Antonella Santone
Orcid: 0000-0002-2634-4456
According to our database1,
Antonella Santone
authored at least 252 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Comput. Virol. Hacking Tech., June, 2024
Picker Blinder: a framework for automatic injection of malicious inter-app communication.
J. Comput. Virol. Hacking Tech., June, 2024
LA-ViT: A Network With Transformers Constrained by Learned-Parameter-Free Attention for Interpretable Grading in a New Laryngeal Histopathology Image Dataset.
IEEE J. Biomed. Health Informatics, June, 2024
Deep Convolutional Generative Adversarial Networks in Image-Based Android Malware Detection.
Comput., June, 2024
Alzheimer's Disease Evaluation Through Visual Explainability by Means of Convolutional Neural Networks.
Int. J. Neural Syst., February, 2024
EAI Endorsed Trans. Pervasive Health Technol., 2024
MamlFormer: Priori-experience guiding transformer network via manifold adversarial multi-modal learning for laryngeal histopathological grading.
Inf. Fusion, 2024
Isolation forest-voting fusion-multioutput: A stroke risk classification method based on the multidimensional output of abnormal sample detection.
Comput. Methods Programs Biomed., 2024
An automatic radiomic-based approach for disease localization: A pilot study on COVID-19.
Comput. Medical Imaging Graph., 2024
On the Adoption of Explainable Deep Learning for Image-Based Network Traffic Classification.
Proceedings of the 14th International Conference on Simulation and Modeling Methodologies, 2024
Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Fifth International Conference on Intelligent Data Science Technologies and Applications, 2024
Proceedings of the 19th International Conference on Software Technologies, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning.
Proceedings of the 26th International Conference on Enterprise Information Systems, 2024
Spiral Drawing Test and Explainable Convolutional Neural Networks for Parkinson's Disease Detection.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
Evaluating the Impact of Generative Adversarial Network in Android Malware Detection.
Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering, 2024
Security Policy Generation and Verification through Large Language Models: A Proposal.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 17th International Joint Conference on Biomedical Engineering Systems and Technologies, 2024
Formal Methods for Attack Detection in Autonomous Driving Systems: The FORESEEN Project.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2024
2023
Explainable Convolutional Neural Networks for Brain Cancer Detection and Localisation.
Sensors, September, 2023
Diabetic retinopathy detection and diagnosis by means of robust and explainable convolutional neural networks.
Neural Comput. Appl., August, 2023
Interpretable laryngeal tumor grading of histopathological images via depth domain adaptive network with integration gradient CAM and priori experience-guided attention.
Comput. Biol. Medicine, March, 2023
A ViT-AMC Network With Adaptive Model Fusion and Multiobjective Optimization for Interpretable Laryngeal Tumor Grading From Histopathological Images.
IEEE Trans. Medical Imaging, 2023
ACM Trans. Knowl. Discov. Data, 2023
IEEE Access, 2023
A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Feasibility of Tree-Based Machine Learning Models to Discriminate Safe and Unsafe Posture During Weight Lifting.
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023
Proceedings of the IEEE International Conference on Metrology for eXtended Reality, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Benchmarking YOLO Models for Automatic Reading in Smart Metering Systems: A Performance Comparison Analysis.
Proceedings of the International Conference on Machine Learning and Applications, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Fuzzy Systems, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
J. Comput. Virol. Hacking Tech., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
FABNet: Fusion Attention Block and Transfer Learning for Laryngeal Cancer Tumor Grading in P63 IHC Histopathology Images.
IEEE J. Biomed. Health Informatics, 2022
Int. J. Decis. Support Syst. Technol., 2022
Comput. Methods Programs Biomed., 2022
A novel methodology for head and neck carcinoma treatment stage detection by means of model checking.
Artif. Intell. Medicine, 2022
Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps.
Proceedings of the Security and Trust Management - 18th International Workshop, 2022
A Real-time Method for CAN Bus Intrusion Detection by Means of Supervised Machine Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Intelligent Decision Technologies, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
On the Resilience of Shallow Machine Learning Classification in Image-based Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022
Explainable Retinopathy Diagnosis and Localisation by means of Class Activation Mapping.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the Fifteenth International Conference on Machine Vision, 2022
Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE International Conference on Fuzzy Systems, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
Smart Grid monitoring through Deep Learning for Image-based Automatic Dial Meter Reading.
Proceedings of the IEEE International Conference on Big Data, 2022
Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal.
Proceedings of the IEEE International Conference on Big Data, 2022
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022
Proceedings of the 22nd IEEE International Conference on Bioinformatics and Bioengineering, 2022
AII, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
J. Comput. Virol. Hacking Tech., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Am. Medical Informatics Assoc., 2021
Towards an interpretable deep learning model for mobile malware detection and family identification.
Comput. Secur., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the NLPIR 2021: 5th International Conference on Natural Language Processing and Information Retrieval, Sanya, China, December 17, 2021
Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Exploiting Supervised Machine Learning for Driver Detection in a Real-World Environment.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
A Method for Automatic Penetration Testing and Mitigation: A <i>Red Hat</i> Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Android Collusion Detection by means of Audio Signal Analysis with Machine Learning techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Colluding Covert Channel for Malicious Information Exfiltration in Android Environment.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
J. Comput. Virol. Hacking Tech., 2020
Model checking and machine learning techniques for <i>HummingBad</i> mobile malware detection and mitigation.
Simul. Model. Pract. Theory, 2020
DECAB-LSTM: Deep Contextualized Attentional Bidirectional LSTM for cancer hallmark classification.
Knowl. Based Syst., 2020
J. Inf. Secur. Appl., 2020
Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences.
Inf., 2020
BPM perspectives to support ICSs: Exploiting the integration of formal verifications into investment service provision processes.
Ind. Manag. Data Syst., 2020
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2020
Model checking for malicious family detection and phylogenetic analysis in mobile environment.
Comput. Secur., 2020
Explainable Deep Learning for Pulmonary Disease and Coronavirus COVID-19 Detection from X-rays.
Comput. Methods Programs Biomed., 2020
An ensemble learning approach for brain cancer detection exploiting radiomic features.
Comput. Methods Programs Biomed., 2020
Comput. Electr. Eng., 2020
Comput. Electr. Eng., 2020
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020
Evaluating Deep Learning Classification Reliability in Android Malware Family Detection.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
Image-based Malware Family Detection: An Assessment between Feature Extraction and Classification Techniques.
Proceedings of the 5th International Conference on Internet of Things, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Enhanced Privacy and Data Protection using Natural Language Processing and Artificial Intelligence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Software Eng., 2019
Soft Comput., 2019
IEEE Syst. J., 2019
J. Parallel Distributed Comput., 2019
Prostate Gleason Score Detection and Cancer Treatment Through Real-Time Formal Verification.
IEEE Access, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
A Blockchain Based Proposal for Protecting Healthcare Systems through Formal Methods.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics.
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 11th International Conference on Agents and Artificial Intelligence, 2019
Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
A Methodology for Real-Time Data Verification exploiting Deep Learning and Model Checking.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
J. Comput. Virol. Hacking Tech., 2018
J. Parallel Distributed Comput., 2018
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018
Proceedings of the Computer Safety, Reliability, and Security, 2018
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018
Proceedings of the Second Italian Conference on Cyber Security, Milan, Italy, February 6th - to, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
A Formal Methodology for Notational Analysis and Real-Time Decision Support in Sport Environment.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017
Diabetes Mellitus Affected Patients Classification and Diagnosis through Machine Learning Techniques.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016
Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT 2016) - Volume 1: ICSOFT-EA, Lisbon, Portugal, July 24, 2016
Proceedings of the 4th FME Workshop on Formal Methods in Software Engineering, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015
Proceedings of the 24th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2015
Proceedings of the Software Technologies - 10th International Joint Conference, 2015
Model Checking to Improve Precision of Design Pattern Instances Identification in OO Systems.
Proceedings of the ICSOFT-PT 2015, 2015
Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking.
Proceedings of the 3rd IEEE/ACM FME Workshop on Formal Methods in Software Engineering, 2015
Proceedings of the Formal Aspects of Component Software - 12th International Conference, 2015
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015
2014
ACM Trans. Softw. Eng. Methodol., 2014
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014
Proceedings of the 2014 IEEE 23rd International WETICE Conference, 2014
Proceedings of the 2014 IEEE World Congress on Services, 2014
2013
Incremental construction of systems: An efficient characterization of the lacking sub-system.
Sci. Comput. Program., 2013
Application of Equivalence Checking in a Loan Origination Process in Banking Industry.
Proceedings of the 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Partial Order Interpretation of a Mu-Calculus-Like Temporal Logic.
Proceedings of the ICSOFT 2013, 2013
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013
2012
Proceedings of the Proceeding of the 6th International Workshop on Software Clones, 2012
Modelling and Analysing Social Networks through Formal Methods and Heuristic Searches.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012
2011
Proceedings of the Proceeding of the 5th ICSE International Workshop on Software Clones, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2009
A Formula Driven Incremental Construction of Web Service Compositions.
Proceedings of the ICSOFT 2009, 2009
Proceedings of the Advances in Software Engineering, 2009
Proceedings of the Advances in Software Engineering, 2009
2008
Softw. Test. Verification Reliab., 2008
2007
Inf. Sci., 2007
Proceedings of the 2nd International Workshop on Service Oriented Software Engineering: in conjunction with the 6th ESEC/FSE joint meeting, 2007
2006
J. Comput. Syst. Sci., 2006
Proceedings of the 6th International Workshop on Automated Verification of Critical Systems, 2006
2005
Compositionality and locality for improving model checking in the selective mu-calculus.
Sci. Comput. Program., 2005
J. Comput. Syst. Sci., 2005
Inf. Comput., 2005
2004
Microprocess. Microsystems, 2004
Proceedings of the Fourth Workshop on Language Descriptions, Tools, and Applications, 2004
2003
IEEE Trans. Software Eng., 2003
J. Autom. Reason., 2003
Abstract Interpretation and Model Checking for Checking Secure Information Flow in Concurrent Systems.
Fundam. Informaticae, 2003
2002
Efficient model checking of properties of a distributed application: a multimedia case study.
Softw. Test. Verification Reliab., 2002
Softw. Test. Verification Reliab., 2002
Microprocess. Microsystems, 2002
Int. J. Found. Comput. Sci., 2002
Automatic verification of concurrent systems using a formula-based compositional approach.
Acta Informatica, 2002
Proceedings of the 14th international conference on Software engineering and knowledge engineering, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
Comput. J., 2001
2000
Compositionality for Improving Model Checking.
Proceedings of the Formal Techniques for Distributed System Development, 2000
1999
Softw. Pract. Exp., 1999
J. Comput. Syst. Sci., 1999
Inf. Process. Lett., 1999
Proceedings of the FM'99 - Formal Methods, 1999
1998
Sci. Comput. Program., 1998
1997
Acta Informatica, 1997
Selective µ-calculus: New Modal Operators for Proving Properties on Reduced Transition Systems.
Proceedings of the Formal Description Techniques and Protocol Specification, 1997
1996
Proceedings of the Programming Languages: Implementations, 1996
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996
1995
Modeling OR-Parallel Execution of Prolog using CHOCS.
Proceedings of the Logic Programming, 1995