List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Certified algorithms for numerical semigroups in Rocq | 2026-02-19 | Paper |
| DeFi composability as MEV non-interference | 2025-05-23 | Paper |
| Sound approximate and asymptotic probabilistic bisimulations for PCTL Logical Methods in Computer Science | 2023-08-26 | Paper |
| Maximizing extractable value from automated market makers Financial Cryptography and Data Security | 2023-05-26 | Paper |
| Maximizing extractable value from automated market makers Financial Cryptography and Data Security | 2023-05-26 | Paper |
| A theory of Automated Market Makers in DeFi Logical Methods in Computer Science | 2023-01-09 | Paper |
| A formal model of Algorand smart contracts (available as arXiv preprint) | 2022-06-17 | Paper |
| SoK: lending pools in decentralized finance (available as arXiv preprint) | 2022-06-01 | Paper |
| scientific article; zbMATH DE number 7471711 (Why is no real title available?) (available as arXiv preprint) | 2022-02-09 | Paper |
| scientific article; zbMATH DE number 7471711 (Why is no real title available?) | 2022-02-09 | Paper |
| scientific article; zbMATH DE number 7471670 (Why is no real title available?) (available as arXiv preprint) | 2022-02-09 | Paper |
| scientific article; zbMATH DE number 7471670 (Why is no real title available?) | 2022-02-09 | Paper |
| Progress-preserving refinements of CTA | 2021-08-04 | Paper |
| Contract agreements via logic | 2021-06-17 | Paper |
| Contract agreements via logic (available as arXiv preprint) | 2021-06-17 | Paper |
| Security issues in service composition Lecture Notes in Computer Science | 2021-05-25 | Paper |
| Primitives for contract-based synchronization | 2021-02-24 | Paper |
| Primitives for contract-based synchronization (available as arXiv preprint) | 2021-02-24 | Paper |
| The LTS workbench | 2020-02-14 | Paper |
| The LTS workbench (available as arXiv preprint) | 2020-02-14 | Paper |
| A note on two notions of compliance | 2020-02-14 | Paper |
| A note on two notions of compliance (available as arXiv preprint) | 2020-02-14 | Paper |
| Contract-oriented computing in CO\(_2\) Scientific Annals of Computer Science | 2019-02-08 | Paper |
| scientific article; zbMATH DE number 6816946 (Why is no real title available?) (available as arXiv preprint) | 2017-12-11 | Paper |
| Honesty by typing Logical Methods in Computer Science | 2017-04-11 | Paper |
| Verifiable abstractions for contract-oriented systems Journal of Logical and Algebraic Methods in Programming | 2016-11-30 | Paper |
| Compliance and subtyping in timed session types Formal Techniques for Distributed Objects, Components, and Systems | 2016-10-19 | Paper |
| Model checking usage policies Mathematical Structures in Computer Science | 2016-07-27 | Paper |
| Contracts as games on event structures Journal of Logical and Algebraic Methods in Programming | 2016-04-20 | Paper |
| Compliance in behavioural contracts: a brief survey Programming Languages with Applications to Biology and Security | 2016-01-08 | Paper |
| Combining behavioural types with security analysis Journal of Logical and Algebraic Methods in Programming | 2015-11-10 | Paper |
| Lending Petri nets and contracts Fundamentals of Software Engineering | 2015-09-30 | Paper |
| Debits and Credits in Petri Nets and Linear Logic Lecture Notes in Computer Science | 2015-09-14 | Paper |
| Modelling and verifying contract-oriented systems in Maude Rewriting Logic and Its Applications | 2015-09-09 | Paper |
| Circular causality in event structures Fundamenta Informaticae | 2015-06-26 | Paper |
| A semantic deconstruction of session types CONCUR 2014 – Concurrency Theory | 2014-09-15 | Paper |
| Hard life with weak binders Electronic Notes in Theoretical Computer Science | 2014-07-23 | Paper |
| A theory of agreements and protection Lecture Notes in Computer Science | 2013-08-06 | Paper |
| On the realizability of contracts in dishonest systems Lecture Notes in Computer Science | 2012-08-21 | Paper |
| Security-aware program transformations. Lecture Notes in Computer Science | 2010-02-23 | Paper |
| Usage Automata Foundations and Applications of Security Analysis | 2009-10-22 | Paper |
| Secure Service Orchestration Foundations of Security Analysis and Design IV | 2009-10-22 | Paper |
| ν-Types for Effects and Freshness Analysis Theoretical Aspects of Computing - ICTAC 2009 | 2009-08-20 | Paper |
| Types and Effects for Resource Usage Analysis Foundations of Software Science and Computational Structures | 2007-09-07 | Paper |
| Theoretical Computer Science Lecture Notes in Computer Science | 2006-11-01 | Paper |
| Foundations of Software Science and Computational Structures Lecture Notes in Computer Science | 2005-11-10 | Paper |
Research outcomes over time
This page was built for person: Massimo Bartoletti