default search action
Michele Boreale
Person information
- affiliation: University of Florence, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Michele Boreale, Luisa Collodi, Daniele Gorla:
An implicit function theorem for the stream calculus. Log. Methods Comput. Sci. 20(2) (2024) - [j34]Michele Boreale, Luisa Collodi, Daniele Gorla:
Products, Polynomials and Differential Equations in the Stream Calculus. ACM Trans. Comput. Log. 25(1): 7:1-7:26 (2024) - [c58]Michele Boreale, Luisa Collodi:
Guaranteed Inference for Probabilistic Programs: A Parallelisable, Small-Step Operational Approach. VMCAI (2) 2024: 141-162 - 2023
- [c57]Michele Boreale, Luisa Collodi:
Bayesian Parameter Estimation with Guarantees via Interval Analysis and Simulation. VMCAI 2023: 106-128 - [i6]Michele Boreale, Luisa Collodi, Daniele Gorla:
An implicit function theorem for the stream calculus. CoRR abs/2303.11876 (2023) - 2022
- [j33]Michele Boreale:
Automatic pre- and postconditions for partial differential equations. Inf. Comput. 285(Part): 104860 (2022) - [j32]Michele Boreale, Luisa Collodi:
A linear-algebraic method to compute polynomial PDE conservation laws. J. Symb. Comput. 108: 55-72 (2022) - [j31]Héctor D. Menéndez, Michele Boreale, Daniele Gorla, David Clark:
Output Sampling for Output Diversity in Automatic Unit Test Generation. IEEE Trans. Software Eng. 48(2): 295-308 (2022) - [c56]Michele Boreale, Luisa Collodi:
Linearization, Model Reduction and Reachability in Nonlinear odes. RP 2022: 49-66 - 2021
- [j30]Cecilia Viscardi, Michele Boreale, Fabio Corradi:
Weighted approximate Bayesian computation via Sanov's theorem. Comput. Stat. 36(4): 2719-2753 (2021) - [c55]Michele Boreale, Daniele Gorla:
Algebra and Coalgebra of Stream Products. CONCUR 2021: 19:1-19:17 - [i5]Michele Boreale, Daniele Gorla:
Algebra and coalgebra of stream products. CoRR abs/2107.04455 (2021) - 2020
- [j29]Michele Boreale:
Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial odes. Sci. Comput. Program. 193: 102441 (2020) - [j28]Michele Boreale, Fabio Corradi, Cecilia Viscardi:
Relative Privacy Threats and Learning From Anonymized Data. IEEE Trans. Inf. Forensics Secur. 15: 1379-1393 (2020) - [c54]Michele Boreale:
Automatic Pre- and Postconditions for Partial Differential Equations. QEST 2020: 193-210
2010 – 2019
- 2019
- [j27]Michele Boreale:
Algebra, coalgebra, and minimization in polynomial differential equations. Log. Methods Comput. Sci. 15(1) (2019) - [c53]Michele Boreale, Daniele Gorla:
Approximate Model Counting, Sparse XOR Constraints and Minimum Distance. The Art of Modelling Computational Systems 2019: 363-378 - [c52]Michele Boreale:
On the Coalgebra of Partial Differential Equations. MFCS 2019: 24:1-24:13 - [e3]Michele Boreale, Flavio Corradini, Michele Loreti, Rosario Pugliese:
Models, Languages, and Tools for Concurrent and Distributed Programming - Essays Dedicated to Rocco De Nicola on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 11665, Springer 2019, ISBN 978-3-030-21484-5 [contents] - [i4]Michele Boreale, Daniele Gorla:
Approximate Model Counting, Sparse XOR Constraints and Minimum Distance. CoRR abs/1907.05121 (2019) - 2018
- [c51]Michele Boreale:
Algorithms for exact and approximate linear abstractions of polynomial continuous systems. HSCC 2018: 207-216 - [c50]Michele Boreale:
Complete Algorithms for Algebraic Strongest Postconditions and Weakest Preconditions in Polynomial ODE'S. SOFSEM 2018: 442-455 - 2017
- [c49]Michele Boreale:
Algebra, Coalgebra, and Minimization in Polynomial Differential Equations. FoSSaCS 2017: 71-87 - [i3]Michele Boreale:
Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial ode's. CoRR abs/1708.05377 (2017) - [i2]Michele Boreale:
Algebra, coalgebra, and minimization in polynomial differential equations. CoRR abs/1710.08350 (2017) - 2016
- [j26]Michele Boreale, Fabio Corradi:
Searching secrets rationally. Int. J. Approx. Reason. 69: 133-146 (2016) - 2015
- [j25]Michele Boreale, Francesca Pampaloni:
Quantitative information flow under generic leakage functions and adaptive adversaries. Log. Methods Comput. Sci. 11(4) (2015) - [j24]Michele Boreale, David Clark, Daniele Gorla:
A semiring-based trace semantics for processes with applications to information leakage analysis. Math. Struct. Comput. Sci. 25(2): 259-291 (2015) - [j23]Michele Boreale, Francesca Pampaloni, Michela Paolini:
Asymptotic information leakage under one-try attacks. Math. Struct. Comput. Sci. 25(2): 292-319 (2015) - [j22]Michele Boreale, Roberto Bruni, Rocco De Nicola, Michele Loreti:
CaSPiS: a calculus of sessions, pipelines and services. Math. Struct. Comput. Sci. 25(3): 666-709 (2015) - [j21]Michele Boreale, Michela Paolini:
Worst- and average-case privacy breaches in randomization mechanisms. Theor. Comput. Sci. 597: 40-61 (2015) - [c48]Michele Boreale:
Analysis of Probabilistic Systems via Generating Functions and Padé Approximation. ICALP (2) 2015: 82-94 - 2014
- [c47]Michele Boreale, Francesca Pampaloni:
Quantitative Information Flow under Generic Leakage Functions and Adaptive Adversaries. FORTE 2014: 166-181 - [c46]Michele Boreale, Michela Paolini:
On Formally Bounding Information Leakage by Statistical Estimation. ISC 2014: 216-236 - 2013
- [j20]Lucia Acciai, Michele Boreale, Gianluigi Zavattaro:
Behavioural contracts with request-response operations. Sci. Comput. Program. 78(2): 248-267 (2013) - [c45]Michele Boreale, Alessandro Celestini:
Asymptotic Risk Analysis for Trust and Reputation Systems. SOFSEM 2013: 169-181 - [e2]Dirk Beyer, Michele Boreale:
Formal Techniques for Distributed Systems - Joint IFIP WG 6.1 International Conference, FMOODS/FORTE 2013, Held as Part of the 8th International Federated Conference on Distributed Computing Techniques, DisCoTec 2013, Florence, Italy, June 3-5, 2013. Proceedings. Lecture Notes in Computer Science 7892, Springer 2013, ISBN 978-3-642-38591-9 [contents] - 2012
- [j19]Filippo Bonchi, Marcello M. Bonsangue, Michele Boreale, Jan J. M. M. Rutten, Alexandra Silva:
A coalgebraic perspective on linear weighted automata. Inf. Comput. 211: 77-105 (2012) - [j18]Lucia Acciai, Michele Boreale:
Deciding safety properties in infinite-state pi-calculus via behavioural types. Inf. Comput. 212: 92-117 (2012) - [c44]Michele Boreale, Michela Paolini:
Worst- and Average-Case Privacy Breaches in Randomization Mechanisms. IFIP TCS 2012: 72-86 - [c43]Michele Boreale, Francesca Pampaloni:
Quantitative Multirun Security under Active Adversaries. QEST 2012: 158-167 - 2011
- [c42]Michele Boreale, Francesca Pampaloni, Michela Paolini:
Quantitative Information Flow, with a View. ESORICS 2011: 588-606 - [c41]Lucia Acciai, Michele Boreale, Rocco De Nicola:
Linear-Time and May-Testing in a Probabilistic Reactive Setting. FMOODS/FORTE 2011: 29-43 - [c40]Michele Boreale, Francesca Pampaloni, Michela Paolini:
Asymptotic Information Leakage under One-Try Attacks. FoSSaCS 2011: 396-410 - [p2]Lucia Acciai, Chiara Bodei, Michele Boreale, Roberto Bruni, Hugo Torres Vieira:
Static Analysis Techniques for Session-Oriented Calculi. Results of the SENSORIA Project 2011: 214-231 - [p1]Michele Boreale, Mario Bravetti:
Advanced Mechanisms for Service Composition, Query and Discovery. Results of the SENSORIA Project 2011: 282-301 - 2010
- [j17]Lucia Acciai, Michele Boreale:
Spatial and behavioral types in the pi-calculus. Inf. Comput. 208(10): 1118-1153 (2010) - [c39]Lucia Acciai, Michele Boreale, Gianluigi Zavattaro:
Behavioural Contracts with Request-Response Operations. COORDINATION 2010: 16-30 - [c38]Lucia Acciai, Michele Boreale, Gianluigi Zavattaro:
On the Relationship between Spatial Logics and Behavioral Simulations. FoSSaCS 2010: 146-160 - [c37]Michele Boreale, David Clark, Daniele Gorla:
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis. IFIP TCS 2010: 340-354
2000 – 2009
- 2009
- [j16]Michele Boreale:
Quantifying information leakage in process calculi. Inf. Comput. 207(6): 699-725 (2009) - [c36]Michele Boreale:
Weighted Bisimulation in Linear Algebraic Form. CONCUR 2009: 163-177 - [c35]Lucia Acciai, Michele Boreale:
Deciding Safety Properties in Infinite-State Pi-Calculus via Behavioural Types. ICALP (2) 2009: 31-42 - [c34]Lucia Acciai, Michele Boreale:
Deciding Spatial and behavioral properties in the pi-calculus. ICTCS 2009: 7-11 - [e1]Michele Boreale, Steve Kremer:
Proceedings 7th International Workshop on Security Issues in Concurrency, SECCO 2009, Bologna, Italy, 5th September 2009. EPTCS 7, 2009 [contents] - 2008
- [j15]Lucia Acciai, Michele Boreale:
XPi: A typed process calculus for XML messaging. Sci. Comput. Program. 71(2): 110-143 (2008) - [j14]Lucia Acciai, Michele Boreale:
Responsiveness in process calculi. Theor. Comput. Sci. 409(1): 59-93 (2008) - [c33]Lucia Acciai, Michele Boreale:
A Type System for Client Progress in a Service-Oriented Calculus. Concurrency, Graphs and Models 2008: 642-658 - [c32]Lucia Acciai, Michele Boreale:
Spatial and Behavioral Types in the Pi-Calculus. CONCUR 2008: 372-386 - [c31]Michele Boreale, Roberto Bruni, Rocco De Nicola, Michele Loreti:
Sessions and Pipelines for Structured Service Programming. FMOODS 2008: 19-38 - 2007
- [c30]Lucia Acciai, Michele Boreale, Silvano Dal-Zilio:
A Concurrent Calculus with Atomic Transactions. ESOP 2007: 48-63 - [c29]Lucia Acciai, Michele Boreale:
Type Abstractions of Name-Passing Processes. FSEN 2007: 302-317 - 2006
- [j13]Michele Boreale, Fabio Gadducci:
Processes as formal power series: A coinductive approach to denotational semantics. Theor. Comput. Sci. 360(1-3): 440-458 (2006) - [c28]Lucia Acciai, Michele Boreale:
Responsiveness in Process Calculi. ASIAN 2006: 136-150 - [c27]Michele Boreale:
Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. FDTC 2006: 24-35 - [c26]Michele Boreale:
Quantifying Information Leakage in Process Calculi. ICALP (2) 2006: 119-131 - [c25]Lucia Acciai, Michele Boreale, Silvano Dal-Zilio:
A Typed Calculus for Querying Distributed XML Documents. TGC 2006: 167-182 - [c24]Michele Boreale, Roberto Bruni, Luís Caires, Rocco De Nicola, Ivan Lanese, Michele Loreti, Francisco Martins, Ugo Montanari, António Ravara, Davide Sangiorgi, Vasco Thudichum Vasconcelos, Gianluigi Zavattaro:
SCC: A Service Centered Calculus. WS-FM 2006: 38-57 - [i1]Lucia Acciai, Michele Boreale, Silvano Dal-Zilio:
A Concurrent Calculus with Atomic Transactions. CoRR abs/cs/0610137 (2006) - 2005
- [j12]Michele Boreale, Maria Grazia Buscemi:
A method for symbolic analysis of security protocols. Theor. Comput. Sci. 338(1-3): 393-425 (2005) - [c23]Lucia Acciai, Michele Boreale:
XPi: A Typed Process Calculus for XML Messaging. FMOODS 2005: 47-66 - [c22]Michele Boreale, Maria Grazia Buscemi, Ugo Montanari:
A General Name Binding Mechanism. TGC 2005: 61-74 - 2004
- [c21]Michele Boreale, Maria Grazia Buscemi, Ugo Montanari:
D-Fusion: A Distinctive Fusion Calculus. APLAS 2004: 296-310 - 2003
- [c20]Michele Boreale, Maria Grazia Buscemi:
Symbolic Analysis of Crypto-Protocols Based on Modular Exponentiation. MFCS 2003: 269-278 - [c19]Michele Boreale, Fabio Gadducci:
Denotational Testing Semantics in Coinductive Form. MFCS 2003: 279-289 - 2002
- [j11]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Trace and Testing Equivalence on Asynchronous Processes. Inf. Comput. 172(2): 139-164 (2002) - [c18]Michele Boreale, Maria Grazia Buscemi:
A Framework for the Analysis of Security Protocols. CONCUR 2002: 483-498 - [c17]Michele Boreale, Daniele Gorla:
On Compositional Reasoning in the Spi-calculus. FoSSaCS 2002: 67-81 - [c16]Michele Boreale, Maria Grazia Buscemi:
Experimenting with STA, a tool for automatic analysis of security protocols. SAC 2002: 281-285 - 2001
- [j10]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Proof Techniques for Cryptographic Processes. SIAM J. Comput. 31(3): 947-986 (2001) - [j9]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Divergence in testing and readiness semantics. Theor. Comput. Sci. 266(1-2): 237-248 (2001) - [c15]Michele Boreale:
Symbolic Trace Analysis of Cryptographic Protocols. ICALP 2001: 667-681 - 2000
- [j8]Michele Boreale, Luca Trevisan:
A complexity analysis of bisimilarity for value-passing processes. Theor. Comput. Sci. 238(1-2): 313-345 (2000) - [c14]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Process Algebraic Analysis of Cryptographic Protocols. FORTE 2000: 375-392
1990 – 1999
- 1999
- [j7]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Basic Observables for Processes. Inf. Comput. 149(1): 77-98 (1999) - [c13]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
A Theory of "May" Testing for Asynchronous Languages. FoSSaCS 1999: 165-179 - [c12]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Proof Techniques for Cryptographic Processes. LICS 1999: 157-166 - 1998
- [j6]Michele Boreale, Davide Sangiorgi:
A Fully Abstract Semantics for Causality in the \pi-Calculus. Acta Informatica 35(5): 353-400 (1998) - [j5]Michele Boreale:
On the Expressiveness of Internal Mobility in Name-Passing Calculi. Theor. Comput. Sci. 195(2): 205-226 (1998) - [j4]Michele Boreale, Davide Sangiorgi:
Some Congruence Properties for Pi-Calculus Bisimilarities. Theor. Comput. Sci. 198(1-2): 159-176 (1998) - [c11]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Asynchronous Observations of Processes. FoSSaCS 1998: 95-109 - [c10]Michele Boreale, Davide Sangiorgi:
Bisimulation in Name-Passing Calculi without Matching. LICS 1998: 165-175 - [c9]Michele Boreale, Cédric Fournet, Cosimo Laneve:
Bisimulations in the join-calculus. PROCOMET 1998: 68-86 - 1997
- [c8]Michele Boreale, Rocco De Nicola, Rosario Pugliese:
Basic Observables for Processes. ICALP 1997: 482-492 - 1996
- [j3]Michele Boreale, Rocco De Nicola:
A Symbolic Semantics for the pi-Calculus. Inf. Comput. 126(1): 34-52 (1996) - [c7]Michele Boreale:
Symbolic Bisimulation for Timed Processes. AMAST 1996: 321-335 - [c6]Michele Boreale:
On the Expressiveness of Internal Mobility in Name-Passing Calculi. CONCUR 1996: 163-178 - [c5]Michele Boreale, Luca Trevisan:
Bisimilarity Problems Requiring Exponential Time. MFCS 1996: 230-241 - 1995
- [j2]Michele Boreale, Rocco De Nicola:
Testing Equivalence for Mobile Processes. Inf. Comput. 120(2): 279-303 (1995) - [c4]Michele Boreale, Luca Trevisan:
On the Complexity of Bisimilarity for Value-Passing Processes (Extended Abstract). FSTTCS 1995: 294-308 - [c3]Michele Boreale, Davide Sangiorgi:
A Fully Abstract Semantics for Causality in the Pi-Calculus. STACS 1995: 243-254 - 1994
- [c2]Michele Boreale, Rocco De Nicola:
A Symbolic Semantics for the pi-calculus (Extended Abstract). CONCUR 1994: 299-314 - 1992
- [j1]Michele Boreale, Paola Inverardi, Monica Nesi:
Complete Sets of Axioms for Finite Basic LOTOS Behavioural Equivalences. Inf. Process. Lett. 43(3): 155-160 (1992) - [c1]Michele Boreale, Rocco De Nicola:
Testing Equivalence for Mobile Processes (Extended Abstract). CONCUR 1992: 2-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint