Francesco Buccafurri

Orcid: 0000-0003-0448-8464

Affiliations:
  • Mediterranea University of Reggio Calabria, DIMET, Italy


According to our database1, Francesco Buccafurri authored at least 183 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Secure electronic monitoring of sex offenders.
J. Reliab. Intell. Environ., December, 2024

Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System.
Future Internet, July, 2024

MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT.
IEEE Trans. Dependable Secur. Comput., 2024

Enforcing security policies on interacting authentication systems.
Comput. Secur., 2024

A hierarchical distributed trusted location service achieving location k-anonymity against the global observer.
Comput. Networks, 2024

K-Anonymous Payments in Pseudonymous Blockchains.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024

Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2024

Towards K-Anonymous Payments in Ethereum.
Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024), 2024

A Framework for Secure Internet of Things Applications.
Proceedings of the 10th International Conference on Control, 2024

2023
MQTT-A: A Broker-Bridging P2P Architecture to Achieve Anonymity in MQTT.
IEEE Internet Things J., September, 2023

Enabling anonymized open-data linkage by authorized parties.
J. Inf. Secur. Appl., May, 2023

An Ethereum-based solution for energy trading in smart grids.
Digit. Commun. Networks, February, 2023

Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services.
Electron. Gov. an Int. J., 2023

Adapting P2P Mixnets to Provide Anonymity for Uplink-Intensive Applications.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

A Greedy Method for Coverage Path Planning of Autonomous Heterogeneous UAVs.
Proceedings of the 9th International Conference on Control, 2023

2022
A protocol for anonymous short communications in social networks and its application to proximity-based services.
Online Soc. Networks Media, 2022

A centralized contact-tracing protocol for the COVID-19 pandemic.
Inf. Sci., 2022

A Blockchain-Based Framework to Enhance Anonymous Services with Accountability Guarantees.
Future Internet, 2022

An Anonymous Overlay Routing Protocol for Uplink-Intensive Applications.
CoRR, 2022

An integrity-preserving technique for range queries over data streams in two-tier sensor networks.
Comput. Networks, 2022

The Ginger: Another Spice to Hinder Attacks on Password Files.
Proceedings of the 18th International Conference on Web Information Systems and Technologies, 2022

2021
Experience: Improving Opinion Spam Detection by Cumulative Relative Frequency Distribution.
ACM J. Data Inf. Qual., 2021

WIP: An Onion-Based Routing Protocol Strengthening Anonymity.
Proceedings of the 22nd IEEE International Symposium on a World of Wireless, 2021

Hardening Trust Models against Slandering Attacks in Relayed Content Delivery Services.
Proceedings of the 17th International Conference on Wireless and Mobile Computing, 2021

Anonymous Short Communications over Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2021

Integrity guarantees over highly dynamic outsourced map data.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

A Distributed Location Trusted Service Achieving k-Anonymity against the Global Adversary.
Proceedings of the 22nd IEEE International Conference on Mobile Data Management, 2021

A game theory-based approach to discourage fake reviews.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

A Privacy-Preserving Protocol for Proximity-Based Services in Social Networks.
Proceedings of the IEEE Global Communications Conference, 2021

A Solution to Support Integrity in the Lawful Interception Ecosystem.
Proceedings of the Electronic Government and the Information Systems Perspective, 2021

Extending Routes in Tor to Achieve Recipient Anonymity against the Global Adversary.
Proceedings of the International Conference on Cyberworlds, 2021

2020
A Privacy-Preserving Localization Service for Assisted Living Facilities.
IEEE Trans. Serv. Comput., 2020

Securing MQTT by Blockchain-Based OTP Authentication.
Sensors, 2020

Improving Opinion Spam Detection by Cumulative Relative Frequency Distribution.
CoRR, 2020

Smart-contract Based Access Control on Distributed Information in a Smart-City Scenario.
Proceedings of the 3rd Distributed Ledger Technology Workshop Co-located with ITASEC 2020, 2020

Implementing Multiple-Social-Network Meta-APIs to Support OSINT Programming.
Proceedings of the 12th International Conference on Advanced Infocomm Technology, 2020

A Privacy-Preserving Solution for Proximity Tracing Avoiding Identifier Exchanging.
Proceedings of the International Conference on Cyberworlds, 2020

2019
The Challenge of Privacy in the Cloud.
Proceedings of the Encyclopedia of Bioinformatics and Computational Biology - Volume 1, 2019

A System for Privacy-Preserving Access Accountability in Critical Environments.
IEEE Pervasive Comput., 2019

A Novel Query Language for Data Extraction from Social Networks.
Proceedings of the 15th International Conference on Web Information Systems and Technologies, 2019

Self-sovereign Management of Privacy Consensus using Blockchain.
Proceedings of the 15th International Conference on Web Information Systems and Technologies, 2019

A routing algorithm increasing the transmission availability in smart grids.
Proceedings of the 2019 Summer Simulation Conference, 2019

Ethereum Transactions and Smart Contracts among Secure Identities.
Proceedings of the Second Distributed Ledger Technology Workshop, 2019

A Blockchain-Based OTP-Authentication Scheme for Constrainded IoT Devices Using MQTT.
Proceedings of the ISCSIC 2019: 3rd International Symposium on Computer Science and Intelligent Control, 2019

Enabling propagation in web of trust by Ethereum.
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019

Exploiting Digital Identity for Mobility in Fog Computing.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Contrasting Fake Reviews in TripAdvisor.
Proceedings of the 26th Italian Symposium on Advanced Database Systems, 2018

Integrating Digital Identity and Blockchain.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

Not Only Databases: Social Data and Cybersecurity Perspective.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
An Offline Outdoor Navigation System with Full Privacy.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Discovering Good Links Between Objects in the Internet of Things.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Model for Handling Multiple Social Networks, its Implementation.
Proceedings of the 25th Italian Symposium on Advanced Database Systems, 2017

A System for Privacy-Preserving Analysis of Vehicle Movements.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Tweetchain: An Alternative to Blockchain for Crowd-Based Applications.
Proceedings of the Web Engineering - 17th International Conference, 2017

Contrasting False Identities in Social Networks by Trust Chains and Biometric Reinforcement.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

Overcoming Limits of Blockchain for IoT Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A model to support design and development of multiple-social-network applications.
Inf. Sci., 2016

Analysis-preserving protection of user privacy against information leakage of social-network Likes.
Inf. Sci., 2016

Experimenting with Certified Reputation in a Competitive Multi-Agent Scenario.
IEEE Intell. Syst., 2016

Interest Assortativity in Twitter.
Proceedings of the 12th International Conference on Web Information Systems and Technologies, 2016

Efficient Proxy Signature Scheme from Pairings.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Completeness, Correctness and Freshness of Cloud-Managed Data Streams.
Proceedings of the 24th Italian Symposium on Advanced Database Systems, 2016

A Middleware to Allow Fine-Grained Access Control of Twitter Applications.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

Range query integrity in the cloud: the case of video surveillance.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A New Approach for Electronic Signature.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Implementing Advanced Electronic Signature by Public Digital Identity System (SPID).
Proceedings of the Electronic Government and the Information Systems Perspective, 2016

Range Query Integrity in Cloud Data Streams with Efficient Insertion.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

A Threat to Friendship Privacy in Facebook.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
A system for extracting structural information from Social Network accounts.
Softw. Pract. Exp., 2015

Digital Document Signing: Vulnerabilities and Solutions.
Inf. Secur. J. A Glob. Perspect., 2015

Discovering missing me edges across social networks.
Inf. Sci., 2015

A new form of assortativity in online social networks.
Int. J. Hum. Comput. Stud., 2015

A privacy-preserving e-participation framework allowing citizen opinion analysis.
Electron. Gov. an Int. J., 2015

Comparing Twitter and Facebook user behavior: Privacy and other aspects.
Comput. Hum. Behav., 2015

Accountability-Preserving Anonymous Delivery of Cloud Services.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

An analytical processing approach to supporting cyber security compliance assessment.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Practical and Secure Integrated PKE+PEKS with Keyword Privacy.
Proceedings of the SECRYPT 2015, 2015

A lightweight electronic signature scheme using Twitter.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

Biometric Identification in eHealthcare: Learning from the Cases of Russia and Italy.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015

Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage.
Proceedings of the Electronic Government and the Information Systems Perspective, 2015

A Model Implementing Certified Reputation and Its Application to TripAdvisor.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Experiences Using BDS: A Crawler for Social Internetworking Scenarios.
Proceedings of the Social Networks: Analysis and Case Studies, 2014

Moving from social networks to social internetworking scenarios: The crawling perspective.
Inf. Sci., 2014

Fortifying TripAdvisor against reputation-system attacks.
Proceedings of the 2014 World Congress on Internet Security, 2014

A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme.
Proceedings of the SECRYPT 2014, 2014

Generating K-Anonymous Logs of People Tracing Systems in Surveilled Environments.
Proceedings of the 22nd Italian Symposium on Advanced Database Systems, 2014

Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Computer Safety, Reliability, and Security, 2014

A Model to Support Multi-Social-Network Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

A Trust-Based Approach to Clustering Agents on the Basis of Their Expertise.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2014

Driving Global Team Formation in Social Networks to Obtain Diversity.
Proceedings of the Web Engineering, 14th International Conference, 2014

Breaking the Barriers of e-Participation: The Experience of Russian Digital Office Development.
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

Social Signature: Signing by Tweeting.
Proceedings of the Electronic Government and the Information Systems Perspective, 2014

A Privacy-Preserving Solution for Tracking People in Critical Environments.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Bridge analysis in a Social Internetworking Scenario.
Inf. Sci., 2013

Bridge-Driven Search in Social Internetworking Scenarios.
Proceedings of the 21st Italian Symposium on Advanced Database Systems, 2013

Allowing privacy-preserving analysis of social network likes.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Measuring Betweenness Centrality in Social Internetworking Scenarios.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Workshops, 2013

A Trust-Based Approach for Detecting Compromised Nodes in SCADA Systems.
Proceedings of the Multiagent System Technologies - 11th German Conference, 2013

Allowing Non-identifying Information Disclosure in Citizen Opinion Evaluation.
Proceedings of the Technology-Enabled Innovation for Democracy, Government and Governance, 2013

Internetworking Assortativity in Facebook.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
A probabilistic framework for estimating the accuracy of aggregate range queries evaluated over histograms.
Inf. Sci., 2012

A warning on how to implement anonymous credential protocols into the information card framework.
Int. J. Inf. Sec., 2012

Discovering Hidden me Edges in a Social Internetworking Scenario.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

Privacy-preserving resource evaluation in social networks.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Supporting Information Spread in a Social Internetworking Scenario.
Proceedings of the New Frontiers in Mining Complex Patterns - First International Workshop, 2012

Discovering Links among Social Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012

Enhancing Trust-Based Competitive Multi Agent Systems by Certified Reputation.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

Allowing Continuous Evaluation of Citizen Opinions through Social Networks.
Proceedings of the Advancing Democracy, Government and Governance, 2012

Crawling Social Internetworking Systems.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
A quad-tree based multiresolution approach for two-dimensional summary data.
Inf. Syst., 2011

Implementing disposable credit card numbers by mobile phones.
Electron. Commer. Res., 2011

Preserving Unlikability against Covert Channels in Multi-Party Security Protocols.
Proceedings of the Sistemi Evoluti per Basi di Dati, 2011

Threats to Legal Electronic Storage: Analysis and Countermeasures.
Proceedings of the Electronic Government and the Information Systems Perspective, 2011

2010
A Lightweight Authentication Protocol for Web Applications in Mobile Environments.
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010

Approximating sliding windows by cyclic tree-like histograms for efficient range queries.
Data Knowl. Eng., 2010

Archiving Digital Documents: Issues in Dematerialization (Extended Abstract).
Proceedings of the Eighteenth Italian Symposium on Advanced Database Systems, 2010

Improving Similarity-Based Methods for Information Propagation on Social Networks.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

A contextual reading of conditional commitments.
Proceedings of the ECAI 2010, 2010

2009
Histograms for OLAP and Data-Stream Queries.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Signing Digital Documents in Hostile Environments.
J. Digit. Inf. Manag., 2009

A Framework for Using Web Services to Enhance QoS for Content Delivery.
IEEE Multim., 2009

Fortifying the dalì attack on digital signature.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Probabilistic Framework for Localizing People with K-anonymity.
Proceedings of the Seventeenth Italian Symposium on Advanced Database Systems, 2009

An efficient k-anonymous localization technique for assistive environments.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Approximate Range Querying over Sliding Windows.
Proceedings of the Database Technologies: Concepts, 2009

2008
Enhancing histograms by tree-like bucket indices.
VLDB J., 2008

Logic programming with social features.
Theory Pract. Log. Program., 2008

Analysis of QoS in cooperative services for real time applications.
Data Knowl. Eng., 2008

An ASP-based approach to dealing with agent perception failure.
AI Commun., 2008

Generating One-Time Passwords by Cheap and Fast Devices.
Proceedings of the Sixteenth Italian Symposium on Advanced Database Systems, 2008

A pervasive identification service for physical access control.
Proceedings of the 5th international conference on Pervasive services, 2008

A Logic Language with Stable Model Semantics for Social Reasoning.
Proceedings of the Logic Programming, 24th International Conference, 2008

A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions.
Proceedings of the E-Commerce and Web Technologies, 9th International Conference, 2008

2007
Un Protocollo di Sicurezza contro le Vulnerabilitè derivanti da Software di Firma non Trusted.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007

Modellazione della QoS in Ambienti Web-Service con Applicazioni di Video Streaming.
Proceedings of the Fifteenth Italian Symposium on Advanced Database Systems, 2007

Enabling Selective Flooding to Reduce P2P Traffic.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Hardening digital signatures against untrusted signature software.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

2006
Dealing with semantic heterogeneity for improving Web usage.
Data Knowl. Eng., 2006

Progresses on Tree-Based Approaches to Improving Histogram Accuracy.
Proceedings of the Fourteenth Italian Symposium on Advanced Database Systems, 2006

Logic Programs with Multiple Chances.
Proceedings of the ECAI 2006, 17th European Conference on Artificial Intelligence, August 29, 2006

2005
A Social Semantics for Multi-agent Systems.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2005

2004
Fast range query estimation by N-level tree histograms.
Data Knowl. Eng., 2004

Modeling cooperation in multi-agent communities.
Cogn. Syst. Res., 2004

Riduzione del traffico nei sistemi P2P: un approccio semantico.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004

Rappresentazioni compresse di Data Stream attraverso istogrammi.
Proceedings of the Twelfth Italian Symposium on Advanced Database Systems, 2004

Reducing Data Stream Sliding Windows by Cyclic Tree-Like Histograms.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

TLS: A Tree-Based DHT Lookup Service for Highly Dynamic Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, 2004

2003
A Quad-Tree Based Multiresolution Approach for Two-dimensional Summary Data.
Proceedings of the 15th International Conference on Scientific and Statistical Database Management (SSDBM 2003), 2003

L'Istogramma nLT: una Codifica Approssimata di Range Query Gerarchiche.
Proceedings of the Eleventh Italian Symposium on Advanced Database Systems, 2003

Pre-computing Approximate Hierarchical Range Queries in a Tree-Like Histogram.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003

Multiagent Compromises and Joint Fixpoint Semantics.
Proceedings of the 2003 Joint Conference on Declarative Programming, 2003

2002
Disjunctive Logic Programs with Inheritance.
Theory Pract. Log. Program., 2002

Modellazione del comportamento degli utenti per supportarne l'accesso a sorgenti informative eterogenee.
Proceedings of the Decimo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2002

Improving Range Query Estimation on Histograms.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002

An Agent-Based Hierarchical Clustering Approach for E-commerce Environments.
Proceedings of the E-Commerce and Web Technologies, Third International Conference, 2002

Binary-Tree Histograms with Tree Indices.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

A User Behavior-Based Agent for Improving Web Usage.
Proceedings of the On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30, 2002

Multiagent Compromises, Joint Fixpoints, and Stable Models.
Proceedings of the Computational Logic: Logic Programming and Beyond, 2002

2001
On ACTL Formulas Having Linear Counterexamples.
J. Comput. Syst. Sci., 2001

A System Implementing Cooperation in Multi-Agent Networks.
Proceedings of the WOA 2001: Dagli Oggetti agli Agenti. 2nd AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2001

Estimating Range Queries Using Aggregate Data with Integrity Constraints: A Probabilistic Approach.
Proceedings of the Database Theory, 2001

2000
Enhancing Disjunctive Datalog by Constraints.
IEEE Trans. Knowl. Data Eng., 2000

A Logic-Based Approach for Enforcing Access Control.
J. Comput. Secur., 2000

Estimating range queries using aggregate data.
Proceedings of the Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2000

1999
Semantics and Expressiveness of Disjunctive Ordered Logic.
Ann. Math. Artif. Intell., 1999

Enhancing Model Checking in Verification by AI Techniques.
Artif. Intell., 1999

Compressed Datacubes for fast OLAP Applications.
Proceedings of the Data Warehousing and Knowledge Discovery, 1999

A Logical Framework for Reasoning on Data Access Control Policies.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Disjunctive Ordered Logic: Semantics and Expressiveness.
Proceedings of the Sixth International Conference on Principles of Knowledge Representation and Reasoning (KR'98), 1998

An Authorization Model and Its Formal Semantics.
Proceedings of the Computer Security, 1998

1997
Strong and Weak Constraints in Disjunctive Datalog.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 1997

The Expressive Power of Unique Total Stable Model Semantics.
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997

Adding Weak Constraints to Disjunctive Datalog.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997

1996
Stable Models and Their Computation for Logic Programming with Inheritance and True Negation.
J. Log. Program., 1996

On the Expressive Power of Ordered Logic.
AI Commun., 1996

Computing Disjunctive Ordered Logic.
Proceedings of the 1996 Joint Conf. on Declarative Programming, 1996

1995
Disjunctive Ordered Logic
Proceedings of the Database and Expert Systems Applications, 1995

Ordered Logic and its Relationships to other Logic Programming Formalisms.
Proceedings of the 1995 Joint Conference on Declarative Programming, 1995

1994
Implementazione di Interrogazioni Semplici Concatenate.
Proceedings of the Atti del Secondo Convegno Nazionale "Sistemi Evoluti per Basi di Dati", 1994

A non-deterministic semantics for ordered logic programs.
Proceedings of the 1994 Joint Conference on Declarative Programming, 1994


  Loading...