Nome |
# |
Towards attack-resistant Aggregate Computing using trust mechanisms, file e18b865d-541f-1ee6-e053-3a05fe0ae544
|
47
|
Design and Verification of Trusted Collective Adaptive Systems, file e18b865d-5465-1ee6-e053-3a05fe0ae544
|
46
|
Detection of repackaged mobile applications through a collaborative approach, file e18b865d-9070-1ee6-e053-3a05fe0ae544
|
18
|
"Worth one minute": An anonymous rewarding platform for crowd-sensing systems, file e18b865c-eecc-1ee6-e053-3a05fe0ae544
|
16
|
A Process-algebraic Approach for the Analysis of Probabilistic Non-interference, file e18b865b-7a8f-1ee6-e053-3a05fe0ae544
|
12
|
Teoria degli automi per linguaggi formali, file e18b865b-8841-1ee6-e053-3a05fe0ae544
|
12
|
On the Modeling and Verification of Collective and Cooperative Systems, file 84e681c9-db34-4123-8344-f0b1a745f834
|
9
|
Introducing a flexible rewarding platform for mobile crowd-sensing applications, file e18b865c-7da2-1ee6-e053-3a05fe0ae544
|
8
|
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices, file e18b865d-2736-1ee6-e053-3a05fe0ae544
|
8
|
Modeling and verification of trust and reputation systems, file e18b865d-9076-1ee6-e053-3a05fe0ae544
|
7
|
Trust Evidence Logic, file e18b865d-9b75-1ee6-e053-3a05fe0ae544
|
7
|
Estimating the Maximum Information Leakage, file e18b865b-7a8b-1ee6-e053-3a05fe0ae544
|
6
|
Probabilistic Information Flow in a Process Algebra, file e18b865b-7efa-1ee6-e053-3a05fe0ae544
|
6
|
Foundations of Security Analysis and Design VII, file e18b865b-8c5e-1ee6-e053-3a05fe0ae544
|
6
|
Expected-Delay-Summing Weak Bisimilarity for Markov Automata, file e18b865b-a7c0-1ee6-e053-3a05fe0ae544
|
6
|
Design and validation of a trust-based opportunity-enabled risk management system, file e18b865c-0b8d-1ee6-e053-3a05fe0ae544
|
6
|
Analysis of Diagnostic Images of Artworks and Feature Extraction: Design of a Methodology, file e18b865d-5220-1ee6-e053-3a05fe0ae544
|
6
|
Classification of Security Properties in a Linda-like Process Algebra, file e18b865b-7a91-1ee6-e053-3a05fe0ae544
|
5
|
Approximating Markovian Testing Equivalence, file e18b865b-8666-1ee6-e053-3a05fe0ae544
|
5
|
User-Centric Networking - Future Perspectives, file e18b865b-8ae1-1ee6-e053-3a05fe0ae544
|
5
|
A Calculus for Trust and Reputation Systems, file e18b865b-8ae2-1ee6-e053-3a05fe0ae544
|
5
|
A Collaborative Framework for Generating
Probabilistic Contracts, file e18b865b-8d7f-1ee6-e053-3a05fe0ae544
|
5
|
Quantitative Aspects of Programming Languages and Systems over the past 2^4 years and beyond, file e18b865c-ee64-1ee6-e053-3a05fe0ae544
|
5
|
Discrete Time Generative-Reactive Probabilistic Processes with Different Advancing Speeds, file e18b865b-7a8c-1ee6-e053-3a05fe0ae544
|
4
|
Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless CommunicationsSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, file e18b865b-887f-1ee6-e053-3a05fe0ae544
|
4
|
On the Tradeoff Among Trust, Privacy, and Cost in Incentive-Based Networks, file e18b865b-8ae3-1ee6-e053-3a05fe0ae544
|
4
|
Detection of repackaged mobile applications through a collaborative approach, file e18b865b-ab5a-1ee6-e053-3a05fe0ae544
|
4
|
Theory of Knowing Machines: Revisiting Gödel and the Mechanistic Thesis, file e18b865b-e530-1ee6-e053-3a05fe0ae544
|
4
|
Design and Verification of Trusted Collective Adaptive Systems, file e18b865c-83c8-1ee6-e053-3a05fe0ae544
|
4
|
Handling Communications in Process Algebraic Architectural Description Languages: Modeling, Verification, and Implementation, file e18b865c-9a53-1ee6-e053-3a05fe0ae544
|
4
|
A Process Algebraic Approach to Software Architecture Design, file e18b865b-82a7-1ee6-e053-3a05fe0ae544
|
3
|
Handling Communications in Process Algebraic Architectural Description Languages: Modeling, Verification, and Implementation, file e18b865b-83b8-1ee6-e053-3a05fe0ae544
|
3
|
A Formal Framework for Modeling Trust and Reputation in Collective Adaptive Systems, file e18b865b-cf7a-1ee6-e053-3a05fe0ae544
|
3
|
Towards attack-resistant Aggregate Computing using trust mechanisms, file e18b865c-9d02-1ee6-e053-3a05fe0ae544
|
3
|
Reasoning About Ignorance and Beliefs, file e18b865d-3a83-1ee6-e053-3a05fe0ae544
|
3
|
A hierarchical characterization of ignorance in epistemic Logic, file 31554802-5077-451a-9427-61f8e996a7d7
|
2
|
Branching Bisimulation Semantics Enables Noninterference Analysis of Reversible Systems, file 4222781d-bf99-46ff-995f-a7250ec61c8c
|
2
|
A Formal Approach to the Integrated Analysis of Security and QoS, file e18b865b-78a3-1ee6-e053-3a05fe0ae544
|
2
|
Mixing Logics and Rewards for the Component-Oriented Specification of Performance Measures, file e18b865b-7a88-1ee6-e053-3a05fe0ae544
|
2
|
On Securing Real Time Speech Transmission over the Internet: An Experimental Study, file e18b865b-7a8d-1ee6-e053-3a05fe0ae544
|
2
|
Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances, file e18b865b-8001-1ee6-e053-3a05fe0ae544
|
2
|
European Performance Engineering Workshop (EPEW 2010), file e18b865b-829c-1ee6-e053-3a05fe0ae544
|
2
|
Modeling and verification of trust and reputation systems, file e18b865b-a409-1ee6-e053-3a05fe0ae544
|
2
|
Modeling and Verification of the Worth-One-Minute Security Protocols, file e18b865d-0d17-1ee6-e053-3a05fe0ae544
|
2
|
From belief to trust: A quantitative framework based on modal logic, file e18b865d-ba77-1ee6-e053-3a05fe0ae544
|
2
|
A Methodology Based on Formal Methods for Predicting the Impact of Dynamic Power Management, file e18b865b-7cab-1ee6-e053-3a05fe0ae544
|
1
|
Predicting the Functional/Performance Impact of Dynamic Power Management, file e18b865b-8003-1ee6-e053-3a05fe0ae544
|
1
|
A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference, file e18b865b-8328-1ee6-e053-3a05fe0ae544
|
1
|
Weak Behavioral Equivalences for Verifying Secure and Performance-Aware Component-Based Systems, file e18b865b-8393-1ee6-e053-3a05fe0ae544
|
1
|
Performability Measure Specification: Combining CSRL and MSL, file e18b865b-84f5-1ee6-e053-3a05fe0ae544
|
1
|
Virtual Currency and Reputation-Based Cooperation Incentives in User-Centric Networks, file e18b865b-8a4a-1ee6-e053-3a05fe0ae544
|
1
|
Do the Self-Knowing Machines Dream of Knowing Their Factivity?, file e18b865b-aa26-1ee6-e053-3a05fe0ae544
|
1
|
A Framework Balancing Privacy and Cooperation Incentives in User-Centric Networks, file e18b865b-b139-1ee6-e053-3a05fe0ae544
|
1
|
Alcune note sui Teoremi di Incompletezza di Gödel e la conoscenza delle macchine, file e18b865b-d14e-1ee6-e053-3a05fe0ae544
|
1
|
Introducing a flexible rewarding platform for mobile crowd-sensing applications, file e18b865c-7bbc-1ee6-e053-3a05fe0ae544
|
1
|
Weak Markovian Bisimilarity: Abstracting from Prioritized/Weighted Internal Immediate Actions, file e18b865c-7e17-1ee6-e053-3a05fe0ae544
|
1
|
TwoTowers 4.0: Towards the Integration of Security Analysis and Performance Evaluation, file e18b865c-8065-1ee6-e053-3a05fe0ae544
|
1
|
An Algebraic Model for Evaluating the Performance of an ATM Switch with Explicit Rate Marking, file e18b865c-81e3-1ee6-e053-3a05fe0ae544
|
1
|
Component-Oriented Verification of Noninterference, file e18b865c-83fd-1ee6-e053-3a05fe0ae544
|
1
|
Italian Conference on Theoretical Computer Science (ICTCS 2018), file e18b865c-b0e6-1ee6-e053-3a05fe0ae544
|
1
|
Data Privacy Management, and Security Assurance.
10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papers, file e18b865c-d2fc-1ee6-e053-3a05fe0ae544
|
1
|
Data Privacy Management and Security Assurance.
11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings, file e18b865c-d359-1ee6-e053-3a05fe0ae544
|
1
|
Special Issue of the Italian Conference on Theoretical Computer Science 2018, file e18b865d-0184-1ee6-e053-3a05fe0ae544
|
1
|
Algoritmi di Image Analysis applicati alle immagini diagnostiche, file e18b865d-aa6d-1ee6-e053-3a05fe0ae544
|
1
|
On the modeling and verification of the spread of fake news, algebraically, file e18b865d-b0e1-1ee6-e053-3a05fe0ae544
|
1
|
Totale |
339 |