All Stories

  1. Towards automated verification of Bitcoin-based decentralised applications
  2. Introducing a Tool for Concurrent Argumentation
  3. Towards an Implementation of a Concurrent Language for Argumentation
  4. ConArgLib: an argumentation library with support to search strategies and parallel search
  5. Analysis of Ethereum Smart Contracts and Opcodes
  6. Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017
  7. End-to-End Voting with Non-Permissioned and Permissioned Ledgers
  8. Special Issue: Selected Papers from AI∧3 2017, the 1st Workshop on Advances in Argumentation in Artificial Intelligence
  9. A Possible World View and a Normal Form for the Constellation Semantics
  10. CapBAC in Hyperledger Sawtooth
  11. Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper)
  12. Well-Foundedness in Weighted Argumentation Frameworks
  13. A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report
  14. Probabilistic Argumentation Frameworks with MetaProbLog and ConArg
  15. An Analysis of Non-standard Bitcoin Transactions
  16. Corrigendum
  17. Architecting the Web of Things for the Fog Computing Era
  18. 23rd RCRA International workshop on “Experimental evaluation of algorithms for solving problems with combinatorial explosion”
  19. Message from the Chairs
  20. A novel weighted defence and its relaxation in abstract argumentation
  21. A ConArg-Based Library for Abstract Argumentation
  22. Not only size, but also shape counts: abstract argumentation solvers are benchmark-sensitive
  23. Abstract Argumentation Frameworks to Promote Fairness and Rationality in Multi-experts Multi-criteria Decision Making
  24. On Modeling Multi-experts Multi-criteria Decision-Making Argumentation and Disagreement: Philosophical and Computational Approaches Reconsidered
  25. A community payment scheme for consciousness energy usage
  26. From Argumentation Frameworks to Voting Systems and Back*
  27. A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property
  28. A Hasse Diagram for Weighted Sceptical Semantics with a Unique-Status Grounded Semantics
  29. An end-to-end voting-system based on bitcoin
  30. Go with the -Bitcoin- Flow, with Visual Analytics
  31. PrOnto: an Ontology Driven Business Process Mining Tool
  32. Preface
  33. Theoretical Computer Science in Italy
  34. Automated adaptation via quantitative partial model checking
  35. A Relaxation of Internal Conflict and Defence in Weighted Argumentation Frameworks
  36. A Comparative Test on the Enumeration of Extensions in Abstract Argumentation*
  37. On merging two trust-networks in one with bipolar preferences
  38. Efficient Solution for Credulous/Sceptical Acceptance in Lower-Order Dung's Semantics
  39. An Improved Role-Based Access to Android Applications with JCHR
  40. Two trust networks in one: Using bipolar structures to fuse trust and distrust
  41. Timed soft concurrent constraint programs: An interleaved and a parallel approach
  42. Enumerating Extensions on Random Abstract-AFs with ArgTools, Aspartix, ConArg2, and Dung-O-Matic
  43. A Secure Non-monotonic Soft Concurrent Constraint Language
  44. Interchangeability with thresholds and degradation factors for Soft CSPs
  45. Solving Fuzzy Distributed CSPs: An Approach with Naming Games
  46. Coalitions of Arguments: An Approach with Constraint Programming
  47. Semiring-based constraint models and frameworks for security-related scenarios
  48. A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials
  49. Evaluation of complex security scenarios using defense trees and economic indexes
  50. Local arc consistency for non-invertible semirings, with an application to multi-objective optimization
  51. Modeling and Solving AFs with a Constraint-Based Tool: ConArg
  52. Securely Accessing Shared Resources with Concurrent Constraint Programming
  53. Negotiation of Weighted RTML Credentials on Mobile Devices
  54. A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming
  55. Towards a similarity-based web service discovery through soft constraint satisfaction problems
  56. Uncertainty in bipolar preference problems
  57. Solving Fuzzy DCSPs with Naming Games
  58. ConArg: A Constraint-Based Computational Framework for Argumentation Systems
  59. Solving Weighted Argumentation Frameworks with Soft Constraints
  60. Security Protocol Deployment Risk
  61. Finding partitions of arguments with Dung's properties via SCSPs
  62. A Nonmonotonic Soft Concurrent Constraint Language to Model the Negotiation Process
  63. Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
  64. Unicast and multicast QoS routing with soft-constraint logic programming
  65. From soft constraints to bipolar preferences: modelling framework and solving issues
  66. Extending Soft Arc Consistency Algorithms to Non-invertible Semirings
  67. A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints
  68. Solving Distributed CSPs Probabilistically
  69. Solving finite domain constraint hierarchies by local consistency and tree search
  70. Fairness as a QoS Measure for Web Services
  71. Soft Constraints for Quality Aspects in Service Oriented Architectures
  72. A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation
  73. Constraint Based Languages for Biological Reactions
  74. Capturing Fair Computations on Concurrent Constraint Language
  75. C-semiring Frameworks for Minimum Spanning Tree Problems
  76. From Marriages to Coalitions: A Soft CSP Approach
  77. Solving CSPs with Naming Games
  78. Soft Constraints for Dependable Service Oriented Architectures
  79. A Formal and Practical Framework for Constraint-Based Routing
  80. Weighted Datalog and Levels of Trust
  81. Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
  82. Semiring-Based Soft Constraints
  83. Propagating multitrust within trust networks
  84. Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming
  85. Soft constraint based pattern mining
  86. An Optimization Approach using Soft Constraints for the Cascade Vulnerability Problem
  87. Augmented Risk Analysis
  88. Using CP-nets as a guide for countermeasure selection
  89. An asymmetric fingerprint matching algorithm for Java Card TM
  90. Editorial
  91. Soft concurrent constraint programming
  92. Soft Constraints for Security
  93. Special track editorial
  94. Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration
  95. Defense trees for economic evaluation of security investments
  96. A soft constraint-based approach to the cascade vulnerability problem
  97. Information Assurance for security protocols
  98. Relating multiset rewriting and process algebras for security protocol analysis
  99. A Protocol’s Life After Attacks...
  100. Biometrics to Enhance Smartcard Security
  101. Editorial
  102. MOC via TOC Using a Mobile Agent Framework
  103. An Asymmetric Fingerprint Matching Algorithm for Java CardTM
  104. Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
  105. Soft constraint programming to analysing security protocols
  106. Soft Constraint Propagation and Solving in Constraint Handling Rules
  107. Semirings for Soft Constraint Solving and Programming
  108. 1. Introduction
  109. 4. SCSP Abstraction
  110. 6. Soft CLP
  111. 9. Interchangeability in Soft CSPs
  112. Tradeoff Generation Using Soft Constraints
  113. Experimental Evaluation of Interchangeability in Soft CSPs
  114. Abstracting Soft Constraints: Some Experimental Results on Fuzzy CSPs
  115. 10. SCSPs for Modelling Attacks to Security Protocols
  116. Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks
  117. 2. Soft Constraint Satisfaction Problems
  118. 3. Towards SCSPs Solutions
  119. 5. Higher Order Semiring-Based Constraints
  120. 7. SCLP and Generalized Shortest Path Problems
  121. 8. Soft Concurrent Constraint Programming
  122. 11. Conclusions and Directions for Future Work
  123. Symmetry Breaking in Soft CSPs
  124. A Theoretical Framework for Tradeoff Generation using Soft Constraints
  125. Modeling and detecting the cascade vulnerability problem using soft constraints
  126. Computer Algebra for Fingerprint Matching
  127. Interchangeability in Soft CSPs
  128. Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search
  129. A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity
  130. Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
  131. On Representing Biological Systems through Multiset Rewriting
  132. Abstracting soft constraints: Framework, properties, examples
  133. Soft constraint propagation and solving in CHRs
  134. Soft Concurrent Constraint Programming
  135. Soft constraint propagation and solving in CHRs
  136. Interchangeability in Soft CSPs
  137. Soft Constraints for Security Protocol Analysis: Confidentiality
  138. Semiring-based contstraint logic programming: syntax and semantics
  139. An Abstraction Framework for Soft Constraints and Its Relationship with Constraint Propagation
  140. Abstracting Soft Constraints
  141. Constraint Propagation for Soft Constraints: Generalization and Termination Conditions
  142. Labeling and Partial Local Consistency for Soft Constraint Programming
  143. Semiring-based constraint satisfaction and optimization
  144. Semiring-based CSPs and valued CSPs: Basic properties and comparison
  145. SCLP for Trust Propagation in Small-World Networks
  146. A Soft Approach to Multi-objective Optimization
  147. Strategic Games on Defense Trees
  148. Extending the Soft Constraint Based Mining Paradigm
  149. Multilevel Security and Quality of Protection
  150. Timed Soft Concurrent Constraint Programs
  151. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
  152. Bipolar Preference Problems: Framework, Properties and Solving Techniques
  153. Uncertainty in Bipolar Preference Problems
  154. Constraint Symmetry for the Soft CSP
  155. Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
  156. Reasoning about Secure Interoperation Using Soft Constraints
  157. Advancing assurance for secure distributed communications
  158. Encoding partial constraint satisfaction in the semiring-based framework for soft constraints
  159. Analysis of integrity policies using soft constraints
  160. Interchangeability in Soft CSPs