The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefano Bistarelli: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti
    Defense trees for economic evaluation of security investments. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:416-423 [Conf]
  2. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    AAAI, 2004, pp:808-813 [Conf]
  3. Stefano Bistarelli, Philippe Codognet, Yan Georget, Fabio Rossi
    Labeling and Partial Arc Consistency for Soft Constraints. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1999, pp:121-136 [Conf]
  4. Stefano Bistarelli, Stefano Frassi, Anna Vaccarelli
    MOC via TOC Using a Mobile Agent Framework. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2005, pp:464-473 [Conf]
  5. Stefano Bistarelli, Francesco Santini, Anna Vaccarelli
    An Asymmetric Fingerprint Matching Algorithm for Java Card™. [Citation Graph (0, 0)][DBLP]
    AVBPA, 2005, pp:279-288 [Conf]
  6. Stefano Bistarelli, Boi Faltings, Nicoleta Neagu
    Interchangeability in Soft CSPs. [Citation Graph (0, 0)][DBLP]
    International Workshop on Constraint Solving and Constraint Logic Programming, 2002, pp:31-46 [Conf]
  7. Stefano Bistarelli, Philippe Codognet, Yan Georget, Francesca Rossi
    Abstracting Soft Constraints. [Citation Graph (0, 0)][DBLP]
    New Trends in Constraints, 1999, pp:108-133 [Conf]
  8. Stefano Bistarelli, Hélène Fargier, Ugo Montanari, Francesca Rossi, Thomas Schiex, Gérard Verfaillie
    Semiring-Based CSPs and Valued CSPs: Basic Properties and Comparison. [Citation Graph (0, 0)][DBLP]
    Over-Constrained Systems, 1995, pp:111-150 [Conf]
  9. Stefano Bistarelli, Philippe Codognet, Kin Chuen Hui, Jimmy Ho-Man Lee
    Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search. [Citation Graph (0, 0)][DBLP]
    CP, 2003, pp:138-152 [Conf]
  10. Stefano Bistarelli, Boi Faltings, Nicoleta Neagu
    Interchangeability in Soft CSPs. [Citation Graph (0, 0)][DBLP]
    CP, 2002, pp:726-731 [Conf]
  11. Stefano Bistarelli, Rosella Gennari, Francesca Rossi
    Constraint Propagation for Soft Constraints: Generalization and Termination Conditions. [Citation Graph (0, 0)][DBLP]
    CP, 2000, pp:83-97 [Conf]
  12. Stefano Bistarelli, Jerome Kelleher, Barry O'Sullivan
    Tradeoff Generation Using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    CSCLP, 2003, pp:124-139 [Conf]
  13. Stefano Bistarelli, Francesca Rossi, Isabella Pilan
    Abstracting Soft Constraints: Some Experimental Results on Fuzzy CSPs. [Citation Graph (0, 0)][DBLP]
    CSCLP, 2003, pp:107-123 [Conf]
  14. Nicoleta Neagu, Stefano Bistarelli, Boi Faltings
    Experimental Evaluation of Interchangeability in Soft CSPs. [Citation Graph (0, 0)][DBLP]
    CSCLP, 2003, pp:140-153 [Conf]
  15. Stefano Bistarelli, Fabio Gadducci
    Enhancing Constraints Manipulation in Semiring-Based Formalisms. [Citation Graph (0, 0)][DBLP]
    ECAI, 2006, pp:63-67 [Conf]
  16. Stefano Bistarelli, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable
    Bipolar Preference Problems. [Citation Graph (0, 0)][DBLP]
    ECAI, 2006, pp:705-706 [Conf]
  17. Stefano Bistarelli, Ugo Montanari, Francesca Rossi
    Soft Concurrent Constraint Programming. [Citation Graph (0, 0)][DBLP]
    ESOP, 2002, pp:53-67 [Conf]
  18. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Roberto Marangoni, Fabio Martinelli
    On Representing Biological Systems through Multiset Rewriting. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2003, pp:415-426 [Conf]
  19. Nicoleta Neagu, Stefano Bistarelli, Boi Faltings
    On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2003, pp:187-191 [Conf]
  20. Stefano Bistarelli, Giandomenico Boffi, Fabio Rossi
    Computer Algebra for Fingerprint Matching. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2003, pp:811-820 [Conf]
  21. Stefano Bistarelli, Eugene C. Freuder, Barry O'Sullivan
    Encoding Partial Constraint Satisfaction in the Semiring-Based Framework for Soft Constraints. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2004, pp:240-245 [Conf]
  22. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    Reasoning about Secure Interoperation Using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:173-186 [Conf]
  23. Stefano Bistarelli, Philippe Codognet, Kin Chuen Hui, Jimmy Ho-Man Lee
    Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2003, pp:1364-1365 [Conf]
  24. Stefano Bistarelli, Ugo Montanari, Francesca Rossi
    Constraint Solving over Semirings. [Citation Graph (0, 0)][DBLP]
    IJCAI (1), 1995, pp:624-630 [Conf]
  25. Stefano Bistarelli, Ugo Montanari, Francesca Rossi
    Semiring-based Constraint Logic Programming. [Citation Graph (0, 0)][DBLP]
    IJCAI (1), 1997, pp:352-357 [Conf]
  26. Simon N. Foley, William J. Fitzgerald, Stefano Bistarelli, Barry O'Sullivan, Mícheál Ó Foghlú
    Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration. [Citation Graph (0, 0)][DBLP]
    IPOM, 2006, pp:168-180 [Conf]
  27. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
    Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:86-99 [Conf]
  28. Giampaolo Bella, Stefano Bistarelli
    Soft Constraints for Security Protocol Analysis: Confidentiality. [Citation Graph (0, 0)][DBLP]
    PADL, 2001, pp:108-122 [Conf]
  29. Stefano Bistarelli, Philippe Codognet, Yan Georget, Francesca Rossi
    Labeling and Partial Local Consistency for Soft Constraint Programming. [Citation Graph (0, 0)][DBLP]
    PADL, 2000, pp:230-248 [Conf]
  30. Stefano Bistarelli, Francesco Bonchi
    Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining. [Citation Graph (0, 0)][DBLP]
    PKDD, 2005, pp:22-33 [Conf]
  31. Stefano Bistarelli, Simon N. Foley
    Analysis of Integrity Policies using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:77-80 [Conf]
  32. Stefano Bistarelli, Thom W. Frühwirth, Michael Marte
    Soft constraint propagation and solving in CHRs. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:1-5 [Conf]
  33. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    Modeling and detecting the cascade vulnerability problem using soft constraints. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:383-390 [Conf]
  34. Stefano Bistarelli, Eric Monfroy, Barry O'Sullivan
    Editorial: special track on constraint solving and programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:364-365 [Conf]
  35. Stefano Bistarelli, Eric Monfroy, Barry O'Sullivan
    Special track editorial: constraint solving and programming. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:392-393 [Conf]
  36. Chih-Cheng Hung, Agostinho C. Rosa, Stefano Bistarelli
    AI and Computational Science Track Editorial. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:1- [Conf]
  37. Chih-Cheng Hung, Agostinho C. Rosa, Stefano Bistarelli
    Editorial message: special track on artificial intelligence, computational logic and image analysis. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:3-4 [Conf]
  38. Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti
    Using CP-nets as a guide for countermeasure selection. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:300-304 [Conf]
  39. Stefano Bistarelli, Simon N. Foley
    A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2003, pp:130-143 [Conf]
  40. Stefano Bistarelli, Philippe Codognet, Francesca Rossi
    An Abstraction Framework for Soft Constraints and Its Relationship with Constraint Propagation. [Citation Graph (0, 0)][DBLP]
    SARA, 2000, pp:71-86 [Conf]
  41. Giampaolo Bella, Stefano Bistarelli
    Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:104-119 [Conf]
  42. Giampaolo Bella, Stefano Bistarelli, Fabio Massacci
    A Protocol's Life After Attacks.... [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:3-10 [Conf]
  43. Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
    Biometrics to Enhance Smartcard Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:324-332 [Conf]
  44. Stefano Bistarelli, Philippe Codognet, Francesca Rossi
    Abstracting soft constraints: Framework, properties, examples. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2002, v:139, n:2, pp:175-211 [Journal]
  45. Giampaolo Bella, Stefano Bistarelli
    Information Assurance for security protocols. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:4, pp:322-333 [Journal]
  46. Stefano Bistarelli, Rosella Gennari, Francesca Rossi
    General Properties and Termination Conditions for Soft Constraint Propagation. [Citation Graph (0, 0)][DBLP]
    Constraints, 2003, v:8, n:1, pp:79-97 [Journal]
  47. Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Thomas Schiex, Gérard Verfaillie, Hélène Fargier
    Semiring-Based CSPs and Valued CSPs: Frameworks, Properties, and Comparison. [Citation Graph (0, 0)][DBLP]
    Constraints, 1999, v:4, n:3, pp:199-240 [Journal]
  48. Giampaolo Bella, Stefano Bistarelli
    Soft Constraint Programming to Analysing Security Protocols [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  49. Stefano Bistarelli, Ugo Montanari, Francesca Rossi
    Soft Concurrent Constraint Programming [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  50. Stefano Bistarelli, Francesco Bonchi
    Soft constraint based pattern mining. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2007, v:62, n:1, pp:118-137 [Journal]
  51. Giampaolo Bella, Stefano Bistarelli, Simon N. Foley
    Soft Constraints for Security. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal]
  52. Giampaolo Bella, Stefano Bistarelli, Pamela Peretti, Salvatore Riccobene
    Augmented Risk Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:207-220 [Journal]
  53. Stefano Bistarelli, Ugo Montanari, Francesca Rossi
    Soft Constraint Logic Programming and Generalized Shortest Path Problems. [Citation Graph (0, 0)][DBLP]
    J. Heuristics, 2002, v:8, n:1, pp:25-41 [Journal]
  54. Stefano Bistarelli, Francesca Rossi
    Editorial. [Citation Graph (0, 0)][DBLP]
    J. Heuristics, 2006, v:12, n:4-5, pp:239-240 [Journal]
  55. Stefano Bistarelli, Ugo Montanari, Francesca Rossi
    Semiring-based constraint satisfaction and optimization. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1997, v:44, n:2, pp:201-236 [Journal]
  56. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
    Relating multiset rewriting and process algebras for security protocol analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:1, pp:3-47 [Journal]
  57. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    A soft constraint-based approach to the cascade vulnerability problem. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:699-720 [Journal]
  58. Stefano Bistarelli, Francesco Santini, Anna Vaccarelli
    An asymmetric fingerprint matching algorithm for Java Card TM. [Citation Graph (0, 0)][DBLP]
    Pattern Anal. Appl., 2006, v:9, n:4, pp:359-376 [Journal]
  59. Stefano Bistarelli, Ugo Montanari, Francesca Rossi
    Soft concurrent constraint programming. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2006, v:7, n:3, pp:563-589 [Journal]
  60. Stefano Bistarelli, Francesca Rossi
    Semiring-based contstraint logic programming: syntax and semantics. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2001, v:23, n:1, pp:1-29 [Journal]
  61. Giampaolo Bella, Stefano Bistarelli
    Soft Constraint Programming to Analysing Security Protocols. [Citation Graph (0, 0)][DBLP]
    TPLP, 2004, v:4, n:5-6, pp:545-572 [Journal]
  62. Barbara M. Smith, Stefano Bistarelli, Barry O'Sullivan
    Constraint Symmetry for the Soft CSP. [Citation Graph (0, 0)][DBLP]
    CP, 2007, pp:872-879 [Conf]
  63. Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna
    Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. [Citation Graph (0, 0)][DBLP]
    CP, 2007, pp:773-781 [Conf]
  64. Stefano Bistarelli, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable
    Uncertainty in Bipolar Preference Problems. [Citation Graph (0, 0)][DBLP]
    CP, 2007, pp:782-789 [Conf]
  65. Stefano Bistarelli, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable
    Bipolar Preference Problems: Framework, Properties and Solving Techniques. [Citation Graph (0, 0)][DBLP]
    CSCLP, 2006, pp:78-92 [Conf]
  66. Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti
    Strategic Games on Defense Trees. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:1-15 [Conf]
  67. Stefano Bistarelli, Francesco Bonchi
    Extending the Soft Constraint Based Mining Paradigm. [Citation Graph (0, 0)][DBLP]
    KDID, 2006, pp:24-41 [Conf]
  68. Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Francesco Santini
    Unicast and Multicast Qos Routing with Soft Constraint Logic Programming [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  69. Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Francesco Santini
    Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:190, n:3, pp:111-127 [Journal]

  70. Weighted Datalog and Levels of Trust. [Citation Graph (, )][DBLP]


  71. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. [Citation Graph (, )][DBLP]


  72. Semiring-Based Soft Constraints. [Citation Graph (, )][DBLP]


  73. Timed Soft Concurrent Constraint Programs. [Citation Graph (, )][DBLP]


  74. SCLP for Trust Propagation in Small-World Networks. [Citation Graph (, )][DBLP]


  75. From Marriages to Coalitions: A Soft CSP Approach. [Citation Graph (, )][DBLP]


  76. Solving CSPs with Naming Games. [Citation Graph (, )][DBLP]


  77. A Common Computational Framework for Semiring-based Argumentation Systems. [Citation Graph (, )][DBLP]


  78. A Soft Approach to Multi-objective Optimization. [Citation Graph (, )][DBLP]


  79. Constraint Based Languages for Biological Reactions. [Citation Graph (, )][DBLP]


  80. Capturing Fair Computations on Concurrent Constraint Language. [Citation Graph (, )][DBLP]


  81. A Formal and Practical Framework for Constraint-Based Routing. [Citation Graph (, )][DBLP]


  82. Soft Constraints for Dependable Service Oriented Architectures. [Citation Graph (, )][DBLP]


  83. Propagating multitrust within trust networks. [Citation Graph (, )][DBLP]


  84. C-semiring Frameworks for Minimum Spanning Tree Problems. [Citation Graph (, )][DBLP]


  85. Soft Constraint Propagation and Solving in Constraint Handling Rules. [Citation Graph (, )][DBLP]


  86. Fairness as a QoS Measure for Web Services [Citation Graph (, )][DBLP]


  87. Soft Constraints for Quality Aspects in Service Oriented Architectures [Citation Graph (, )][DBLP]


  88. Analyzing Security Scenarios Using Defence Trees and Answer Set Programming. [Citation Graph (, )][DBLP]


  89. A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.490secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002