Massimo Bartoletti
From MaRDI portal
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Certified algorithms for numerical semigroups in Rocq | 2026-02-19 | Paper |
| DeFi composability as MEV non-interference | 2025-05-23 | Paper |
| Sound approximate and asymptotic probabilistic bisimulations for PCTL Logical Methods in Computer Science | 2023-08-26 | Paper |
| Maximizing extractable value from automated market makers Financial Cryptography and Data Security | 2023-05-26 | Paper |
| Maximizing extractable value from automated market makers Financial Cryptography and Data Security | 2023-05-26 | Paper |
| A theory of Automated Market Makers in DeFi Logical Methods in Computer Science | 2023-01-09 | Paper |
| A formal model of Algorand smart contracts (available as arXiv preprint) | 2022-06-17 | Paper |
| SoK: lending pools in decentralized finance (available as arXiv preprint) | 2022-06-01 | Paper |
| scientific article; zbMATH DE number 7471711 (Why is no real title available?) (available as arXiv preprint) | 2022-02-09 | Paper |
| scientific article; zbMATH DE number 7471711 (Why is no real title available?) | 2022-02-09 | Paper |
| scientific article; zbMATH DE number 7471670 (Why is no real title available?) (available as arXiv preprint) | 2022-02-09 | Paper |
| scientific article; zbMATH DE number 7471670 (Why is no real title available?) | 2022-02-09 | Paper |
| Progress-preserving refinements of CTA | 2021-08-04 | Paper |
| Contract agreements via logic | 2021-06-17 | Paper |
| Contract agreements via logic (available as arXiv preprint) | 2021-06-17 | Paper |
| Security issues in service composition Lecture Notes in Computer Science | 2021-05-25 | Paper |
| Primitives for contract-based synchronization | 2021-02-24 | Paper |
| Primitives for contract-based synchronization (available as arXiv preprint) | 2021-02-24 | Paper |
| The LTS workbench | 2020-02-14 | Paper |
| The LTS workbench (available as arXiv preprint) | 2020-02-14 | Paper |
| A note on two notions of compliance | 2020-02-14 | Paper |
| A note on two notions of compliance (available as arXiv preprint) | 2020-02-14 | Paper |
| Contract-oriented computing in CO\(_2\) Scientific Annals of Computer Science | 2019-02-08 | Paper |
| scientific article; zbMATH DE number 6816946 (Why is no real title available?) (available as arXiv preprint) | 2017-12-11 | Paper |
| Honesty by typing Logical Methods in Computer Science | 2017-04-11 | Paper |
| Verifiable abstractions for contract-oriented systems Journal of Logical and Algebraic Methods in Programming | 2016-11-30 | Paper |
| Compliance and subtyping in timed session types Formal Techniques for Distributed Objects, Components, and Systems | 2016-10-19 | Paper |
| Model checking usage policies Mathematical Structures in Computer Science | 2016-07-27 | Paper |
| Contracts as games on event structures Journal of Logical and Algebraic Methods in Programming | 2016-04-20 | Paper |
| Compliance in behavioural contracts: a brief survey Programming Languages with Applications to Biology and Security | 2016-01-08 | Paper |
| Combining behavioural types with security analysis Journal of Logical and Algebraic Methods in Programming | 2015-11-10 | Paper |
| Lending Petri nets and contracts Fundamentals of Software Engineering | 2015-09-30 | Paper |
| Debits and Credits in Petri Nets and Linear Logic Lecture Notes in Computer Science | 2015-09-14 | Paper |
| Modelling and verifying contract-oriented systems in Maude Rewriting Logic and Its Applications | 2015-09-09 | Paper |
| Circular causality in event structures Fundamenta Informaticae | 2015-06-26 | Paper |
| A semantic deconstruction of session types CONCUR 2014 – Concurrency Theory | 2014-09-15 | Paper |
| Hard life with weak binders Electronic Notes in Theoretical Computer Science | 2014-07-23 | Paper |
| A theory of agreements and protection Lecture Notes in Computer Science | 2013-08-06 | Paper |
| On the realizability of contracts in dishonest systems Lecture Notes in Computer Science | 2012-08-21 | Paper |
| Security-aware program transformations. Lecture Notes in Computer Science | 2010-02-23 | Paper |
| Usage Automata Foundations and Applications of Security Analysis | 2009-10-22 | Paper |
| Secure Service Orchestration Foundations of Security Analysis and Design IV | 2009-10-22 | Paper |
| ν-Types for Effects and Freshness Analysis Theoretical Aspects of Computing - ICTAC 2009 | 2009-08-20 | Paper |
| Types and Effects for Resource Usage Analysis Foundations of Software Science and Computational Structures | 2007-09-07 | Paper |
| Theoretical Computer Science Lecture Notes in Computer Science | 2006-11-01 | Paper |
| Foundations of Software Science and Computational Structures Lecture Notes in Computer Science | 2005-11-10 | Paper |
Research outcomes over time
This page was built for person: Massimo Bartoletti