All Stories

  1. An In-depth Analysis of Mining Pools Revenue
  2. Impact of Extra-Virgin Olive Oil Storage Conditions on Phenolic Content and Wound-Healing Properties
  3. Controlling VC disclosure with Terms of Use and ABAC in SSI
  4. $Saf\text{-}2^{10}$: A Novel Benchmark Dataset for Crocus Sativus L. Flower Detection
  5. Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA
  6. Local Spaces in Soft Concurrent Constraint Programming Oriented to Security
  7. Modelling Dialogues in a Concurrent Language for Argumentation
  8. Tackling disinformation in the UE with “truthster”: technological design and DLT
  9. *-chain: A framework for automating the modeling of blockchain based supply chain tracing systems
  10. A Survey of Steganography Tools at Layers 2-4 and HTTP
  11. Towards a Temporal Probabilistic Argumentation Framework
  12. Towards automated verification of Bitcoin-based decentralised applications
  13. Deriving Dependency Graphs from Abstract Argumentation Frameworks
  14. Introducing a Tool for Concurrent Argumentation
  15. Towards an Implementation of a Concurrent Language for Argumentation
  16. ConArgLib: an argumentation library with support to search strategies and parallel search
  17. Probabilistic abstract argumentation frameworks, a possible world view
  18. Analysis of Ethereum Smart Contracts and Opcodes
  19. Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017
  20. End-to-End Voting with Non-Permissioned and Permissioned Ledgers
  21. Special Issue: Selected Papers from AI∧3 2017, the 1st Workshop on Advances in Argumentation in Artificial Intelligence
  22. A Possible World View and a Normal Form for the Constellation Semantics
  23. CapBAC in Hyperledger Sawtooth
  24. Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper)
  25. Well-Foundedness in Weighted Argumentation Frameworks
  26. A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report
  27. Probabilistic Argumentation Frameworks with MetaProbLog and ConArg
  28. An Analysis of Non-standard Bitcoin Transactions
  29. Corrigendum
  30. Architecting the Web of Things for the Fog Computing Era
  31. 23rd RCRA International workshop on “Experimental evaluation of algorithms for solving problems with combinatorial explosion”
  32. Message from the Chairs
  33. A novel weighted defence and its relaxation in abstract argumentation
  34. Defence Outsourcing in Argumentation
  35. Studying Dynamics in Argumentation with Rob
  36. A ConArg-Based Library for Abstract Argumentation
  37. Not only size, but also shape counts: abstract argumentation solvers are benchmark-sensitive
  38. Abstract Argumentation Frameworks to Promote Fairness and Rationality in Multi-experts Multi-criteria Decision Making
  39. On Modeling Multi-experts Multi-criteria Decision-Making Argumentation and Disagreement: Philosophical and Computational Approaches Reconsidered
  40. A community payment scheme for consciousness energy usage
  41. From Argumentation Frameworks to Voting Systems and Back*
  42. A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property
  43. A Hasse Diagram for Weighted Sceptical Semantics with a Unique-Status Grounded Semantics
  44. An end-to-end voting-system based on bitcoin
  45. Go with the -Bitcoin- Flow, with Visual Analytics
  46. PrOnto: an Ontology Driven Business Process Mining Tool
  47. Preface
  48. Theoretical Computer Science in Italy
  49. Automated adaptation via quantitative partial model checking
  50. A Relaxation of Internal Conflict and Defence in Weighted Argumentation Frameworks
  51. ConArg: A Tool for Classical and Weighted Argumentation
  52. A Comparative Test on the Enumeration of Extensions in Abstract Argumentation*
  53. On merging two trust-networks in one with bipolar preferences
  54. Efficient Solution for Credulous/Sceptical Acceptance in Lower-Order Dung's Semantics
  55. An Improved Role-Based Access to Android Applications with JCHR
  56. Two trust networks in one: Using bipolar structures to fuse trust and distrust
  57. Timed soft concurrent constraint programs: An interleaved and a parallel approach
  58. Enumerating Extensions on Random Abstract-AFs with ArgTools, Aspartix, ConArg2, and Dung-O-Matic
  59. A Secure Non-monotonic Soft Concurrent Constraint Language
  60. A First Comparison of Abstract Argumentation Reasoning-Tools
  61. Benchmarking Hard Problems in Random Abstract AFs: The Stable Semantics
  62. Interchangeability with thresholds and degradation factors for Soft CSPs
  63. Solving Fuzzy Distributed CSPs: An Approach with Naming Games
  64. Coalitions of Arguments: An Approach with Constraint Programming
  65. Semiring-based constraint models and frameworks for security-related scenarios
  66. A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials
  67. Evaluation of complex security scenarios using defense trees and economic indexes
  68. Local arc consistency for non-invertible semirings, with an application to multi-objective optimization
  69. Modeling and Solving AFs with a Constraint-Based Tool: ConArg
  70. Securely Accessing Shared Resources with Concurrent Constraint Programming
  71. Negotiation of Weighted RTML Credentials on Mobile Devices
  72. A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming
  73. Towards a similarity-based web service discovery through soft constraint satisfaction problems
  74. Uncertainty in bipolar preference problems
  75. Solving Fuzzy DCSPs with Naming Games
  76. ConArg: A Constraint-Based Computational Framework for Argumentation Systems
  77. Solving Weighted Argumentation Frameworks with Soft Constraints
  78. Security Protocol Deployment Risk
  79. Finding partitions of arguments with Dung's properties via SCSPs
  80. A Nonmonotonic Soft Concurrent Constraint Language to Model the Negotiation Process
  81. Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
  82. Unicast and multicast QoS routing with soft-constraint logic programming
  83. From soft constraints to bipolar preferences: modelling framework and solving issues
  84. Extending Soft Arc Consistency Algorithms to Non-invertible Semirings
  85. A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints
  86. Solving Distributed CSPs Probabilistically
  87. A Common Computational Framework for Semiring-based Argumentation Systems
  88. Solving finite domain constraint hierarchies by local consistency and tree search
  89. Fairness as a QoS Measure for Web Services
  90. Soft Constraints for Quality Aspects in Service Oriented Architectures
  91. A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation
  92. Constraint Based Languages for Biological Reactions
  93. Capturing Fair Computations on Concurrent Constraint Language
  94. C-semiring Frameworks for Minimum Spanning Tree Problems
  95. From Marriages to Coalitions: A Soft CSP Approach
  96. Solving CSPs with Naming Games
  97. Soft Constraints for Dependable Service Oriented Architectures
  98. A Formal and Practical Framework for Constraint-Based Routing
  99. Weighted Datalog and Levels of Trust
  100. Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
  101. Semiring-Based Soft Constraints
  102. Propagating multitrust within trust networks
  103. Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming
  104. Soft constraint based pattern mining
  105. An Optimization Approach using Soft Constraints for the Cascade Vulnerability Problem
  106. Augmented Risk Analysis
  107. Using CP-nets as a guide for countermeasure selection
  108. An asymmetric fingerprint matching algorithm for Java Card TM
  109. Editorial
  110. Soft concurrent constraint programming
  111. Soft Constraints for Security
  112. Special track editorial
  113. Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration
  114. Defense trees for economic evaluation of security investments
  115. A soft constraint-based approach to the cascade vulnerability problem
  116. Information Assurance for security protocols
  117. Relating multiset rewriting and process algebras for security protocol analysis
  118. A Protocol’s Life After Attacks...
  119. Biometrics to Enhance Smartcard Security
  120. Editorial
  121. MOC via TOC Using a Mobile Agent Framework
  122. An Asymmetric Fingerprint Matching Algorithm for Java CardTM
  123. Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
  124. Soft constraint programming to analysing security protocols
  125. Soft Constraint Propagation and Solving in Constraint Handling Rules
  126. Semirings for Soft Constraint Solving and Programming
  127. 1. Introduction
  128. 4. SCSP Abstraction
  129. 6. Soft CLP
  130. 9. Interchangeability in Soft CSPs
  131. Tradeoff Generation Using Soft Constraints
  132. Experimental Evaluation of Interchangeability in Soft CSPs
  133. Abstracting Soft Constraints: Some Experimental Results on Fuzzy CSPs
  134. 10. SCSPs for Modelling Attacks to Security Protocols
  135. Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks
  136. 2. Soft Constraint Satisfaction Problems
  137. 3. Towards SCSPs Solutions
  138. 5. Higher Order Semiring-Based Constraints
  139. 7. SCLP and Generalized Shortest Path Problems
  140. 8. Soft Concurrent Constraint Programming
  141. 11. Conclusions and Directions for Future Work
  142. Symmetry Breaking in Soft CSPs
  143. A Theoretical Framework for Tradeoff Generation using Soft Constraints
  144. Modeling and detecting the cascade vulnerability problem using soft constraints
  145. Computer Algebra for Fingerprint Matching
  146. Interchangeability in Soft CSPs
  147. Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search
  148. A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity
  149. Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
  150. On Representing Biological Systems through Multiset Rewriting
  151. Abstracting soft constraints: Framework, properties, examples
  152. Soft constraint propagation and solving in CHRs
  153. Soft Concurrent Constraint Programming
  154. Soft constraint propagation and solving in CHRs
  155. Interchangeability in Soft CSPs
  156. Soft Constraints for Security Protocol Analysis: Confidentiality
  157. Semiring-based contstraint logic programming: syntax and semantics
  158. An Abstraction Framework for Soft Constraints and Its Relationship with Constraint Propagation
  159. Abstracting Soft Constraints
  160. Constraint Propagation for Soft Constraints: Generalization and Termination Conditions
  161. Labeling and Partial Local Consistency for Soft Constraint Programming
  162. Semiring-based constraint satisfaction and optimization
  163. Semiring-based CSPs and valued CSPs: Basic properties and comparison
  164. SCLP for Trust Propagation in Small-World Networks
  165. A Soft Approach to Multi-objective Optimization
  166. Strategic Games on Defense Trees
  167. Extending the Soft Constraint Based Mining Paradigm
  168. Multilevel Security and Quality of Protection
  169. Timed Soft Concurrent Constraint Programs
  170. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
  171. Bipolar Preference Problems: Framework, Properties and Solving Techniques
  172. Uncertainty in Bipolar Preference Problems
  173. Constraint Symmetry for the Soft CSP
  174. Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
  175. Reasoning about Secure Interoperation Using Soft Constraints
  176. Advancing assurance for secure distributed communications
  177. Encoding partial constraint satisfaction in the semiring-based framework for soft constraints
  178. Analysis of integrity policies using soft constraints
  179. Interchangeability in Soft CSPs