristodemou, L., Boender, J., Bottone, M., Currie, E., El-Aroussi, I., Fields, B., Gheri, L., Gorogiannis, N., Heeney, M., Micheletti, M., Loomes, M., Margolis, M., Petridis, M., Piermarteri, A., Primiero, G., Raimondi, F. and Weldin, N. 2018. MIRTO: an open-source robotic platform for education. 3rd European Conference on Software Engineering Education. Seeon, Germany 14 - 15 Jun 2018 Association for Computing Machinery (ACM). pp. 55-62 https://doi.org/10.1145/3209087.3209106

Simulation of a trust and reputation based mitigation protocol for a black hole style attack on VANETs

Martorana, A., Primiero, G. and Tagliabue, J. 2018. Simulation of a trust and reputation based mitigation protocol for a black hole style attack on VANETs. 2018 IEEE European Symposium on Security and Privacy Workshops - S4CIP’18: 3rd Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. London, United Kingdom 27 Apr 2018 Institute of Electrical and Electronics Engineers (IEEE). pp. 127-135 https://doi.org/10.1109/EuroSPW.2018.00025

The logic of identity and copy for computational artefacts

Angius, N. and Primiero, G. 2018. The logic of identity and copy for computational artefacts. Journal of Logic and Computation. 28 (6), pp. 1293-1322. https://doi.org/10.1093/logcom/exy012

Trust and distrust in contradictory information transmission

Primiero, G., Raimondi, F., Bottone, M. and Tagliabue, J. 2017. Trust and distrust in contradictory information transmission. Applied Network Science. 2 (1). https://doi.org/10.1007/s41109-017-0029-0

Managing software uninstall with negative trust

Primiero, G. and Boender, J. 2017. Managing software uninstall with negative trust. 11th IFIP WG 11.11 International Conference, IFIPTM 2017. Gothenburg, Sweden 12 - 16 Jun 2017 Springer. pp. 79-93 https://doi.org/10.1007/978-3-319-59171-1_7

A proof-theoretic trust and reputation model for VANET

Primiero, G., Raimondi, F., Chen, T. and Nagarajan, R. 2017. A proof-theoretic trust and reputation model for VANET. S4CIP’17: 2nd Workshop on Safety & Security aSSurance for Critical Infrastructures Protection. Paris, France 29 Apr 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 146-152 https://doi.org/10.1109/EuroSPW.2017.64

Algorithmic iteration for computational intelligence

Primiero, G. 2017. Algorithmic iteration for computational intelligence. Minds and Machines. 27 (3), pp. 521-543. https://doi.org/10.1007/s11023-017-9423-8

Contradictory information flow in networks with trust and distrust

Primiero, G., Bottone, M., Raimondi, F. and Tagliabue, J. 2016. Contradictory information flow in networks with trust and distrust. 5th International Workshop on Complex Networks and their Applications (COMPLEX NETWORKS 2016). Milan 01 - 06 Dec 2016 Springer. https://doi.org/10.1007/978-3-319-50901-3_29

Teaching functional patterns through robotic applications

Boender, J., Currie, E., Loomes, M., Primiero, G. and Raimondi, F. 2016. Teaching functional patterns through robotic applications. The 4th International Workshop on Trends in Functional Programming in Education, TFPIE 2015. Sophia-Antipolis, France 02 Jun 2015 Open Publishing Association. pp. 17-29 https://doi.org/10.4204/EPTCS.230.2

A model for trustworthy orchestration in the internet of things

Bottone, M., Primiero, G., Raimondi, F. and De Florio, V. 2016. A model for trustworthy orchestration in the internet of things. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 171-174 https://doi.org/10.1109/IE.2016.37

Implementing virtual pheromones in BDI robots using MQTT and Jason

Bottone, M., Palumbo, F., Primiero, G., Raimondi, F. and Stocker, R. 2016. Implementing virtual pheromones in BDI robots using MQTT and Jason. 2016 5th IEEE International Conference on Cloud Networking (Cloudnet). Pisa, Italy 03 - 05 Oct 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 196-199 https://doi.org/10.1109/CloudNet.2016.22

From raw data to agent perceptions for simulation, verification, and monitoring

Bottone, M., Primiero, G., Raimondi, F. and Rungta, N. 2016. From raw data to agent perceptions for simulation, verification, and monitoring. 12th International Conference on Intelligent Environment 2016:- 5th International Workshop on Reliability of Intelligent Environments (WoRIE’16). London, United Kingdom 14 - 16 Sep 2016 IOS Press. pp. 66-75 https://doi.org/10.3233/978-1-61499-690-3-66

A calculus for distrust and mistrust

Primiero, G. 2016. A calculus for distrust and mistrust. Tenth IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016. Darmstadt, Germany 18 - 22 Jul 2016 Springer. https://doi.org/10.1007/978-3-319-41354-9_15

Information in the philosophy of computer science

Primiero, G. 2016. Information in the philosophy of computer science. in: Floridi, L. (ed.) The Routledge Handbook of Philosophy of Information Routledge. pp. 90-106

When logic meets engineering: introduction to logical issues in the history and philosophy of computer science

De Mol, L. and Primiero, G. 2015. When logic meets engineering: introduction to logical issues in the history and philosophy of computer science. History and Philosophy of Logic. 36 (3), pp. 195-204. https://doi.org/10.1080/01445340.2015.1084183

A computationally grounded, weighted doxastic logic

Chen, T., Primiero, G., Raimondi, F. and Rungta, N. 2016. A computationally grounded, weighted doxastic logic. Studia Logica. 104 (4), pp. 679-703. https://doi.org/10.1007/s11225-015-9621-4

Minimizing transitive trust threats in software management systems

Boender, J., Primiero, G. and Raimondi, F. 2015. Minimizing transitive trust threats in software management systems. 13th Annual Conference on Privacy, Security and Trust (PST 2015). Izmir, Turkey 21 - 23 Jul 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 191-198 https://doi.org/10.1109/PST.2015.7232973

Software theory change for resilient near-complete specifications

Primiero, G. and Raimondi, F. 2015. Software theory change for resilient near-complete specifications. Procedia Computer Science. 52, pp. 988-995. https://doi.org/10.1016/j.procs.2015.05.091

A framework for trustworthiness assessment based on fidelity in cyber and physical domains

De Florio, V. and Primiero, G. 2015. A framework for trustworthiness assessment based on fidelity in cyber and physical domains. 2nd International Workshop on Computational Antifragility and Antifragile Engineering (ANTIFRAGILE 2015). London, UK 02 - 05 Jun 2015 Elsevier. https://doi.org/10.1016/j.procs.2015.05.092

Realist consequence, epistemic inference, computational correctness

Primiero, G. 2015. Realist consequence, epistemic inference, computational correctness. in: Koslow, A. and Buchsbaum, A. (ed.) The road to universal logic: Festschrift for the 50th Birthday of Jean-Yves Béziau Volume II Springer International Publishing. pp. 573-588

Towards cyber-physical systems as services: the ASIP protocol

Bordoni, M., Bottone, M., Fields, B., Gorogiannis, N., Margolis, M., Primiero, G. and Raimondi, F. 2015. Towards cyber-physical systems as services: the ASIP protocol. 2015 IEEE/ACM 1st International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS). Florence, Italy 17 - 17 May 2015 IEEE. pp. 52-55 https://doi.org/10.1109/SEsCPS.2015.18

An approach to early evaluation of informational privacy requirements

Barn, B., Primiero, G. and Barn, R. 2015. An approach to early evaluation of informational privacy requirements. 30th Annual ACM Symposium on Applied Computing. Salamanca, Spain 13 - 17 Apr 2015 Association for Computing Machinery (ACM). pp. 1370-1375 https://doi.org/10.1145/2695664.2695788

Programming the MIRTO robot with neurons

Huyck, C., Primiero, G. and Raimondi, F. 2014. Programming the MIRTO robot with neurons. Procedia Computer Science. 41, pp. 75-82. https://doi.org/10.1016/j.procs.2014.11.087

Modeling human behaviour with higher order logic: insider threats

Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13

On malfunctioning software

Floridi, L., Fresco, N. and Primiero, G. 2015. On malfunctioning software. Synthese. 192 (4), pp. 1199-1220. https://doi.org/10.1007/s11229-014-0610-3

On the ontology of the computing process and the epistemology of the computed

Primiero, G. 2014. On the ontology of the computing process and the epistemology of the computed. Philosophy & Technology. 27 (3), pp. 485-489. https://doi.org/10.1007/s13347-014-0174-7

Modeling human behaviour with higher order logic: insider threats

Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39

Algorithmic check of standards for information quality dimensions

Primiero, G. 2014. Algorithmic check of standards for information quality dimensions. in: Floridi, L. and Illari, P. (ed.) The philosophy of information quality Springer.

The role of resilience and value for effective co-design of information systems

Barn, B., Barn, R. and Primiero, G. 2014. The role of resilience and value for effective co-design of information systems. in: Proceedings of the Conference of the International Association for Computing and Philosophy (IACAP 14) Springer Synthese Library.

Facing computing as technique: towards a history and philosophy of computing

De Mol, L. and Primiero, G. 2014. Facing computing as technique: towards a history and philosophy of computing. Philosophy & Technology. 27 (3), pp. 321-326. https://doi.org/10.1007/s13347-014-0169-4

Model checking degrees of belief in a system of agents

Primiero, G., Raimondi, F. and Rungta, N. 2014. Model checking degrees of belief in a system of agents. AAMAS 2014: 13th International Conference on Autonomous Agents and Multiagent Systems. Paris, France 05 - 09 May 2014 International Foundation for Autonomous Agents and Multiagent Systems. pp. 133-140

J-Calc: a typed lambda calculus for intuitionistic justification logic

Pouliasis, K. and Primiero, G. 2014. J-Calc: a typed lambda calculus for intuitionistic justification logic. Electronic Notes in Theoretical Computer Science. 300, pp. 71-87. https://doi.org/10.1016/j.entcs.2013.12.012

A typed natural deduction calculus to reason about secure trust

Primiero, G. and Raimondi, F. 2014. A typed natural deduction calculus to reason about secure trust. 2014 Twelfth Annual Conference on Privacy, Security and Trust (PST). Toronto, Canada 23 - 24 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 379-382 https://doi.org/10.1109/PST.2014.6890963

A racket-based robot to teach first-year computer science

Androutsopoulos, K., Gorogiannis, N., Loomes, M., Margolis, M., Primiero, G., Raimondi, F., Varsani, P., Weldin, N. and Zivanovic, A. 2014. A racket-based robot to teach first-year computer science. 7 th European Lisp Symposium. IRCAM, Paris, France 05 - 06 May 2014 pp. 54-61

The semantics of untrustworthiness

Primiero, G. and Laszlo, K. 2016. The semantics of untrustworthiness. Topoi. 35 (1). https://doi.org/10.1007/s11245-013-9227-2

A taxonomy of errors for information systems

Primiero, G. 2014. A taxonomy of errors for information systems. Minds and Machines. 24 (3), pp. 249-273. https://doi.org/10.1007/s11023-013-9307-5

A modal type theory for formalizing trusted communications

Primiero, G. and Taddeo, M. 2012. A modal type theory for formalizing trusted communications. Journal of Applied Logic. 10 (1), pp. 92-114. https://doi.org/10.1016/j.jal.2011.12.002

Proceeding in abstraction. From concepts to types and the recent perspective on information

Primiero, G. 2009. Proceeding in abstraction. From concepts to types and the recent perspective on information. History and Philosophy of Logic. 30 (3), pp. 257-282. https://doi.org/10.1080/01445340902872630

An epistemic logic for becoming informed

Primiero, G. 2009. An epistemic logic for becoming informed. Synthese. 167 (2), pp. 363-389. https://doi.org/10.1007/s11229-008-9413-8
  • 191
    total views of outputs
  • 9
    total downloads of outputs
  • 191
    views of outputs this month
  • 9
    downloads of outputs this month