All Stories

  1. Strategic and private reasoning with the concurrent (timed) language for argumentation
  2. From Fear to Greed: Analyzing Sentiment Indicators in Bitcoin Price Prediction
  3. An In-depth Analysis of Mining Pools Revenue
  4. Impact of Extra-Virgin Olive Oil Storage Conditions on Phenolic Content and Wound-Healing Properties
  5. Controlling VC disclosure with Terms of Use and ABAC in SSI
  6. $Saf\text{-}2^{10}$: A Novel Benchmark Dataset for Crocus Sativus L. Flower Detection
  7. Generating Deepfakes with Stable Diffusion, ControlNet, and LoRA
  8. Local Spaces in Soft Concurrent Constraint Programming Oriented to Security
  9. Modelling Dialogues in a Concurrent Language for Argumentation
  10. Tackling disinformation in the UE with “truthster”: technological design and DLT
  11. *-chain: A framework for automating the modeling of blockchain based supply chain tracing systems
  12. A Survey of Steganography Tools at Layers 2-4 and HTTP
  13. Towards a Temporal Probabilistic Argumentation Framework
  14. Towards automated verification of Bitcoin-based decentralised applications
  15. Deriving Dependency Graphs from Abstract Argumentation Frameworks
  16. Introducing a Tool for Concurrent Argumentation
  17. Towards an Implementation of a Concurrent Language for Argumentation
  18. ConArgLib: an argumentation library with support to search strategies and parallel search
  19. Probabilistic abstract argumentation frameworks, a possible world view
  20. Analysis of Ethereum Smart Contracts and Opcodes
  21. Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017
  22. End-to-End Voting with Non-Permissioned and Permissioned Ledgers
  23. Special Issue: Selected Papers from AI∧3 2017, the 1st Workshop on Advances in Argumentation in Artificial Intelligence
  24. A Possible World View and a Normal Form for the Constellation Semantics
  25. CapBAC in Hyperledger Sawtooth
  26. Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper)
  27. Well-Foundedness in Weighted Argumentation Frameworks
  28. A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report
  29. Probabilistic Argumentation Frameworks with MetaProbLog and ConArg
  30. An Analysis of Non-standard Bitcoin Transactions
  31. Corrigendum
  32. Architecting the Web of Things for the Fog Computing Era
  33. 23rd RCRA International workshop on “Experimental evaluation of algorithms for solving problems with combinatorial explosion”
  34. Message from the Chairs
  35. A novel weighted defence and its relaxation in abstract argumentation
  36. Defence Outsourcing in Argumentation
  37. Studying Dynamics in Argumentation with Rob
  38. A ConArg-Based Library for Abstract Argumentation
  39. Not only size, but also shape counts: abstract argumentation solvers are benchmark-sensitive
  40. Abstract Argumentation Frameworks to Promote Fairness and Rationality in Multi-experts Multi-criteria Decision Making
  41. On Modeling Multi-experts Multi-criteria Decision-Making Argumentation and Disagreement: Philosophical and Computational Approaches Reconsidered
  42. A community payment scheme for consciousness energy usage
  43. From Argumentation Frameworks to Voting Systems and Back*
  44. A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property
  45. A Hasse Diagram for Weighted Sceptical Semantics with a Unique-Status Grounded Semantics
  46. An end-to-end voting-system based on bitcoin
  47. Go with the -Bitcoin- Flow, with Visual Analytics
  48. PrOnto: an Ontology Driven Business Process Mining Tool
  49. Preface
  50. Theoretical Computer Science in Italy
  51. Automated adaptation via quantitative partial model checking
  52. A Relaxation of Internal Conflict and Defence in Weighted Argumentation Frameworks
  53. ConArg: A Tool for Classical and Weighted Argumentation
  54. A Comparative Test on the Enumeration of Extensions in Abstract Argumentation*
  55. On merging two trust-networks in one with bipolar preferences
  56. Efficient Solution for Credulous/Sceptical Acceptance in Lower-Order Dung's Semantics
  57. An Improved Role-Based Access to Android Applications with JCHR
  58. Two trust networks in one: Using bipolar structures to fuse trust and distrust
  59. Timed soft concurrent constraint programs: An interleaved and a parallel approach
  60. Enumerating Extensions on Random Abstract-AFs with ArgTools, Aspartix, ConArg2, and Dung-O-Matic
  61. A Secure Non-monotonic Soft Concurrent Constraint Language
  62. A First Comparison of Abstract Argumentation Reasoning-Tools
  63. Benchmarking Hard Problems in Random Abstract AFs: The Stable Semantics
  64. Interchangeability with thresholds and degradation factors for Soft CSPs
  65. Solving Fuzzy Distributed CSPs: An Approach with Naming Games
  66. Coalitions of Arguments: An Approach with Constraint Programming
  67. Semiring-based constraint models and frameworks for security-related scenarios
  68. A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials
  69. Evaluation of complex security scenarios using defense trees and economic indexes
  70. Local arc consistency for non-invertible semirings, with an application to multi-objective optimization
  71. Modeling and Solving AFs with a Constraint-Based Tool: ConArg
  72. Securely Accessing Shared Resources with Concurrent Constraint Programming
  73. Negotiation of Weighted RTML Credentials on Mobile Devices
  74. A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming
  75. Towards a similarity-based web service discovery through soft constraint satisfaction problems
  76. Uncertainty in bipolar preference problems
  77. Solving Fuzzy DCSPs with Naming Games
  78. ConArg: A Constraint-Based Computational Framework for Argumentation Systems
  79. Solving Weighted Argumentation Frameworks with Soft Constraints
  80. Security Protocol Deployment Risk
  81. Finding partitions of arguments with Dung's properties via SCSPs
  82. A Nonmonotonic Soft Concurrent Constraint Language to Model the Negotiation Process
  83. Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
  84. Unicast and multicast QoS routing with soft-constraint logic programming
  85. From soft constraints to bipolar preferences: modelling framework and solving issues
  86. Extending Soft Arc Consistency Algorithms to Non-invertible Semirings
  87. A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints
  88. Solving Distributed CSPs Probabilistically
  89. A Common Computational Framework for Semiring-based Argumentation Systems
  90. Solving finite domain constraint hierarchies by local consistency and tree search
  91. Fairness as a QoS Measure for Web Services
  92. Soft Constraints for Quality Aspects in Service Oriented Architectures
  93. A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation
  94. Constraint Based Languages for Biological Reactions
  95. Capturing Fair Computations on Concurrent Constraint Language
  96. C-semiring Frameworks for Minimum Spanning Tree Problems
  97. From Marriages to Coalitions: A Soft CSP Approach
  98. Solving CSPs with Naming Games
  99. Soft Constraints for Dependable Service Oriented Architectures
  100. A Formal and Practical Framework for Constraint-Based Routing
  101. Weighted Datalog and Levels of Trust
  102. Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
  103. Semiring-Based Soft Constraints
  104. Propagating multitrust within trust networks
  105. Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming
  106. Soft constraint based pattern mining
  107. An Optimization Approach using Soft Constraints for the Cascade Vulnerability Problem
  108. Augmented Risk Analysis
  109. Using CP-nets as a guide for countermeasure selection
  110. An asymmetric fingerprint matching algorithm for Java Card TM
  111. Editorial
  112. Soft concurrent constraint programming
  113. Soft Constraints for Security
  114. Special track editorial
  115. Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration
  116. Defense trees for economic evaluation of security investments
  117. A soft constraint-based approach to the cascade vulnerability problem
  118. Information Assurance for security protocols
  119. Relating multiset rewriting and process algebras for security protocol analysis
  120. A Protocol’s Life After Attacks...
  121. Biometrics to Enhance Smartcard Security
  122. Editorial
  123. MOC via TOC Using a Mobile Agent Framework
  124. An Asymmetric Fingerprint Matching Algorithm for Java CardTM
  125. Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
  126. Soft constraint programming to analysing security protocols
  127. Soft Constraint Propagation and Solving in Constraint Handling Rules
  128. Semirings for Soft Constraint Solving and Programming
  129. 1. Introduction
  130. 4. SCSP Abstraction
  131. 6. Soft CLP
  132. 9. Interchangeability in Soft CSPs
  133. Tradeoff Generation Using Soft Constraints
  134. Experimental Evaluation of Interchangeability in Soft CSPs
  135. Abstracting Soft Constraints: Some Experimental Results on Fuzzy CSPs
  136. 10. SCSPs for Modelling Attacks to Security Protocols
  137. Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks
  138. 2. Soft Constraint Satisfaction Problems
  139. 3. Towards SCSPs Solutions
  140. 5. Higher Order Semiring-Based Constraints
  141. 7. SCLP and Generalized Shortest Path Problems
  142. 8. Soft Concurrent Constraint Programming
  143. 11. Conclusions and Directions for Future Work
  144. Symmetry Breaking in Soft CSPs
  145. A Theoretical Framework for Tradeoff Generation using Soft Constraints
  146. Modeling and detecting the cascade vulnerability problem using soft constraints
  147. Computer Algebra for Fingerprint Matching
  148. Interchangeability in Soft CSPs
  149. Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search
  150. A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity
  151. Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
  152. On Representing Biological Systems through Multiset Rewriting
  153. Abstracting soft constraints: Framework, properties, examples
  154. Soft constraint propagation and solving in CHRs
  155. Soft Concurrent Constraint Programming
  156. Soft constraint propagation and solving in CHRs
  157. Interchangeability in Soft CSPs
  158. Soft Constraints for Security Protocol Analysis: Confidentiality
  159. Semiring-based contstraint logic programming: syntax and semantics
  160. An Abstraction Framework for Soft Constraints and Its Relationship with Constraint Propagation
  161. Abstracting Soft Constraints
  162. Constraint Propagation for Soft Constraints: Generalization and Termination Conditions
  163. Labeling and Partial Local Consistency for Soft Constraint Programming
  164. Semiring-based constraint satisfaction and optimization
  165. Semiring-based CSPs and valued CSPs: Basic properties and comparison
  166. SCLP for Trust Propagation in Small-World Networks
  167. A Soft Approach to Multi-objective Optimization
  168. Strategic Games on Defense Trees
  169. Extending the Soft Constraint Based Mining Paradigm
  170. Multilevel Security and Quality of Protection
  171. Timed Soft Concurrent Constraint Programs
  172. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
  173. Bipolar Preference Problems: Framework, Properties and Solving Techniques
  174. Uncertainty in Bipolar Preference Problems
  175. Constraint Symmetry for the Soft CSP
  176. Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
  177. Reasoning about Secure Interoperation Using Soft Constraints
  178. Advancing assurance for secure distributed communications
  179. Encoding partial constraint satisfaction in the semiring-based framework for soft constraints
  180. Analysis of integrity policies using soft constraints
  181. Interchangeability in Soft CSPs