Sfoglia per Autore
Modelling and Detecting the Cascade Vulnerabiliy Problem using Soft Constraints
2004 Bistarelli, Stefano; Foley, SIMON N.; O'Sullivan, Barry
Encoding Partial Constraint Satisfaction in the Semiring-Based Framework for Soft Constraints
2004 Bistarelli, Stefano; Freuder, EUGENE C.; Osullivan, Barry
Abstracting Soft Constraints: Some experimental results on Fuzzy CSPs
2004 Bistarelli, Stefano; Rossi, Francesca; Pilan, Isabella
Soft Constraint Propagation and Solving in Constraint Handling Rules
2004 Bistarelli, Stefano; Fruewirth, Thom; Marte, Michael; Rossi, Francesca
A soft constraint-based approach to the cascade vulnerability problem
2005 Bistarelli, Stefano; Foley, SIMON N.; O'Sullivan, Barry
Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis
2005 Bistarelli, Stefano; Cervesato, Iliano; Lenzini, Gabriele; Martinelli, Fabio
Special track on constraint solving and programming - 20th Annual ACM Symposium on Applied Computing
2005 Bistarelli, Stefano; Monfroy, Eric; O'Sullivan, Barry
Biometrics to Enhance Smartcard Security
2005 Bella, Giampaolo; Bistarelli, Stefano; Martinelli, Fabio
Interestingness is not a Dichotomy: Introducing Softness in Constrained Pattern Mining
2005 Bistarelli, Stefano; Bonchi, Francesco
MOC via TOC Using a Mobile Agent Framework
2005 Bistarelli, Stefano; Frassi, Stefano; Vaccarelli, Anna
Multilevel Security and Quality of Protection
2005 SIMON N., Foley; Bistarelli, Stefano; Barry, O'Sullivan; John, Herbert; Garret, Swart
Reasoning about Secure Interoperation using Soft Constraints
2005 Bistarelli, Stefano; SIMON N., Foley; Barry, Osullivan
A protocol's life after attacks...
2005 Bella, Giampaolo; Bistarelli, Stefano
Information Assurance for Security Protocols
2005 Giampaolo, Bella; Bistarelli, Stefano
An Asymmetric Fingerprint Matching Algorithm for Java Card
2005 Bistarelli, Stefano; Santini, Francesco; Vaccarelli, Anna
Retaliation: Can We Live with Flaws?
2006 Bella, Giampaolo; Bistarelli, Stefano; Massacci, Fabio
Extending the Soft Constraint Based Mining Paradigm
2006 Bistarelli, Stefano; Bonchi, Francesco
Strategic games on defense trees
2006 Bistarelli, Stefano; Peretti, Pamela; Dall'Aglio, Marco
Soft Concurrent Constraint Programming
2006 Bistarelli, Stefano; Montanari, Ugo; Rossi, Francesca
Journal of Heuristics: Editorial
2006 Bistarelli, Stefano; Rossi, Francesca
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Modelling and Detecting the Cascade Vulnerabiliy Problem using Soft Constraints | 2004 | Bistarelli, Stefano; Foley, SIMON N.; O'Sullivan, Barry | |
Encoding Partial Constraint Satisfaction in the Semiring-Based Framework for Soft Constraints | 2004 | Bistarelli, Stefano; Freuder, EUGENE C.; Osullivan, Barry | |
Abstracting Soft Constraints: Some experimental results on Fuzzy CSPs | 2004 | Bistarelli, Stefano; Rossi, Francesca; Pilan, Isabella | |
Soft Constraint Propagation and Solving in Constraint Handling Rules | 2004 | Bistarelli, Stefano; Fruewirth, Thom; Marte, Michael; Rossi, Francesca | |
A soft constraint-based approach to the cascade vulnerability problem | 2005 | Bistarelli, Stefano; Foley, SIMON N.; O'Sullivan, Barry | |
Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis | 2005 | Bistarelli, Stefano; Cervesato, Iliano; Lenzini, Gabriele; Martinelli, Fabio | |
Special track on constraint solving and programming - 20th Annual ACM Symposium on Applied Computing | 2005 | Bistarelli, Stefano; Monfroy, Eric; O'Sullivan, Barry | |
Biometrics to Enhance Smartcard Security | 2005 | Bella, Giampaolo; Bistarelli, Stefano; Martinelli, Fabio | |
Interestingness is not a Dichotomy: Introducing Softness in Constrained Pattern Mining | 2005 | Bistarelli, Stefano; Bonchi, Francesco | |
MOC via TOC Using a Mobile Agent Framework | 2005 | Bistarelli, Stefano; Frassi, Stefano; Vaccarelli, Anna | |
Multilevel Security and Quality of Protection | 2005 | SIMON N., Foley; Bistarelli, Stefano; Barry, O'Sullivan; John, Herbert; Garret, Swart | |
Reasoning about Secure Interoperation using Soft Constraints | 2005 | Bistarelli, Stefano; SIMON N., Foley; Barry, Osullivan | |
A protocol's life after attacks... | 2005 | Bella, Giampaolo; Bistarelli, Stefano | |
Information Assurance for Security Protocols | 2005 | Giampaolo, Bella; Bistarelli, Stefano | |
An Asymmetric Fingerprint Matching Algorithm for Java Card | 2005 | Bistarelli, Stefano; Santini, Francesco; Vaccarelli, Anna | |
Retaliation: Can We Live with Flaws? | 2006 | Bella, Giampaolo; Bistarelli, Stefano; Massacci, Fabio | |
Extending the Soft Constraint Based Mining Paradigm | 2006 | Bistarelli, Stefano; Bonchi, Francesco | |
Strategic games on defense trees | 2006 | Bistarelli, Stefano; Peretti, Pamela; Dall'Aglio, Marco | |
Soft Concurrent Constraint Programming | 2006 | Bistarelli, Stefano; Montanari, Ugo; Rossi, Francesca | |
Journal of Heuristics: Editorial | 2006 | Bistarelli, Stefano; Rossi, Francesca |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile