All Stories

  1. Local Spaces in Soft Concurrent Constraint Programming Oriented to Security
  2. Modelling Dialogues in a Concurrent Language for Argumentation
  3. Tackling disinformation in the UE with “truthster”: technological design and DLT
  4. *-chain: A framework for automating the modeling of blockchain based supply chain tracing systems
  5. A Survey of Steganography Tools at Layers 2-4 and HTTP
  6. Towards a Temporal Probabilistic Argumentation Framework
  7. Towards automated verification of Bitcoin-based decentralised applications
  8. Deriving Dependency Graphs from Abstract Argumentation Frameworks
  9. Introducing a Tool for Concurrent Argumentation
  10. Towards an Implementation of a Concurrent Language for Argumentation
  11. ConArgLib: an argumentation library with support to search strategies and parallel search
  12. Probabilistic abstract argumentation frameworks, a possible world view
  13. Analysis of Ethereum Smart Contracts and Opcodes
  14. Special issue of the Knowledge Representation and Reasoning Track, Symposium on Applied Computing (SAC) 2017
  15. End-to-End Voting with Non-Permissioned and Permissioned Ledgers
  16. Special Issue: Selected Papers from AI∧3 2017, the 1st Workshop on Advances in Argumentation in Artificial Intelligence
  17. A Possible World View and a Normal Form for the Constellation Semantics
  18. CapBAC in Hyperledger Sawtooth
  19. Is Arbitrage Possible in the Bitcoin Market? (Work-In-Progress Paper)
  20. Well-Foundedness in Weighted Argumentation Frameworks
  21. A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report
  22. Probabilistic Argumentation Frameworks with MetaProbLog and ConArg
  23. An Analysis of Non-standard Bitcoin Transactions
  24. Corrigendum
  25. Architecting the Web of Things for the Fog Computing Era
  26. 23rd RCRA International workshop on “Experimental evaluation of algorithms for solving problems with combinatorial explosion”
  27. Message from the Chairs
  28. A novel weighted defence and its relaxation in abstract argumentation
  29. A ConArg-Based Library for Abstract Argumentation
  30. Not only size, but also shape counts: abstract argumentation solvers are benchmark-sensitive
  31. Abstract Argumentation Frameworks to Promote Fairness and Rationality in Multi-experts Multi-criteria Decision Making
  32. On Modeling Multi-experts Multi-criteria Decision-Making Argumentation and Disagreement: Philosophical and Computational Approaches Reconsidered
  33. A community payment scheme for consciousness energy usage
  34. From Argumentation Frameworks to Voting Systems and Back*
  35. A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property
  36. A Hasse Diagram for Weighted Sceptical Semantics with a Unique-Status Grounded Semantics
  37. An end-to-end voting-system based on bitcoin
  38. Go with the -Bitcoin- Flow, with Visual Analytics
  39. PrOnto: an Ontology Driven Business Process Mining Tool
  40. Preface
  41. Theoretical Computer Science in Italy
  42. Automated adaptation via quantitative partial model checking
  43. A Relaxation of Internal Conflict and Defence in Weighted Argumentation Frameworks
  44. A Comparative Test on the Enumeration of Extensions in Abstract Argumentation*
  45. On merging two trust-networks in one with bipolar preferences
  46. Efficient Solution for Credulous/Sceptical Acceptance in Lower-Order Dung's Semantics
  47. An Improved Role-Based Access to Android Applications with JCHR
  48. Two trust networks in one: Using bipolar structures to fuse trust and distrust
  49. Timed soft concurrent constraint programs: An interleaved and a parallel approach
  50. Enumerating Extensions on Random Abstract-AFs with ArgTools, Aspartix, ConArg2, and Dung-O-Matic
  51. A Secure Non-monotonic Soft Concurrent Constraint Language
  52. Interchangeability with thresholds and degradation factors for Soft CSPs
  53. Solving Fuzzy Distributed CSPs: An Approach with Naming Games
  54. Coalitions of Arguments: An Approach with Constraint Programming
  55. Semiring-based constraint models and frameworks for security-related scenarios
  56. A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials
  57. Evaluation of complex security scenarios using defense trees and economic indexes
  58. Local arc consistency for non-invertible semirings, with an application to multi-objective optimization
  59. Modeling and Solving AFs with a Constraint-Based Tool: ConArg
  60. Securely Accessing Shared Resources with Concurrent Constraint Programming
  61. Negotiation of Weighted RTML Credentials on Mobile Devices
  62. A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming
  63. Towards a similarity-based web service discovery through soft constraint satisfaction problems
  64. Uncertainty in bipolar preference problems
  65. Solving Fuzzy DCSPs with Naming Games
  66. ConArg: A Constraint-Based Computational Framework for Argumentation Systems
  67. Solving Weighted Argumentation Frameworks with Soft Constraints
  68. Security Protocol Deployment Risk
  69. Finding partitions of arguments with Dung's properties via SCSPs
  70. A Nonmonotonic Soft Concurrent Constraint Language to Model the Negotiation Process
  71. Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
  72. Unicast and multicast QoS routing with soft-constraint logic programming
  73. From soft constraints to bipolar preferences: modelling framework and solving issues
  74. Extending Soft Arc Consistency Algorithms to Non-invertible Semirings
  75. A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints
  76. Solving Distributed CSPs Probabilistically
  77. Solving finite domain constraint hierarchies by local consistency and tree search
  78. Fairness as a QoS Measure for Web Services
  79. Soft Constraints for Quality Aspects in Service Oriented Architectures
  80. A Nonmonotonic Soft Concurrent Constraint Language for SLA Negotiation
  81. Constraint Based Languages for Biological Reactions
  82. Capturing Fair Computations on Concurrent Constraint Language
  83. C-semiring Frameworks for Minimum Spanning Tree Problems
  84. From Marriages to Coalitions: A Soft CSP Approach
  85. Solving CSPs with Naming Games
  86. Soft Constraints for Dependable Service Oriented Architectures
  87. A Formal and Practical Framework for Constraint-Based Routing
  88. Weighted Datalog and Levels of Trust
  89. Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
  90. Semiring-Based Soft Constraints
  91. Propagating multitrust within trust networks
  92. Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming
  93. Soft constraint based pattern mining
  94. An Optimization Approach using Soft Constraints for the Cascade Vulnerability Problem
  95. Augmented Risk Analysis
  96. Using CP-nets as a guide for countermeasure selection
  97. An asymmetric fingerprint matching algorithm for Java Card TM
  98. Editorial
  99. Soft concurrent constraint programming
  100. Soft Constraints for Security
  101. Special track editorial
  102. Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration
  103. Defense trees for economic evaluation of security investments
  104. A soft constraint-based approach to the cascade vulnerability problem
  105. Information Assurance for security protocols
  106. Relating multiset rewriting and process algebras for security protocol analysis
  107. A Protocol’s Life After Attacks...
  108. Biometrics to Enhance Smartcard Security
  109. Editorial
  110. MOC via TOC Using a Mobile Agent Framework
  111. An Asymmetric Fingerprint Matching Algorithm for Java CardTM
  112. Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
  113. Soft constraint programming to analysing security protocols
  114. Soft Constraint Propagation and Solving in Constraint Handling Rules
  115. Semirings for Soft Constraint Solving and Programming
  116. 1. Introduction
  117. 4. SCSP Abstraction
  118. 6. Soft CLP
  119. 9. Interchangeability in Soft CSPs
  120. Tradeoff Generation Using Soft Constraints
  121. Experimental Evaluation of Interchangeability in Soft CSPs
  122. Abstracting Soft Constraints: Some Experimental Results on Fuzzy CSPs
  123. 10. SCSPs for Modelling Attacks to Security Protocols
  124. Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks
  125. 2. Soft Constraint Satisfaction Problems
  126. 3. Towards SCSPs Solutions
  127. 5. Higher Order Semiring-Based Constraints
  128. 7. SCLP and Generalized Shortest Path Problems
  129. 8. Soft Concurrent Constraint Programming
  130. 11. Conclusions and Directions for Future Work
  131. Symmetry Breaking in Soft CSPs
  132. A Theoretical Framework for Tradeoff Generation using Soft Constraints
  133. Modeling and detecting the cascade vulnerability problem using soft constraints
  134. Computer Algebra for Fingerprint Matching
  135. Interchangeability in Soft CSPs
  136. Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search
  137. A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity
  138. Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
  139. On Representing Biological Systems through Multiset Rewriting
  140. Abstracting soft constraints: Framework, properties, examples
  141. Soft constraint propagation and solving in CHRs
  142. Soft Concurrent Constraint Programming
  143. Soft constraint propagation and solving in CHRs
  144. Interchangeability in Soft CSPs
  145. Soft Constraints for Security Protocol Analysis: Confidentiality
  146. Semiring-based contstraint logic programming: syntax and semantics
  147. An Abstraction Framework for Soft Constraints and Its Relationship with Constraint Propagation
  148. Abstracting Soft Constraints
  149. Constraint Propagation for Soft Constraints: Generalization and Termination Conditions
  150. Labeling and Partial Local Consistency for Soft Constraint Programming
  151. Semiring-based constraint satisfaction and optimization
  152. Semiring-based CSPs and valued CSPs: Basic properties and comparison
  153. SCLP for Trust Propagation in Small-World Networks
  154. A Soft Approach to Multi-objective Optimization
  155. Strategic Games on Defense Trees
  156. Extending the Soft Constraint Based Mining Paradigm
  157. Multilevel Security and Quality of Protection
  158. Timed Soft Concurrent Constraint Programs
  159. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
  160. Bipolar Preference Problems: Framework, Properties and Solving Techniques
  161. Uncertainty in Bipolar Preference Problems
  162. Constraint Symmetry for the Soft CSP
  163. Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario
  164. Reasoning about Secure Interoperation Using Soft Constraints
  165. Advancing assurance for secure distributed communications
  166. Encoding partial constraint satisfaction in the semiring-based framework for soft constraints
  167. Analysis of integrity policies using soft constraints
  168. Interchangeability in Soft CSPs