Michele Boreale

From MaRDI portal
(Redirected from Person:418132)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
An implicit function theorem for the stream calculus
Logical Methods in Computer Science
2024-06-27Paper
Products, polynomials and differential equations in the stream calculus
ACM Transactions on Computational Logic
2024-04-26Paper
Approximate Model Counting, Sparse XOR Constraints and Minimum Distance2024-03-14Paper
Algebra and coalgebra of stream products
(available as arXiv preprint)
2023-08-21Paper
Bayesian parameter estimation with guarantees via interval analysis and simulation
Lecture Notes in Computer Science
2023-08-17Paper
Linearization, model reduction and reachability in nonlinear ODEs
Lecture Notes in Computer Science
2023-07-21Paper
On the expressiveness of internal mobility in name-passing calculi
CONCUR '96: Concurrency Theory
2023-06-28Paper
On the Coalgebra of Partial Differential Equations2022-07-21Paper
Automatic pre- and postconditions for partial differential equations
Information and Computation
2022-06-08Paper
Weighted approximate Bayesian computation via Sanov's theorem
Computational Statistics
2022-05-10Paper
Automatic pre- and postconditions for partial differential equations
Quantitative Evaluation of Systems
2021-12-08Paper
A linear-algebraic method to compute polynomial PDE conservation laws
Journal of Symbolic Computation
2021-08-05Paper
Complete Algorithms for Algebraic Strongest Postconditions and Weakest Preconditions in Polynomial ODE’S
SOFSEM 2018: Theory and Practice of Computer Science
2020-10-21Paper
Algebra, coalgebra, and minimization in polynomial differential equations
Logical Methods in Computer Science
2019-02-25Paper
Algorithms for exact and approximate linear abstractions of polynomial continuous systems
Proceedings of the 21st International Conference on Hybrid Systems: Computation and Control (part of CPS Week)
2018-12-06Paper
Basic observables for processes
Automata, Languages and Programming
2018-07-04Paper
A fully abstract semantics for causality in the π-calculus
STACS 95
2017-12-04Paper
Algebra, coalgebra, and minimization in polynomial differential equations
Lecture Notes in Computer Science
2017-05-19Paper
On the complexity of bisimilarity for value-passing processes
Lecture Notes in Computer Science
2017-01-19Paper
CaSPiS: a calculus of sessions, pipelines and services
Mathematical Structures in Computer Science
2016-07-27Paper
Asymptotic information leakage under one-try attacks
Mathematical Structures in Computer Science
2016-07-27Paper
A semiring-based trace semantics for processes with applications to information leakage analysis
Mathematical Structures in Computer Science
2016-07-27Paper
Searching secrets rationally
International Journal of Approximate Reasoning
2015-12-28Paper
Quantitative information flow under generic leakage functions and adaptive adversaries
Logical Methods in Computer Science
2015-11-25Paper
Analysis of Probabilistic Systems via Generating Functions and Padé Approximation
Automata, Languages, and Programming
2015-11-04Paper
Worst- and average-case privacy breaches in randomization mechanisms
Theoretical Computer Science
2015-08-17Paper
Asymptotic risk analysis for trust and reputation systems
Lecture Notes in Computer Science
2014-11-04Paper
Behavioural contracts with request-response operations
Science of Computer Programming
2013-06-06Paper
Worst- and average-case privacy breaches in randomization mechanisms
Lecture Notes in Computer Science
2012-09-21Paper
A coalgebraic perspective on linear weighted automata
Information and Computation
2012-05-24Paper
Deciding safety properties in infinite-state pi-calculus via behavioural types
Information and Computation
2012-05-24Paper
Quantitative information flow, with a view
Computer Security – ESORICS 2011
2011-11-22Paper
Asymptotic information leakage under one-try attacks
Foundations of Software Science and Computational Structures
2011-05-19Paper
A semiring-based trace semantics for processes with applications to information leakage analysis
IFIP Advances in Information and Communication Technology
2010-10-27Paper
Spatial and behavioral types in the pi-calculus
Information and Computation
2010-10-07Paper
On the relationship between spatial logics and behavioral simulations
Foundations of Software Science and Computational Structures
2010-04-27Paper
Weighted Bisimulation in Linear Algebraic Form
CONCUR 2009 - Concurrency Theory
2009-10-22Paper
Deciding Safety Properties in Infinite-State Pi-Calculus via Behavioural Types
Automata, Languages and Programming
2009-07-14Paper
Quantifying information leakage in process calculi
Information and Computation
2009-06-11Paper
A Typed Calculus for Querying Distributed XML Documents
Trustworthy Global Computing
2009-03-05Paper
Responsiveness in process calculi
Theoretical Computer Science
2008-12-12Paper
Spatial and Behavioral Types in the Pi-Calculus
CONCUR 2008 - Concurrency Theory
2008-11-25Paper
Type Abstractions of Name-Passing Processes
Lecture Notes in Computer Science
2008-07-01Paper
A Type System for Client Progress in a Service-Oriented Calculus
Concurrency, Graphs and Models
2008-06-19Paper
XPi: a typed process calculus for XML messaging
Science of Computer Programming
2008-05-19Paper
Mathematical Foundations of Computer Science 2003
Lecture Notes in Computer Science
2007-12-07Paper
Mathematical Foundations of Computer Science 2003
Lecture Notes in Computer Science
2007-12-07Paper
Quantifying Information Leakage in Process Calculi
Automata, Languages and Programming
2007-09-11Paper
A Concurrent Calculus with Atomic Transactions
Programming Languages and Systems
2007-09-04Paper
Trustworthy Global Computing
Lecture Notes in Computer Science
2006-11-01Paper
Processes as formal power series: a coinductive approach to denotational semantics
Theoretical Computer Science
2006-09-14Paper
Programming Languages and Systems
Lecture Notes in Computer Science
2005-08-17Paper
A method for symbolic analysis of security protocols
Theoretical Computer Science
2005-06-30Paper
scientific article; zbMATH DE number 2087423 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 1927581 (Why is no real title available?)2003-06-12Paper
Trace and testing equivalence on asynchronous processes
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1754628 (Why is no real title available?)2002-06-12Paper
Proof techniques for cryptographic processes
SIAM Journal on Computing
2002-04-23Paper
Divergence in testing and readiness semantics
Theoretical Computer Science
2002-03-03Paper
A complexity analysis of bisimilarity for value-passing processes
Theoretical Computer Science
2000-08-21Paper
Basic observables for processes
Information and Computation
2000-01-12Paper
A fully abstract semantics for causality in the \(\pi\)-calculus
Acta Informatica
1999-03-14Paper
On the expressiveness of internal mobility in name-passing calculi
Theoretical Computer Science
1999-01-20Paper
Some congruence properties for \(\pi\)-calculus bisimilarities
Theoretical Computer Science
1998-08-13Paper
A symbolic semantics for the \(\pi\)-calculus
Information and Computation
1997-01-02Paper
Testing equivalence for mobile processes
Information and Computation
1995-09-17Paper
Complete sets of axioms for finite basic LOTOS behavioural equivalences
Information Processing Letters
1993-01-16Paper


Research outcomes over time


This page was built for person: Michele Boreale