The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Cinzia Bernardeschi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri
    Using Standard Verifier to Check Secure Information Flow in Java Bytecode. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:850-855 [Conf]
  2. Cinzia Bernardeschi, Alessandro Fantechi, Stefania Gnesi, Giorgio Mongardi
    Proving Safety Properties for Embedded Control Systems. [Citation Graph (0, 0)][DBLP]
    EDCC, 1996, pp:321-332 [Conf]
  3. Cinzia Bernardeschi, Alessandro Fantechi, Luca Simoncini
    Formal Reasoning on Fault Coverage of Fault Tolerant Techniques: A Case Study. [Citation Graph (0, 0)][DBLP]
    EDCC, 1994, pp:77-94 [Conf]
  4. Cinzia Bernardeschi, Gianluca Dini, Andrea Domenici
    FACT: A Tool for Code Generation from Communicating Automata. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2005, pp:313-318 [Conf]
  5. Cinzia Bernardeschi, Luca Simoncini, Alessandro Fantechi
    Validating the Design of Dependable Systems. [Citation Graph (0, 0)][DBLP]
    ISORC, 1998, pp:364-372 [Conf]
  6. Cinzia Bernardeschi, Nicoletta De Francesco, Luca Martini
    Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs: Extended Abstract. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:425-436 [Conf]
  7. Cinzia Bernardeschi, Andrea Bondavalli, Luca Simoncini
    From Data Flow Networks to Process Algebras. [Citation Graph (0, 0)][DBLP]
    PARLE, 1993, pp:740-743 [Conf]
  8. Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco
    Checking security of Java bytecode by abstract interpretation. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:229-236 [Conf]
  9. Cinzia Bernardeschi, Alessandro Fantechi, Stefania Gnesi
    Formal Validation of the GUARDS Inter-Consistency Mechanism. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1999, pp:420-430 [Conf]
  10. Roberto Barbuti, Luca Tesei, Cinzia Bernardeschi, Nicoletta De Francesco
    Fixing the Java bytecode verifier by a suitable type domain. [Citation Graph (0, 0)][DBLP]
    SEKE, 2002, pp:377-382 [Conf]
  11. Cinzia Bernardeschi, Alessandro Fantechi, Fabio Paternò
    Application of Correctness Preserving Transformations for Deriving Architectural Descriptions of Interactive Systems from User Interface Specifications. [Citation Graph (0, 0)][DBLP]
    SEKE, 1995, pp:234-243 [Conf]
  12. Cinzia Bernardeschi, Nicoletta De Francesco
    Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode. [Citation Graph (0, 0)][DBLP]
    VMCAI, 2002, pp:1-15 [Conf]
  13. Cinzia Bernardeschi, Nicoletta De Francesco, Gigliola Vaglini
    A Petri Nets Semantics for Data Flow Networks [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1995, v:32, n:4, pp:347-374 [Journal]
  14. Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco
    Analyzing Information Flow Properties in Assembly Code by Abstract Interpretation. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2004, v:47, n:1, pp:25-45 [Journal]
  15. Cinzia Bernardeschi, Alessandro Fantechi, Luca Simoncini
    Formally Verifying Fault Tolerant System Designs. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2000, v:43, n:3, pp:191-205 [Journal]
  16. Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci
    Using Control Dependencies for Space-Aware Bytecode Verification. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:2, pp:234-248 [Journal]
  17. Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci
    A Space-Aware Bytecode Verifier for Java Cards. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:1, pp:237-254 [Journal]
  18. Cinzia Bernardeschi, Alessandro Fantechi, Stefania Gnesi, Salvatore Larosa, Giorgio Mongardi, Dario Romano
    A Formal Verification Environment for Railway Signaling System Design. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 1998, v:12, n:2, pp:139-161 [Journal]
  19. Cinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri
    Concrete and Abstract Semantics to Check Secure Information Flow in Concurrent Programs. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2004, v:60, n:1-4, pp:81-98 [Journal]
  20. Cinzia Bernardeschi, Nicoletta De Francesco, Gigliola Vaglini
    An approach to system design based on P/T net simulation. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2001, v:43, n:10, pp:591-605 [Journal]
  21. Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco
    Abstract interpretation of operational semantics for secure information flow. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:83, n:2, pp:101-108 [Journal]
  22. Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci
    Using postdomination to reduce space requirements of data flow analysis. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:98, n:1, pp:11-18 [Journal]
  23. Cinzia Bernardeschi, Alessandro Fantechi, Stefania Gnesi
    An industrial application for the JACK environment. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1997, v:39, n:3, pp:249-264 [Journal]
  24. Cinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini
    Checking secure information flow in Java bytecode by code transformation and standard bytecode verification. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2004, v:34, n:13, pp:1225-1255 [Journal]
  25. Cinzia Bernardeschi, Alessandro Fantechi, Stefania Gnesi
    Model checking fault tolerant systems. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2002, v:12, n:4, pp:251-275 [Journal]
  26. Cinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri
    An abstract semantics tool for secure information flow of stack-based assembly programs. [Citation Graph (0, 0)][DBLP]
    Microprocessors and Microsystems, 2002, v:26, n:8, pp:391-398 [Journal]
  27. Cinzia Bernardeschi, Luca Martini
    Enforcement of applet boundaries in Java card systems. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:96-101 [Conf]
  28. Cinzia Bernardeschi, Luca Martini, Paolo Masci
    Java bytecode verification with dynamic structures. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:559-564 [Conf]

  29. Early Prototyping of Wireless Sensor Network Algorithms in PVS. [Citation Graph (, )][DBLP]


  30. Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002