|
Search the dblp DataBase
Stefano Bistarelli:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti
Defense trees for economic evaluation of security investments. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:416-423 [Conf]
- Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
Detecting and Eliminating the Cascade Vulnerability Problem from Multilevel Security Networks Using Soft Constraints. [Citation Graph (0, 0)][DBLP] AAAI, 2004, pp:808-813 [Conf]
- Stefano Bistarelli, Philippe Codognet, Yan Georget, Fabio Rossi
Labeling and Partial Arc Consistency for Soft Constraints. [Citation Graph (0, 0)][DBLP] APPIA-GULP-PRODE, 1999, pp:121-136 [Conf]
- Stefano Bistarelli, Stefano Frassi, Anna Vaccarelli
MOC via TOC Using a Mobile Agent Framework. [Citation Graph (0, 0)][DBLP] AVBPA, 2005, pp:464-473 [Conf]
- Stefano Bistarelli, Francesco Santini, Anna Vaccarelli
An Asymmetric Fingerprint Matching Algorithm for Java Card. [Citation Graph (0, 0)][DBLP] AVBPA, 2005, pp:279-288 [Conf]
- Stefano Bistarelli, Boi Faltings, Nicoleta Neagu
Interchangeability in Soft CSPs. [Citation Graph (0, 0)][DBLP] International Workshop on Constraint Solving and Constraint Logic Programming, 2002, pp:31-46 [Conf]
- Stefano Bistarelli, Philippe Codognet, Yan Georget, Francesca Rossi
Abstracting Soft Constraints. [Citation Graph (0, 0)][DBLP] New Trends in Constraints, 1999, pp:108-133 [Conf]
- Stefano Bistarelli, Hélène Fargier, Ugo Montanari, Francesca Rossi, Thomas Schiex, Gérard Verfaillie
Semiring-Based CSPs and Valued CSPs: Basic Properties and Comparison. [Citation Graph (0, 0)][DBLP] Over-Constrained Systems, 1995, pp:111-150 [Conf]
- Stefano Bistarelli, Philippe Codognet, Kin Chuen Hui, Jimmy Ho-Man Lee
Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search. [Citation Graph (0, 0)][DBLP] CP, 2003, pp:138-152 [Conf]
- Stefano Bistarelli, Boi Faltings, Nicoleta Neagu
Interchangeability in Soft CSPs. [Citation Graph (0, 0)][DBLP] CP, 2002, pp:726-731 [Conf]
- Stefano Bistarelli, Rosella Gennari, Francesca Rossi
Constraint Propagation for Soft Constraints: Generalization and Termination Conditions. [Citation Graph (0, 0)][DBLP] CP, 2000, pp:83-97 [Conf]
- Stefano Bistarelli, Jerome Kelleher, Barry O'Sullivan
Tradeoff Generation Using Soft Constraints. [Citation Graph (0, 0)][DBLP] CSCLP, 2003, pp:124-139 [Conf]
- Stefano Bistarelli, Francesca Rossi, Isabella Pilan
Abstracting Soft Constraints: Some Experimental Results on Fuzzy CSPs. [Citation Graph (0, 0)][DBLP] CSCLP, 2003, pp:107-123 [Conf]
- Nicoleta Neagu, Stefano Bistarelli, Boi Faltings
Experimental Evaluation of Interchangeability in Soft CSPs. [Citation Graph (0, 0)][DBLP] CSCLP, 2003, pp:140-153 [Conf]
- Stefano Bistarelli, Fabio Gadducci
Enhancing Constraints Manipulation in Semiring-Based Formalisms. [Citation Graph (0, 0)][DBLP] ECAI, 2006, pp:63-67 [Conf]
- Stefano Bistarelli, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable
Bipolar Preference Problems. [Citation Graph (0, 0)][DBLP] ECAI, 2006, pp:705-706 [Conf]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi
Soft Concurrent Constraint Programming. [Citation Graph (0, 0)][DBLP] ESOP, 2002, pp:53-67 [Conf]
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Roberto Marangoni, Fabio Martinelli
On Representing Biological Systems through Multiset Rewriting. [Citation Graph (0, 0)][DBLP] EUROCAST, 2003, pp:415-426 [Conf]
- Nicoleta Neagu, Stefano Bistarelli, Boi Faltings
On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems. [Citation Graph (0, 0)][DBLP] FLAIRS Conference, 2003, pp:187-191 [Conf]
- Stefano Bistarelli, Giandomenico Boffi, Fabio Rossi
Computer Algebra for Fingerprint Matching. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science, 2003, pp:811-820 [Conf]
- Stefano Bistarelli, Eugene C. Freuder, Barry O'Sullivan
Encoding Partial Constraint Satisfaction in the Semiring-Based Framework for Soft Constraints. [Citation Graph (0, 0)][DBLP] ICTAI, 2004, pp:240-245 [Conf]
- Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
Reasoning about Secure Interoperation Using Soft Constraints. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:173-186 [Conf]
- Stefano Bistarelli, Philippe Codognet, Kin Chuen Hui, Jimmy Ho-Man Lee
Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search. [Citation Graph (0, 0)][DBLP] IJCAI, 2003, pp:1364-1365 [Conf]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi
Constraint Solving over Semirings. [Citation Graph (0, 0)][DBLP] IJCAI (1), 1995, pp:624-630 [Conf]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi
Semiring-based Constraint Logic Programming. [Citation Graph (0, 0)][DBLP] IJCAI (1), 1997, pp:352-357 [Conf]
- Simon N. Foley, William J. Fitzgerald, Stefano Bistarelli, Barry O'Sullivan, Mícheál Ó Foghlú
Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration. [Citation Graph (0, 0)][DBLP] IPOM, 2006, pp:168-180 [Conf]
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:86-99 [Conf]
- Giampaolo Bella, Stefano Bistarelli
Soft Constraints for Security Protocol Analysis: Confidentiality. [Citation Graph (0, 0)][DBLP] PADL, 2001, pp:108-122 [Conf]
- Stefano Bistarelli, Philippe Codognet, Yan Georget, Francesca Rossi
Labeling and Partial Local Consistency for Soft Constraint Programming. [Citation Graph (0, 0)][DBLP] PADL, 2000, pp:230-248 [Conf]
- Stefano Bistarelli, Francesco Bonchi
Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining. [Citation Graph (0, 0)][DBLP] PKDD, 2005, pp:22-33 [Conf]
- Stefano Bistarelli, Simon N. Foley
Analysis of Integrity Policies using Soft Constraints. [Citation Graph (0, 0)][DBLP] POLICY, 2003, pp:77-80 [Conf]
- Stefano Bistarelli, Thom W. Frühwirth, Michael Marte
Soft constraint propagation and solving in CHRs. [Citation Graph (0, 0)][DBLP] SAC, 2002, pp:1-5 [Conf]
- Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
Modeling and detecting the cascade vulnerability problem using soft constraints. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:383-390 [Conf]
- Stefano Bistarelli, Eric Monfroy, Barry O'Sullivan
Editorial: special track on constraint solving and programming. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:364-365 [Conf]
- Stefano Bistarelli, Eric Monfroy, Barry O'Sullivan
Special track editorial: constraint solving and programming. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:392-393 [Conf]
- Chih-Cheng Hung, Agostinho C. Rosa, Stefano Bistarelli
AI and Computational Science Track Editorial. [Citation Graph (0, 0)][DBLP] SAC, 2003, pp:1- [Conf]
- Chih-Cheng Hung, Agostinho C. Rosa, Stefano Bistarelli
Editorial message: special track on artificial intelligence, computational logic and image analysis. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:3-4 [Conf]
- Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti
Using CP-nets as a guide for countermeasure selection. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:300-304 [Conf]
- Stefano Bistarelli, Simon N. Foley
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. [Citation Graph (0, 0)][DBLP] SAFECOMP, 2003, pp:130-143 [Conf]
- Stefano Bistarelli, Philippe Codognet, Francesca Rossi
An Abstraction Framework for Soft Constraints and Its Relationship with Constraint Propagation. [Citation Graph (0, 0)][DBLP] SARA, 2000, pp:71-86 [Conf]
- Giampaolo Bella, Stefano Bistarelli
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:104-119 [Conf]
- Giampaolo Bella, Stefano Bistarelli, Fabio Massacci
A Protocol's Life After Attacks.... [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:3-10 [Conf]
- Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
Biometrics to Enhance Smartcard Security. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:324-332 [Conf]
- Stefano Bistarelli, Philippe Codognet, Francesca Rossi
Abstracting soft constraints: Framework, properties, examples. [Citation Graph (0, 0)][DBLP] Artif. Intell., 2002, v:139, n:2, pp:175-211 [Journal]
- Giampaolo Bella, Stefano Bistarelli
Information Assurance for security protocols. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:4, pp:322-333 [Journal]
- Stefano Bistarelli, Rosella Gennari, Francesca Rossi
General Properties and Termination Conditions for Soft Constraint Propagation. [Citation Graph (0, 0)][DBLP] Constraints, 2003, v:8, n:1, pp:79-97 [Journal]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Thomas Schiex, Gérard Verfaillie, Hélène Fargier
Semiring-Based CSPs and Valued CSPs: Frameworks, Properties, and Comparison. [Citation Graph (0, 0)][DBLP] Constraints, 1999, v:4, n:3, pp:199-240 [Journal]
- Giampaolo Bella, Stefano Bistarelli
Soft Constraint Programming to Analysing Security Protocols [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi
Soft Concurrent Constraint Programming [Citation Graph (0, 0)][DBLP] CoRR, 2002, v:0, n:, pp:- [Journal]
- Stefano Bistarelli, Francesco Bonchi
Soft constraint based pattern mining. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 2007, v:62, n:1, pp:118-137 [Journal]
- Giampaolo Bella, Stefano Bistarelli, Simon N. Foley
Soft Constraints for Security. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:11-29 [Journal]
- Giampaolo Bella, Stefano Bistarelli, Pamela Peretti, Salvatore Riccobene
Augmented Risk Analysis. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:207-220 [Journal]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi
Soft Constraint Logic Programming and Generalized Shortest Path Problems. [Citation Graph (0, 0)][DBLP] J. Heuristics, 2002, v:8, n:1, pp:25-41 [Journal]
- Stefano Bistarelli, Francesca Rossi
Editorial. [Citation Graph (0, 0)][DBLP] J. Heuristics, 2006, v:12, n:4-5, pp:239-240 [Journal]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi
Semiring-based constraint satisfaction and optimization. [Citation Graph (0, 0)][DBLP] J. ACM, 1997, v:44, n:2, pp:201-236 [Journal]
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
Relating multiset rewriting and process algebras for security protocol analysis. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:3-47 [Journal]
- Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
A soft constraint-based approach to the cascade vulnerability problem. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:5, pp:699-720 [Journal]
- Stefano Bistarelli, Francesco Santini, Anna Vaccarelli
An asymmetric fingerprint matching algorithm for Java Card TM. [Citation Graph (0, 0)][DBLP] Pattern Anal. Appl., 2006, v:9, n:4, pp:359-376 [Journal]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi
Soft concurrent constraint programming. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Log., 2006, v:7, n:3, pp:563-589 [Journal]
- Stefano Bistarelli, Francesca Rossi
Semiring-based contstraint logic programming: syntax and semantics. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2001, v:23, n:1, pp:1-29 [Journal]
- Giampaolo Bella, Stefano Bistarelli
Soft Constraint Programming to Analysing Security Protocols. [Citation Graph (0, 0)][DBLP] TPLP, 2004, v:4, n:5-6, pp:545-572 [Journal]
- Barbara M. Smith, Stefano Bistarelli, Barry O'Sullivan
Constraint Symmetry for the Soft CSP. [Citation Graph (0, 0)][DBLP] CP, 2007, pp:872-879 [Conf]
- Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. [Citation Graph (0, 0)][DBLP] CP, 2007, pp:773-781 [Conf]
- Stefano Bistarelli, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable
Uncertainty in Bipolar Preference Problems. [Citation Graph (0, 0)][DBLP] CP, 2007, pp:782-789 [Conf]
- Stefano Bistarelli, Maria Silvia Pini, Francesca Rossi, Kristen Brent Venable
Bipolar Preference Problems: Framework, Properties and Solving Techniques. [Citation Graph (0, 0)][DBLP] CSCLP, 2006, pp:78-92 [Conf]
- Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti
Strategic Games on Defense Trees. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2006, pp:1-15 [Conf]
- Stefano Bistarelli, Francesco Bonchi
Extending the Soft Constraint Based Mining Paradigm. [Citation Graph (0, 0)][DBLP] KDID, 2006, pp:24-41 [Conf]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Francesco Santini
Unicast and Multicast Qos Routing with Soft Constraint Logic Programming [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Stefano Bistarelli, Ugo Montanari, Francesca Rossi, Francesco Santini
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:190, n:3, pp:111-127 [Journal]
Weighted Datalog and Levels of Trust. [Citation Graph (, )][DBLP]
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. [Citation Graph (, )][DBLP]
Semiring-Based Soft Constraints. [Citation Graph (, )][DBLP]
Timed Soft Concurrent Constraint Programs. [Citation Graph (, )][DBLP]
SCLP for Trust Propagation in Small-World Networks. [Citation Graph (, )][DBLP]
From Marriages to Coalitions: A Soft CSP Approach. [Citation Graph (, )][DBLP]
Solving CSPs with Naming Games. [Citation Graph (, )][DBLP]
A Common Computational Framework for Semiring-based Argumentation Systems. [Citation Graph (, )][DBLP]
A Soft Approach to Multi-objective Optimization. [Citation Graph (, )][DBLP]
Constraint Based Languages for Biological Reactions. [Citation Graph (, )][DBLP]
Capturing Fair Computations on Concurrent Constraint Language. [Citation Graph (, )][DBLP]
A Formal and Practical Framework for Constraint-Based Routing. [Citation Graph (, )][DBLP]
Soft Constraints for Dependable Service Oriented Architectures. [Citation Graph (, )][DBLP]
Propagating multitrust within trust networks. [Citation Graph (, )][DBLP]
C-semiring Frameworks for Minimum Spanning Tree Problems. [Citation Graph (, )][DBLP]
Soft Constraint Propagation and Solving in Constraint Handling Rules. [Citation Graph (, )][DBLP]
Fairness as a QoS Measure for Web Services [Citation Graph (, )][DBLP]
Soft Constraints for Quality Aspects in Service Oriented Architectures [Citation Graph (, )][DBLP]
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming. [Citation Graph (, )][DBLP]
A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.490secs
|