default search action
Riccardo Sisto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza:
Automation for Network Security Configuration: State of the Art and Research Trends. ACM Comput. Surv. 56(3): 57:1-57:37 (2024) - [j47]Daniele Bringhenti, Simone Bussa, Riccardo Sisto, Fulvio Valenza:
A Two-Fold Traffic Flow Model for Network Security Management. IEEE Trans. Netw. Serv. Manag. 21(4): 3740-3758 (2024) - [c73]Daniele Bringhenti, Francesco Pizzato, Riccardo Sisto, Fulvio Valenza:
A Looping Process for Cyberattack Mitigation. CSR 2024: 276-281 - [c72]Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
An intent-based solution for network isolation in Kubernetes. NetSoft 2024: 381-386 - [c71]Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Automatic and optimized firewall reconfiguration. NOMS 2024: 1-9 - [c70]Francesco Pizzato, Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Security Automation in next-generation Networks and Cloud environments. NOMS 2024: 1-4 - 2023
- [j46]Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
A novel abstraction for security configuration in virtual networks. Comput. Networks 228: 109745 (2023) - [j45]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
Automated Firewall Configuration in Virtual Networks. IEEE Trans. Dependable Secur. Comput. 20(2): 1559-1576 (2023) - [c69]Simone Bussa, Riccardo Sisto, Fulvio Valenza:
Formal Verification of the FDO Protocol. CSCN 2023: 290-295 - [c68]Simone Bussa, Riccardo Sisto, Fulvio Valenza:
Formal Verification of a V2X Privacy Preserving Scheme Using Proverif. CSR 2023: 341-346 - [c67]Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
A demonstration of VEREFOO: an automated framework for virtual firewall configuration. NetSoft 2023: 293-295 - [c66]Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Towards Security Automation in Virtual Networks. NetSoft 2023: 326-331 - [c65]Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Automating the configuration of firewalls and channel protection systems in virtual networks. NetSoft 2023: 474-479 - [c64]Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza:
Security automation for multi-cluster orchestration in Kubernetes. NetSoft 2023: 480-485 - [p1]Daniele Bringhenti, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols. Handb. Formal Anal. Verification Cryptogr. 2023: 57-104 - [i6]Mauro Cociglio, Alexandre Ferrieux, Giuseppe Fioccola, Igor Lubashev, Fabio Bulgarella, Massimo Nilo, Isabelle Hamchaoui, Riccardo Sisto:
Explicit Host-to-Network Flow Measurements Techniques. RFC 9506: 1-37 (2023) - 2022
- [j44]Daniele Bringhenti, Jalolliddin Yusupov, Alejandro Molina Zarca, Fulvio Valenza, Riccardo Sisto, Jorge Bernal Bernabé, Antonio F. Skarmeta:
Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks. Comput. Networks 213: 109123 (2022) - [c63]Simone Bussa, Riccardo Sisto, Fulvio Valenza:
Security Automation using Traffic Flow Modeling. NetSoft 2022: 486-491 - [i5]Giuseppe Fioccola, Mauro Cociglio, Amedeo Sapio, Riccardo Sisto, Tianran Zhou:
Clustered Alternate-Marking Method. RFC 9342: 1-24 (2022) - 2021
- [j43]Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov, Adlen Ksentini:
A Formal Approach to Verify Connectivity and Optimize VNF Placement in Industrial Networks. IEEE Trans. Ind. Informatics 17(2): 1515-1525 (2021) - [j42]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Serena Spinoso, Fulvio Valenza, Jalolliddin Yusupov:
Improving the Formal Verification of Reachability Policies in Virtualized Networks. IEEE Trans. Netw. Serv. Manag. 18(1): 713-728 (2021) - [c62]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza:
A novel approach for security function graph configuration and deployment. NetSoft 2021: 457-463 - 2020
- [j41]Marco Iorio, Massimo Reineri, Fulvio Risso, Riccardo Sisto, Fulvio Valenza:
Securing SOME/IP for In-Vehicle Service Protection. IEEE Trans. Veh. Technol. 69(11): 13450-13466 (2020) - [j40]Marco Iorio, Alberto Buttiglieri, Massimo Reineri, Fulvio Risso, Riccardo Sisto, Fulvio Valenza:
Protecting In-Vehicle Services: Security-Enabled SOME/IP Middleware. IEEE Veh. Technol. Mag. 15(3): 77-85 (2020) - [c61]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza:
Short Paper: Automatic Configuration for an Optimal Channel Protection in Virtualized Networks. CYSARM@CCS 2020: 25-30 - [c60]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
Introducing programmability and automation in the synthesis of virtual firewall rules. NetSoft 2020: 473-478 - [c59]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
Automated optimal firewall orchestration and configuration in virtualized networks. NOMS 2020: 1-7 - [c58]Alessio Sacco, Guido Marchetto, Riccardo Sisto, Fulvio Valenza:
Work-in-Progress: A Formal Approach to Verify Fault Tolerance in Industrial Network Systems. WFCS 2020: 1-4 - [i4]Giuseppe Fioccola, Mauro Cociglio, Amedeo Sapio, Riccardo Sisto:
Multipoint Alternate-Marking Method for Passive and Hybrid Performance Monitoring. RFC 8889: 1-23 (2020)
2010 – 2019
- 2019
- [j39]Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
A Framework for Verification-Oriented User-Friendly Network Function Modeling. IEEE Access 7: 99349-99359 (2019) - [j38]Fulvio Valenza, Serena Spinoso, Riccardo Sisto:
Formally specifying and checking policies and anomalies in service function chaining. J. Netw. Comput. Appl. 146 (2019) - [j37]Mauro Cociglio, Giuseppe Fioccola, Guido Marchetto, Amedeo Sapio, Riccardo Sisto:
Multipoint Passive Monitoring in Packet Networks. IEEE/ACM Trans. Netw. 27(6): 2377-2390 (2019) - [c57]Fabio Bulgarella, Mauro Cociglio, Giuseppe Fioccola, Guido Marchetto, Riccardo Sisto:
Performance measurements of QUIC communications. ANRW 2019: 8-14 - [c56]Daniele Bringhenti, Guido Marchetto, Riccardo Sisto, Fulvio Valenza, Jalolliddin Yusupov:
Towards a fully automated and optimized network security functions orchestration. ICCCS 2019: 1-7 - [c55]Marco Iorio, Fulvio Risso, Riccardo Sisto, Alberto Buttiglieri, Massimo Reineri:
Detecting Injection Attacks on Cooperative Adaptive Cruise Control. VNC 2019: 1-8 - 2018
- [j36]Riccardo Sisto, Piergiuseppe Bettassa Copet, Matteo Avalle, Alfredo Pironti:
Formally sound implementations of security protocols with JavaSPI. Formal Aspects Comput. 30(2): 279-317 (2018) - [j35]Serena Spinoso, Marco Leogrande, Fulvio Risso, Sushil Singh, Riccardo Sisto:
Seamless Configuration of Virtual Network Functions in Data Center Provider Networks. J. Netw. Syst. Manag. 26(1): 222-249 (2018) - [j34]Ivano Cerrato, Guido Marchetto, Fulvio Risso, Riccardo Sisto, Matteo Virgilio, Roberto Bonafiglia:
An efficient data exchange mechanism for chained network functions. J. Parallel Distributed Comput. 114: 1-15 (2018) - [c54]Guido Marchetto, Riccardo Sisto, Jalolliddin Yusupov, Adlen Ksentini:
Virtual Network Embedding with Formal Reachability Assurance. CNSM 2018: 368-372 - [c53]Jalolliddin Yusupov, Adlen Ksentini, Guido Marchetto, Riccardo Sisto:
Multi-Objective Function Splitting and Placement of Network Slices in 5G Mobile Networks. CSCN 2018: 1-6 - [c52]Guido Marchetto, Riccardo Sisto, Jalolliddin Yusupov, Adlen Ksentini:
Formally verified latency-aware VNF placement in industrial Internet of things. WFCS 2018: 1-9 - 2017
- [j33]Piergiuseppe Bettassa Copet, Guido Marchetto, Riccardo Sisto, Luciana Costa:
Formal verification of LTE-UMTS and LTE-LTE handover procedures. Comput. Stand. Interfaces 50: 92-106 (2017) - [j32]Matteo Virgilio, Guido Marchetto, Riccardo Sisto:
Push applications and dynamic content generation over content-centric networking. Int. J. Commun. Syst. 30(3) (2017) - [j31]Fulvio Valenza, Tao Su, Serena Spinoso, Antonio Lioy, Riccardo Sisto, Marco Vallini:
A formal approach for network security policy validation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 79-100 (2017) - [c51]Guido Marchetto, Riccardo Sisto, Matteo Virgilio, Jalolliddin Yusupov:
A Framework for User-Friendly Verification-Oriented VNF Modeling. COMPSAC (1) 2017: 517-522 - 2016
- [j30]Piergiuseppe Bettassa Copet, Fulvio Risso, Riccardo Sisto, Cecilia Corbi, Giorgio Ghinamo, Francesco Vadala, Pietro Leggero:
DynNav: Toward Open and Interoperable Navigation Services. IT Prof. 18(2): 35-41 (2016) - [j29]Matteo Avalle, Fulvio Risso, Riccardo Sisto:
Scalable Algorithms for NFA Multi-Striding and NFA-Based Deep Packet Inspection on GPUs. IEEE/ACM Trans. Netw. 24(3): 1704-1717 (2016) - [i3]Guido Marchetto, Riccardo Sisto, Wolfgang John, Pontus Sköldström, Bertrand Pechenot, Felicián Németh, István Pelle, Juhoon Kim, Xuejun Cai, Chunyan Fu, Catalin Meirosu, Kostas Pentikousis, Sachin Sharma, Ioanna Papafili, Serena Spinoso, Matteo Virgilio, Rebecca Steinert, Per Kreuger, Shaoteng Liu, Jan Ekman, Antonio Manzalini, Apoorv Shukla:
Final Service Provider DevOps concept and evaluation. CoRR abs/1610.02387 (2016) - 2015
- [c50]Serena Spinoso, Matteo Virgilio, Wolfgang John, Antonio Manzalini, Guido Marchetto, Riccardo Sisto:
Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context. ESOCC 2015: 253-262 - [c49]Piergiuseppe Bettassa Copet, Guido Marchetto, Riccardo Sisto, Luciana Costa:
Formal verification of LTE-UMTS handover procedures. ISCC 2015: 738-744 - [c48]Matteo Virgilio, Guido Marchetto, Riccardo Sisto:
Interest Flooding Attack Countermeasures Assessment on Content Centric Networking. ITNG 2015: 721-724 - [c47]Alessia Autolitano, Daniele Brevi, Gianluca Cena, Pietro A. Cultrona, Guido Marchetto, Fulvio Rusina, Stefano Scanzio, Riccardo Scopigno, Riccardo Sisto:
Wireless for the factory: The Wi-Fact analysis. RTSI 2015: 403-410 - [c46]Fulvio Valenza, Serena Spinoso, Cataldo Basile, Riccardo Sisto, Antonio Lioy:
A formal model of network policy analysis. RTSI 2015: 516-522 - [i2]Wolfgang John, Catalin Meirosu, Pontus Sköldström, Felician Németh, András Gulyás, Mario Kind, Sachin Sharma, Ioanna Papafili, George Agapiou, Guido Marchetto, Riccardo Sisto, Rebecca Steinert, Per Kreuger, Henrik Abrahamsson, Antonio Manzalini, Nadi Sarrar:
Initial Service Provider DevOps concept, capabilities and proposed tools. CoRR abs/1510.02220 (2015) - [i1]Rebecca Steinert, Wolfgang John, Pontus Sköldström, Bertrand Pechenot, András Gulyás, István Pelle, Tamás Lévai, Felicián Németh, Juhoon Kim, Catalin Meirosu, Xuejun Cai, Chunyan Fu, Kostas Pentikousis, Sachin Sharma, Ioanna Papafili, Guido Marchetto, Riccardo Sisto, Fulvio Risso, Per Kreuger, Jan Ekman, Shaoteng Liu, Antonio Manzalini, Apoorv Shukla, Stefan Schmid:
Service Provider DevOps network capabilities and tools. CoRR abs/1510.02818 (2015) - 2014
- [j28]Matteo Avalle, Alfredo Pironti, Riccardo Sisto:
Formal verification of security protocol implementations: a survey. Formal Aspects Comput. 26(1): 99-123 (2014) - [j27]Alfredo Pironti, Riccardo Sisto:
Safe abstractions of data encodings in formal security protocol models. Formal Aspects Comput. 26(1): 125-167 (2014) - [c45]Piergiuseppe Bettassa Copet, Riccardo Sisto:
Automated Formal Verification of Application-specific Security Properties. ESSoS 2014: 45-59 - [c44]Ivano Cerrato, Guido Marchetto, Fulvio Risso, Riccardo Sisto, Matteo Virgilio:
An efficient data exchange algorithm for chained network functions. HPSR 2014: 98-105 - [c43]Serena Spinoso, Marco Leogrande, Fulvio Risso, Sushil Singh, Riccardo Sisto:
Automatic Configuration of Opaque Network Functions in CMS. UCC 2014: 750-755 - 2013
- [c42]Matteo Virgilio, Guido Marchetto, Riccardo Sisto:
PIT overload analysis in content centric networks. ICN 2013: 67-72 - [c41]Guido Marchetto, Riccardo Sisto, Luca Stanziano:
Resource management policies for cloud-based interactive 3D applications. ICC Workshops 2013: 1388-1392 - 2012
- [j26]Alfredo Pironti, Davide Pozza, Riccardo Sisto:
Formally based semi-automatic implementation of an open security protocol. J. Syst. Softw. 85(4): 835-849 (2012) - [c40]Piergiuseppe Bettassa Copet, Alfredo Pironti, Davide Pozza, Riccardo Sisto, Pietro Vivoli:
Visual Model-Driven Design, Verification and Implementation of Security Protocols. HASE 2012: 62-65 - [c39]Matteo Avalle, Fulvio Risso, Riccardo Sisto:
Efficient multistriding of large non-deterministic finite state automata for deep packet inspection. ICC 2012: 1079-1084 - [c38]Giorgio Ghinamo, Francesco Vadala, Cecilia Corbi, Piergiuseppe Bettassa Copet, Fulvio Risso, Riccardo Sisto:
Vehicle navigation service based on real-time traffic information: A RESTful NetAPI solution with long polling notification. UPINLBS 2012: 1-8 - 2011
- [j25]Matteo Avalle, Alfredo Pironti, Davide Pozza, Riccardo Sisto:
JavaSPI: A Framework for Security Protocol Implementation. Int. J. Secur. Softw. Eng. 2(4): 34-48 (2011) - [j24]Manuel Cheminod, Alfredo Pironti, Riccardo Sisto:
Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access. IEEE Trans. Ind. Informatics 7(1): 30-40 (2011) - [j23]Pierluigi Rolando, Riccardo Sisto, Fulvio Risso:
SPAF: stateless FSA-based packet filters. IEEE/ACM Trans. Netw. 19(1): 14-27 (2011) - [c37]Matteo Avalle, Alfredo Pironti, Riccardo Sisto, Davide Pozza:
The Java SPI Framework for Security Protocol Implementation. ARES 2011: 746-751 - [c36]Denis Makartetskiy, Riccardo Sisto:
An approach to refinement checking of SysML requirements. ETFA 2011: 1-4 - 2010
- [j22]Niccolo Cascarano, Pierluigi Rolando, Fulvio Risso, Riccardo Sisto:
iNFAnt: NFA pattern matching on GPGPU devices. Comput. Commun. Rev. 40(5): 20-26 (2010) - [j21]Alfredo Pironti, Riccardo Sisto:
Provably correct Java implementations of Spi Calculus security protocols specifications. Comput. Secur. 29(3): 302-314 (2010)
2000 – 2009
- 2009
- [j20]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Tools for cryptographic protocols analysis: A technical and experimental comparison. Comput. Stand. Interfaces 31(5): 954-961 (2009) - [j19]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Paolo Maggi, Davide Pozza, Riccardo Sisto, Adriano Valenzano:
Detecting Chains of Vulnerabilities in Industrial Networks. IEEE Trans. Ind. Informatics 5(2): 181-193 (2009) - [c35]Pierluigi Rolando, Riccardo Sisto:
An Experience in Embedded Control Software Verification. ETFA 2009: 1-4 - 2008
- [j18]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Efficient representation of the attacker's knowledge in cryptographic protocols analysis. Formal Aspects Comput. 20(3): 303-348 (2008) - [c34]Alfredo Pironti, Riccardo Sisto:
Soundness Conditions for Message Encoding Abstractions in Formal Security Protocol Models. ARES 2008: 72-79 - [c33]Davide Pozza, Riccardo Sisto:
A Lightweight Security Analyzer inside GCC. ARES 2008: 851-858 - [c32]Paolo Maggi, Davide Pozza, Riccardo Sisto:
Vulnerability Modelling for the Analysis of Network Attacks. DepCoS-RELCOMEX 2008: 15-22 - [c31]Alfredo Pironti, Riccardo Sisto:
Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models. DepCoS-RELCOMEX 2008: 31-38 - [c30]Alfredo Pironti, Riccardo Sisto:
Formally Sound Refinement of Spi Calculus Protocol Specifications into Java Code. HASE 2008: 241-250 - 2007
- [j17]Ivan Cibrario Bertolotti, Luca Durante, Paolo Maggi, Riccardo Sisto, Adriano Valenzano:
Improving the security of industrial networks by means of formal verification. Comput. Stand. Interfaces 29(3): 387-397 (2007) - [j16]Paolo Maggi, Riccardo Sisto:
A Grid-Powered Framework to Support Courses on Distributed Programming. IEEE Trans. Educ. 50(1): 27-33 (2007) - [c29]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems. DepCoS-RELCOMEX 2007: 11-18 - [c28]Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. DepCoS-RELCOMEX 2007: 153-160 - [c27]Alfredo Pironti, Riccardo Sisto:
An Experiment in Interoperable Cryptographic Protocol Implementation Using Automatic Code Generation. ISCC 2007: 839-844 - 2006
- [j15]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Exploiting Symmetries for Testing Equivalence Verification in the Spi Calculus. Int. J. Found. Comput. Sci. 17(4): 815-832 (2006) - [c26]Davide Pozza, Riccardo Sisto, Luca Durante, Adriano Valenzano:
Comparing lexical analysis tools for buffer overflow detection in network software. COMSWARE 2006: 1-7 - 2005
- [c25]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Automatic Detection of Attacks on Cryptographic Protocols: A Case Study. DIMVA 2005: 69-84 - 2004
- [j14]Luigi Ciminiera, Paolo Maggi, Riccardo Sisto:
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture. J. Syst. Softw. 72(3): 367-376 (2004) - [c24]Davide Pozza, Riccardo Sisto, Luca Durante:
Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculus. AINA (1) 2004: 400-405 - [c23]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Exploiting Symmetries for Testing Equivalence in the Spi Calculus. ATVA 2004: 135-149 - 2003
- [j13]Radu Iosif, Riccardo Sisto:
Temporal logic properties of Java objects. J. Syst. Softw. 68(3): 243-251 (2003) - [j12]Luca Durante, Riccardo Sisto, Adriano Valenzano:
Automatic testing equivalence verification of spi calculus specifications. ACM Trans. Softw. Eng. Methodol. 12(2): 222-284 (2003) - [c22]Paolo Maggi, Riccardo Sisto:
A configurable mobile agent data protection protocol. AAMAS 2003: 851-858 - [c21]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Introducing Commutative and Associative Operators in Cryptographic Protocol Analysis. FORTE 2003: 224-239 - [c20]Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis. TACAS 2003: 284-298 - 2002
- [c19]Paolo Maggi, Riccardo Sisto:
Using SPIN to Verify Security Properties of Cryptographic Protocols. SPIN 2002: 187-204 - [c18]Paolo Maggi, Riccardo Sisto:
Experiments on Formal Verification of Mobile Agent Data Integrity Properties. WOA 2002: 131-136 - 2001
- [c17]Luigi Ciminiera, Paolo Maggi, Riccardo Sisto:
SCARAB: Innovative Services Supporting User and Terminal Mobility. ICDCS Workshops 2001: 487-493 - [c16]Xavier Hannotin, Paolo Maggi, Riccardo Sisto:
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study. Mobile Agents 2001: 42-53 - [c15]Paolo Maggi, Riccardo Sisto:
Using Data Flow Analysis to Infer Type Information in Java Bytecode. SCAM 2001: 213- - [c14]Radu Iosif, Riccardo Sisto:
Temporal Logic Properties of Java Objects. SEKE 2001: 120-127 - [c13]Xavier Hannotin, Paolo Maggi, Riccardo Sisto:
Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study. WOA 2001: 36-41 - 2000
- [j11]Riccardo Sisto:
Using binary decision diagrams for representation and analysis of communication protocols. Comput. Networks 32(1): 81-98 (2000) - [c12]Luca Durante, Riccardo Sisto, Adriano Valenzano:
A State-Exploration Technique for Spi-Calculus Testing Equivalence Verification. FORTE 2000: 155-170 - [c11]Radu Iosif, Riccardo Sisto:
Using Garbage Collection in Model Checking. SPIN 2000: 20-33
1990 – 1999
- 1999
- [j10]Claudio Demartini, Radu Iosif, Riccardo Sisto:
A Deadlock Detection Tool for Concurrent Java Programs. Softw. Pract. Exp. 29(7): 577-603 (1999) - [c10]Flavio Lerda, Riccardo Sisto:
Distributed-Memory Model Checking with SPIN. SPIN 1999: 22-39 - [c9]Claudio Demartini, Radu Iosif, Riccardo Sisto:
dSPIN: A Dynamic Extension of SPIN. SPIN 1999: 261-276 - 1998
- [c8]Claudio Demartini, Riccardo Sisto:
A Java-based Formal Development Environment for Factory Communication Systems. ACSD 1998: 273-281 - [c7]Claudio Demartini, Riccardo Sisto:
Static Analysis of Java Multithreaded and Distributed Applications. PDSE 1998: 215-222 - 1997
- [j9]Gianluca Cena, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Adaptive bandwidth balancing mechanisms for DQDB networks. Comput. Commun. 20(9): 804-819 (1997) - 1995
- [j8]Riccardo Sisto, Adriano Valenzano:
Mapping Petri Nets with Inhibitor Arcs onto Basic LOTOS Behavior Expressions. IEEE Trans. Computers 44(12): 1361-1370 (1995) - [c6]Riccardo Sisto:
A method to build symbolic representations of LOTOS specifications. PSTV 1995: 331-346 - 1994
- [j7]Luca Durante, Riccardo Sisto, Adriano Valenzano:
Implementation of static semantic analysis of LOTOS specifications. Softw. Eng. J. 9(2): 55-66 (1994) - [j6]Marco Ajmone Marsan, Andrea Bianco, Luigi Ciminiera, Riccardo Sisto, Adriano Valenzano:
A LOTOS extension for the performance analysis of distributed systems. IEEE/ACM Trans. Netw. 2(2): 151-165 (1994) - [c5]Marco Ajmone Marsan, Andrea Bianco, Luigi Ciminiera, Riccardo Sisto, Adriano Valenzano:
Integrating Peforamnce Analysis in the Context of LOTOS-Based Design. MASCOTS 1994: 292-298 - [c4]Luca Durante, Riccardo Sisto, Adriano Valenzano:
A LOTOS specification of the SERCOS field-bus protocol. SEKE 1994: 139-147 - 1993
- [j5]Adriano Valenzano, Riccardo Sisto, Luigi Ciminiera:
Rapid Prototyping of Protocols from LOTOS Specifications. Softw. Pract. Exp. 23(1): 31-54 (1993) - 1992
- [c3]Riccardo Sisto, Luigi Ciminiera, Adriano Valenzano:
Probabilistic Characterization of Algebraic Protocol Specifications. ICDCS 1992: 260-268 - [c2]Claudio Demartini, Paolo Montuschi, Adriano Valenzano, Luigi Ciminiera, Riccardo Sisto:
Throughput analysis of timed token protocols in double ring networks. LCN 1992: 473-482 - 1991
- [j4]Riccardo Sisto, Luigi Ciminiera, Adriano Valenzano:
A Protocol for Multirendezvous of LOTOS Processes. IEEE Trans. Computers 40(4): 437-447 (1991) - 1990
- [j3]Adriano Valenzano, Riccardo Sisto, Luigi Ciminiera:
An abstract execution model for basic LOTOS. Softw. Eng. J. 5(6): 311-318 (1990) - [j2]Maurizio Morisio, Riccardo Sisto:
The use of Estelle to specify manufacturing systems. Microprocessing and Microprogramming 28(1-5): 253-258 (1990) - [j1]Guido Albertengo, Riccardo Sisto:
Parallel CRC generation. IEEE Micro 10(5): 63-71 (1990) - [c1]Adriano Valenzano, Riccardo Sisto, Luigi Ciminiera:
Modeling the execution of LOTOS specifications by cooperating extended finite state machines. SPDP 1990: 780-785
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint