|
Search the dblp DataBase
Adriano Valenzano:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Exploiting Symmetries for Testing Equivalence in the Spi Calculus. [Citation Graph (0, 0)][DBLP] ATVA, 2004, pp:135-149 [Conf]
- Davide Pozza, Riccardo Sisto, Luca Durante, Adriano Valenzano
Comparing lexical analysis tools for buffer overflow detection in network software. [Citation Graph (0, 0)][DBLP] COMSWARE, 2006, pp:- [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. [Citation Graph (0, 0)][DBLP] DIMVA, 2005, pp:69-84 [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] FORTE, 2003, pp:224-239 [Conf]
- Luca Durante, Riccardo Sisto, Adriano Valenzano
A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification. [Citation Graph (0, 0)][DBLP] FORTE, 2000, pp:155-170 [Conf]
- Riccardo Sisto, Luigi Ciminiera, Adriano Valenzano
Probabilistic Characterization of Algebraic Protocol Specifications. [Citation Graph (0, 0)][DBLP] ICDCS, 1992, pp:260-268 [Conf]
- Paolo Montuschi, Adriano Valenzano, Luigi Ciminiera
On the Equivalence of IEEE 802.4 and FDDI Timed Token Protocols. [Citation Graph (0, 0)][DBLP] INFOCOM, 1991, pp:435-440 [Conf]
- Adriano Valenzano, Paolo Montuschi, Luigi Ciminiera
On the Behavior of Control Token Protocols with Asynchronous and Synchronous Traffic. [Citation Graph (0, 0)][DBLP] INFOCOM, 1989, pp:348-355 [Conf]
- Marco Ajmone Marsan, Andrea Bianco, Luigi Ciminiera, Riccardo Sisto, Adriano Valenzano
Integrating Peforamnce Analysis in the Context of LOTOS-Based Design. [Citation Graph (0, 0)][DBLP] MASCOTS, 1994, pp:292-298 [Conf]
- Claudio Demartini, S. Rivoira, Adriano Valenzano
Product Data Exchange Using STEP. [Citation Graph (0, 0)][DBLP] PROLAMAT, 1998, pp:257-270 [Conf]
- Luigi Ciminiera, Paolo Montuschi, Adriano Valenzano
Some Properties of Double-Ring Networks with Real-Time Constraints. [Citation Graph (0, 0)][DBLP] IEEE Real-Time Systems Symposium, 1989, pp:360-368 [Conf]
- Luigi Ciminiera, Adriano Valenzano
Performance Analysis of Acknowledgment Mechanisms in Token-Bus Networks. [Citation Graph (0, 0)][DBLP] IEEE Real-Time Systems Symposium, 1987, pp:179-185 [Conf]
- Luca Durante, Riccardo Sisto, Adriano Valenzano
A LOTOS specification of the SERCOS field-bus protocol. [Citation Graph (0, 0)][DBLP] SEKE, 1994, pp:139-147 [Conf]
- Adriano Valenzano, Riccardo Sisto, Luigi Ciminiera
Modeling the execution of LOTOS specifications by cooperating extended finite state machines. [Citation Graph (0, 0)][DBLP] SPDP, 1990, pp:780-785 [Conf]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] TACAS, 2003, pp:284-298 [Conf]
- Gianluca Cena, Luca Durante, Riccardo Sisto, Adriano Valenzano
Adaptive bandwidth balancing mechanisms for DQDB networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 1997, v:20, n:9, pp:804-819 [Journal]
- Gianluca Cena, Adriano Valenzano
Delay analysis of priority promotion systems. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:13, pp:1252-1262 [Journal]
- Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus. [Citation Graph (0, 0)][DBLP] Int. J. Found. Comput. Sci., 2006, v:17, n:4, pp:815-832 [Journal]
- Luigi Ciminiera, Claudio Demartini, Adriano Valenzano
A Practical Study of Semi-automatic OSI Protocol Implementation. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 1988, v:18, n:3, pp:255-277 [Journal]
- Adriano Valenzano, Riccardo Sisto, Luigi Ciminiera
Rapid Prototyping of Protocols from LOTOS Specifications. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 1993, v:23, n:1, pp:31-54 [Journal]
- Riccardo Sisto, Luigi Ciminiera, Adriano Valenzano
A Protocol for Multirendezvous of LOTOS Processes. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1991, v:40, n:4, pp:437-447 [Journal]
- Riccardo Sisto, Adriano Valenzano
Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behavior Expressions. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1995, v:44, n:12, pp:1361-1370 [Journal]
- Marco Ajmone Marsan, Andrea Bianco, Luigi Ciminiera, Riccardo Sisto, Adriano Valenzano
A LOTOS extension for the performance analysis of distributed systems. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 1994, v:2, n:2, pp:151-165 [Journal]
- Luca Durante, Riccardo Sisto, Adriano Valenzano
Automatic testing equivalence verification of spi calculus specifications. [Citation Graph (0, 0)][DBLP] ACM Trans. Softw. Eng. Methodol., 2003, v:12, n:2, pp:222-284 [Journal]
- Luigi Ciminiera, Adriano Valenzano
Authentication Mechanisms in Microprocessor-Based Local Area Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1989, v:15, n:5, pp:654-658 [Journal]
- Adriano Valenzano, Paolo Montuschi, Luigi Ciminiera
Some Properties of Timed Token Medium Access Protocols. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1990, v:16, n:8, pp:858-869 [Journal]
- M. Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems. [Citation Graph (0, 0)][DBLP] DepCoS-RELCOMEX, 2007, pp:11-18 [Conf]
- M. Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] DepCoS-RELCOMEX, 2007, pp:153-160 [Conf]
- Gianluca Cena, Ivan Cibrario Bertolotti, Adriano Valenzano
Modelling CANopen communications according to the socket paradigm. [Citation Graph (0, 0)][DBLP] ETFA, 2005, pp:- [Conf]
An arbitration-based access scheme for EtherCAT networks. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.008secs
|