Catuscia Palamidessi
#131,650
Most Influential Person Now
Italian computer scientist
Catuscia Palamidessi's AcademicInfluence.com Rankings
Catuscia Palamidessicomputer-science Degrees
Computer Science
#6578
World Rank
#6935
Historical Rank
Database
#5666
World Rank
#5880
Historical Rank
Download Badge
Computer Science
Catuscia Palamidessi's Degrees
- PhD Computer Science Consorzio ICoN
Similar Degrees You Can Earn
Why Is Catuscia Palamidessi Influential?
(Suggest an Edit or Addition)According to Wikipedia, Catuscia Palamidessi is a computer scientist whose research topics have included differential privacy, location obfuscation, fairness in machine learning, the logic of concurrent systems, and the design of programming languages that combine logic programming and functional programming. Originally from Italy, she has worked in Italy, the US, and France, where she is a director of research for the French Institute for Research in Computer Science and Automation .
Catuscia Palamidessi's Published Works
Published Works
- Geo-indistinguishability: differential privacy for location-based systems (2012) (956)
- Formal Methods for Components and Objects (2002) (539)
- Broadening the Scope of Differential Privacy Using Metrics (2013) (295)
- Declarative Modeling of the Operational Behavior of Logic Languages (1989) (266)
- Optimal Geo-Indistinguishable Mechanisms for Location Privacy (2014) (242)
- Anonymity protocols as noisy channels (2006) (229)
- Measuring Information Leakage Using Generalized Gain Functions (2012) (220)
- Comparing the expressive power of the synchronous and the asynchronous π-calculus (1998) (211)
- Comparing the expressive power of the synchronous and asynchronous $pi$-calculi (2003) (204)
- Computational Logic — CL 2000 (2000) (188)
- Kernel-LEAF: A Logic plus Functional Language (1991) (162)
- Quantitative Notions of Leakage for One-try Attacks (2009) (150)
- Temporal Concurrent Constraint Programming: Denotation, Logic and Applications (2002) (121)
- Differential Privacy: On the Trade-Off between Utility and Information Leakage (2011) (117)
- A Model-Theoretic Reconstruction of the Operational Semantics of Logic Programs (1993) (115)
- Algebraic Properties of Idempotent Substitutions (1990) (105)
- A Fully Abstract Model for Concurrent Constraint Programming (1991) (100)
- A Predictive Differentially-Private Mechanism for Mobility Traces (2013) (98)
- Probabilistic Asynchronous pi-Calculus (2000) (93)
- On the Bayes risk in information-hiding protocols (2008) (89)
- Metrics for Action-labelled Quantitative Transition Systems (2006) (88)
- The Failure of Failures in a Paradigm for Asynchronous Communication (1991) (87)
- Embedding as a Tool for Language Comparison (1994) (83)
- A New Declarative Semantics for Logic Languages (1988) (82)
- Nondeterminism and Infinite Computations in Constraint Programming (1995) (81)
- Constructing elastic distinguishability metrics for location privacy (2015) (80)
- Complementation in abstract interpretation (1995) (76)
- A Temporal Concurrent Constraint Programming Calculus (2001) (74)
- Additive and Multiplicative Notions of Leakage, and Their Capacities (2014) (71)
- Encoding Transition Systems in Sequent Calculus (2003) (69)
- Fair Π (2007) (66)
- On the Relation between Differential Privacy and Quantitative Information Flow (2011) (65)
- Proving concurrent constraint programs correct (1997) (64)
- Axiomatizations for probabilistic finite-state behaviors (2005) (64)
- Making random choices invisible to the scheduler (2007) (63)
- Asynchronous communication in process algebra (1992) (60)
- Efficient Utility Improvement for Location Privacy (2017) (57)
- On the Expressiveness of Linearity vs Persistence in the Asychronous Pi-Calculus (2006) (55)
- Generalized Bisimulation Metrics (2014) (52)
- Computing the Leakage of Information-Hiding Systems (2010) (51)
- A Complete Semantic Characterization of K-Leaf: A Logic Language with Partial Functions (1987) (51)
- Compositional analysis for concurrent constraint programming (1993) (50)
- Spatial and Epistemic Modalities in Constraint-Based Process Calculi (2012) (50)
- Principles of Declarative Programming (1998) (49)
- Foundational aspects of syntax (1999) (46)
- A Probabilistic Applied Pi-Calculus (2007) (44)
- Probability of Error in Information-Hiding Protocols (2007) (43)
- On the Asynchronous Nature of Communication in Concurrent Logic Languages: A Fully Abstract Model Based on Sequences (1990) (42)
- Information Hiding in Probabilistic Concurrent Systems (2010) (42)
- Probable innocence revisited (2005) (42)
- A Synchronization Logic: Axiomatics and Formal Semantics of Generalized Horn Clauses (1984) (41)
- Survey on Causal-based Machine Learning Fairness Notions (2020) (39)
- Weak Probabilistic Anonymity (2007) (39)
- A framework for analyzing probabilistic protocols and its application to the Partial Secrets Exchange (2005) (39)
- Probabilistic Anonymity (2005) (39)
- Axioms for Information Leakage (2016) (39)
- Weak relative pseudo-complements of closure operators (1996) (37)
- On the expressive power of temporal concurrent constraint programming languages (2002) (36)
- Non-monotonic Concurrent Constraint Programming (1993) (35)
- Methods for Location Privacy: A comparative overview (2017) (34)
- Geo-indistinguishability: A Principled Approach to Location Privacy (2015) (34)
- Reconciling Belief and Vulnerability in Information Flow (2010) (34)
- On the Applicability of Machine Learning Fairness Notions (2021) (34)
- Compositional Reasoning for Probabilistic Finite-State Behaviors (2005) (34)
- SOFSEM 2009: Theory and Practice of Computer Science, 35th Conference on Current Trends in Theory and Practice of Computer Science, Spindleruv Mlýn, Czech Republic, January 24-30, 2009. Proceedings (2009) (34)
- On the Expressive Power of Concurrent Constraint Programming Languages (2002) (34)
- Partial Order and SOS Semantics for Linear Constraint Programs (1997) (34)
- Location privacy via geo-indistinguishability (2015) (33)
- Confluence in Concurrent Constraint Programming (1995) (33)
- A randomized encoding of the Pi-calculus with mixed choice (2005) (33)
- Separation of synchronous and asynchronous communication via testing (2006) (32)
- Embedding as a Tool for Language Comparison: On the CSP Hierarchy (1991) (30)
- On the Asynchronous Nature of the Asynchronous pi-Calculus (2008) (29)
- Tutorial on separation results in process calculi via leader election problems (2007) (29)
- Proving concurrent constraint programs correct (1994) (29)
- Information Flow in Interactive Systems (2010) (29)
- Programming Language Implementation and Logic Programming (1991) (28)
- The Science of Quantitative Information Flow (2020) (28)
- Deriving Labels and Bisimilarity for Concurrent Constraint Programming (2011) (28)
- Model Checking Probabilistic and Stochastic Extensions of the π-Calculus (2009) (26)
- A Congruence Format for Name-passing Calculi (2006) (26)
- Model checking the probabilistic pi-calculus (2007) (26)
- Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems (2012) (26)
- Local Differential Privacy on Metric Spaces : optimizing the trade-off with utility ( Invited Paper ) (2018) (26)
- Quantitative information flow in interactive systems (2012) (25)
- The Declarative Semantics of Logical Read-Only Variables (1985) (24)
- Probabilistic Information Flow (2010) (24)
- Preserving differential privacy under finite-precision semantics (2013) (24)
- Explicit fairness in testing semantics (2009) (23)
- Declarative Diagnosis of Temporal Concurrent Constraint Programs (2007) (23)
- Recursion vs Replication in Process Calculi: Expressiveness (2005) (23)
- An Approach to the Declarative Semantics of Synchronization in Logic Languages (1987) (23)
- Concurrent Constraint Programming with Process Mobility (2000) (22)
- On the Semantics of Concurrent Constraint Programming (1992) (21)
- A Process Algebra of Concurrent Constraint Programming (1992) (21)
- Quantitative Information Flow and Applications to Differential Privacy (2011) (21)
- On the Applicability of ML Fairness Notions (2020) (21)
- An Algebraic Perspective of Constraint Logic Programming (1997) (21)
- Semantic Models for a Version of PARLOG (1989) (20)
- Information Leakage Games (2017) (20)
- Control Flow versus Logic: A Denotational and a Declarative Model for Guarded Horn Clauses (1989) (20)
- From concurrent logic programming to concurrent constraint programming (1995) (19)
- Structural operational semantics for AKL (1992) (18)
- On the generalized dining philosophers problem (2001) (18)
- Differential Privacy versus Quantitative Information Flow (2010) (18)
- F-BLEAU: Fast Black-Box Leakage Estimation (2019) (18)
- A framework for abstract interpretation of timed concurrent constraint programs (2009) (17)
- Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility (2018) (17)
- On the information leakage of differentially-private mechanisms (2015) (17)
- Hide and New in the Pi-Calculus (2012) (17)
- Compositional methods for information-hiding † (2008) (16)
- Horizons of the Mind. A Tribute to Prakash Panangaden (2014) (15)
- Safe Equivalences for Security Properties (2010) (15)
- On the Compositionality of Quantitative Information Flow (2016) (14)
- DOCTOR: A Simple Method for Detecting Misclassification Errors (2021) (14)
- Confluence and Concurrent Constraint Programming (1994) (14)
- Metric-based local differential privacy for statistical applications (2018) (14)
- Failure and Success made Symmetric (1990) (14)
- Machine learning fairness notions: Bridging the gap with real-world applications (2020) (13)
- Some Bridging Results and Challenges in Classical, Quantum and Computational Randomness (2011) (13)
- Constraint Logic Programming with Dynamic Scheduling: A Semantics Based on Closure Operators (1997) (13)
- Probabilistic and Nondeterministic Aspects of Anonymity (2006) (13)
- Editors' note: bibliometrics and the curators of orthodoxy (2009) (13)
- Concurrent Constraint Programming with Information Removal (1995) (13)
- A non-local method for robustness analysis of floating point programs (2012) (12)
- A paradigm for asynchronous communication and its application to concurrent constraint programming (1991) (12)
- On Blocks: Locality and Asynchronous Communication (Extended Abstract) (1992) (12)
- Generating Optimal Privacy-Protection Mechanisms via Machine Learning (2019) (12)
- Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms (2014) (12)
- Model checking the probabilistic π-calculus (2007) (11)
- A Two-Level Approach to Logic plus Functional Programming Integration (1987) (11)
- Abstract interpretation of temporal concurrent constraint programs (2013) (11)
- Compositionality Results for Quantitative Information Flow (2014) (11)
- A Declarative Framework for Security: Secure Concurrent Constraint Programming (2006) (11)
- Theory of Security and Applications (2011) (10)
- Concurrent Logic Programming: Asynchronism and Language Comparison (1990) (10)
- Negation as Instantiation (1995) (10)
- On Recursion, Replication and Scope Mechanisms in Process Calculi (2006) (10)
- Probable Innocence in the Presence of Independent Knowledge (2009) (10)
- A fixpoint semantics for guarded Horn clauses (1988) (10)
- Compositional modelling of signalling pathways in timed concurrent constraint programming (2010) (10)
- A quantitative doxastic logic for probabilistic processes and applications to information-hiding (2009) (10)
- A Theory of First-Order Built-in's of Prolog (1992) (9)
- Optimal Obfuscation Mechanisms via Machine Learning (2019) (9)
- A declarative approach for first-order built-in's of Prolog (1992) (9)
- A Game-Theoretic Approach to Information-Flow Control via Protocol Composition (2018) (9)
- Epistemic Strategies and Games on Concurrent Processes (2009) (9)
- An axiomatization of information flow measures (2019) (9)
- Semantic Models for Concurrent Logic Languages (1991) (9)
- Comparing Systems: Max-Case Refinement Orders and Application to Differential Privacy (2019) (9)
- Foundational aspects of security (2014) (8)
- A Logical Characterization of Differential Privacy via Behavioral Metrics (2018) (8)
- Proving Correctness of Constraint Logic Programs with Dynamic Scheduling (1996) (8)
- A Randomized Distributed Encoding of the Pi-Calculus with Mixed Choice (2002) (8)
- From Failure to Success: Comparing a Denotational and a Declarative Semantics for Horn Clause Logic (1992) (8)
- Symbolic Bisimulations for Probabilistic Systems (2007) (8)
- The Bayes Security Measure (2020) (7)
- A Predictive Differentially-Private Mechanism for Location Privacy (2013) (7)
- Separation Results Via Leader Election Problems (2005) (7)
- Contributions to the semantics of logic perpetual processes (1988) (6)
- Structural Operational Semantics for Kernel Andorra Prolog (1991) (6)
- Universal Timed Concurrent Constraint Programming (2007) (6)
- Negation as Instantitation: A New Rule for the Treatment of Negation in Logic Programming (1991) (6)
- Formal Approaches to Information-Hiding (Tutorial) (2007) (6)
- Leakage and Protocol Composition in a Game-Theoretic Perspective (2018) (6)
- A fully abstract model for concurrent logic languages (1990) (6)
- The Replacement Operation for CCP Programs (1999) (6)
- Geometric Noise for Locally Private Counting Queries (2018) (5)
- Feature Selection with Rényi Min-Entropy (2018) (5)
- A logical characterization of differential privacy (2020) (5)
- Concurrent and Reactive Constraint Programming (2010) (5)
- Formal Techniques for Distributed Objects, Components, and Systems (2014) (5)
- Full Convergence of the Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection (2019) (5)
- Generalized Iterative Bayesian Update and Applications to Mechanisms for Privacy Protection (2020) (5)
- A Differentially Private Mechanism of Optimal Utility for a Region of Priors (2013) (5)
- Differential Inference Testing: A Practical Approach to Evaluate Sanitizations of Datasets (2019) (4)
- Spatial Information Distribution in Constraint-based Process Calculi ( Extended Version ) (2012) (4)
- Expressiveness of Probabilistic pi (2006) (4)
- Proceedings of the First International Conference on Computational Logic (2000) (4)
- On the Fixed-Point Semantics of Horn Clauses with Infinite Terms (1983) (4)
- Centrum voor Wiskunde en lnformatica (2005) (4)
- Quantifying leakage in the presence of unreliable sources of information (2017) (3)
- Translating the probabilistic π-calculus to PRISM (2007) (3)
- A Formal Information-Theoretic Leakage Analysis of Order-Revealing Encryption (2021) (3)
- Up-To Techniques for Generalized Bisimulation Metrics (2016) (3)
- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python (2022) (3)
- Quantitative Security Analysis (Dagstuhl Seminar 12481) (2012) (3)
- A Logical Denotational Semantics for Constraint Logic Programming (1994) (3)
- Proceedings of the 7th International Symposium on Trustworthy Global Computing (TGC) (2013) (3)
- Catch me if you can: how geo-indistinguishability affects utility in mobility-based geographic datasets (2019) (3)
- Preface to the special issue on quantitative information flow (2014) (3)
- Constraint programming for concurrent and distributed computing (1997) (3)
- Expressiveness of Recursion, Replication and Scope Mechanisms in Process Calculi (2006) (3)
- Causal Discovery for Fairness (2022) (3)
- Leveraging Adversarial Examples to Quantify Membership Information Leakage (2022) (3)
- Group privacy for personalized federated learning (2022) (3)
- Non-local Robustness Analysis via Rewriting Techniques: Abstract at the Quantities in Formal Methods (2012) (2)
- Proceedings of the Joint Workshop on Theory of Security and Applications (TOSCA) (2012) (2)
- Slicing Concurrent Constraint Programs (2016) (2)
- Proceedings of the 32nd international conference on Automata, Languages and Programming (2005) (2)
- Expressiveness of probabilistic π-calculi ∗ (2006) (2)
- Linear Constraint Systems as High-Level Nets (1996) (2)
- Universal Optimality and Robust Utility Bounds for Metric Differential Privacy (2022) (2)
- Fixpoint Semantics of L-lambda (1993) (2)
- Bounding Information Leakage in Machine Learning (2021) (2)
- Dynamic Slicing for Concurrent Constraint Languages (2020) (2)
- Estimating g-Leakage via Machine Learning (2020) (2)
- A Declarative View of Signaling Pathways (2015) (2)
- Linearity and Persistence in the Pi-Calculus (2004) (2)
- Establishing the Price of Privacy in Federated Data Trading (2021) (2)
- Concurrent Constraint Programming (1994) (2)
- On the Impossibility of Non-trivial Accuracy in Presence of Fairness Constraints (2022) (2)
- A Framework for Abstract Interpretation of Universal Timed Concurrent Constraint Programs (2008) (2)
- Anonymity in Probabilistic and Nondeterministic Systems (2006) (2)
- Comments on "Logic-Programming with Equations" (1991) (2)
- Proceedings of the Eighth International Conference on Quantitative Evaluation of SysTems (2011) (2)
- Randomnes: four questions and some challenges (2010) (2)
- CONCUR 2000 — Concurrency Theory (2000) (2)
- Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges (2015) (2)
- Enhanced models for privacy and utility in continuous-time diffusion networks (2019) (2)
- Information Hiding in (2010) (2)
- Differential privacy (2020) (2)
- CONCUR 2000 - Concurrency Theory: 11th International Conference, University Park, PA, USA, August 22-25, 2000 Proceedings (2000) (1)
- Fixpoint semantics of L l (1993) (1)
- Information Leakage Games: Exploring Information as a Utility Function (2020) (1)
- On the declarative semantics of Horn Clause logic-based languages (1989) (1)
- The Repla ement Operation for CCP ProgramsMar (2000) (1)
- Symbolic Bisimulation for Probabilistic Systems (2020) (1)
- Differential Inference Testing A Practical Approach to Evaluate Anonymized Data (2018) (1)
- Information Hiding in Probabilistic Concurrent Systems (journal version) (2011) (1)
- Embedding as a tool for Language (1994) (1)
- Special issue dedicated to a selection of papers from Mathematical Foundations of Programming Semantics (MFPS XXV). Theoretical Computer Science 430 (1-2) (2012) (1)
- An Incentive Mechanism for Trading Personal Data in Data Markets (2021) (1)
- On the Expressive Power of Temporal Concurrent Constraint Programming Languages (invited talk) (2002) (1)
- Preface - Theoretical Computer Science - Volume 380, Issues 1–2 (2007) (1)
- Survey on Fairness Notions and Related Tensions (2022) (1)
- Feature selection in machine learning: Rényi min-entropy vs Shannon entropy (2020) (1)
- Edinburgh Research Explorer Layout Randomization and Nondeterminism (2014) (1)
- Identifiability of Causal-based Fairness Notions: A State of the Art (2022) (1)
- Utility-Preserving Privacy Mechanisms for Counting Queries (2019) (1)
- Proceedings of the 11th International Conference on Concurrency Theory (2000) (1)
- A Game-Based Architecture for Developing Interactive Components in Computational Logic (2000) (1)
- Entropy and Attack Models in Information Flow - (Invited Talk) (2010) (1)
- PRIVIC: A privacy-preserving method for incremental collection of location data (2022) (1)
- Hide and New in the π -calculus (2012) (1)
- Refinement Orders for Quantitative Information Flow and Differential Privacy (2020) (1)
- On the impossibility of non-trivial accuracy under fairness constraints (2021) (1)
- A privacy preserving querying mechanism with high utility for electric vehicles (2022) (1)
- Languages for Concurrency (2006) (1)
- On the Risks of Collecting Multidimensional Data Under Local Differential Privacy (2022) (1)
- Public Wireless Packets Anonymously Hurt You (2021) (1)
- Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings (2005) (1)
- On $$ \mathit {g} $$ -vulnerability (2020) (0)
- Selected Papers of the Conferences FORTE and COORDINATION 2014 (2017) (0)
- Preface (2010) (0)
- locality On Blocks : and asynchronous communication ( Extended abstract ) (0)
- Posterior vulnerability and leakage (2020) (0)
- On the trade-off between privacy and utility in differentially-private query mechanisms (2015) (0)
- Mobile calculi for distributed programming (2002) (0)
- Fair Pi (2006) (0)
- New Results - Specification and verification of security protocols (2007) (0)
- Spreading ideas and people (2009) (0)
- Foreword (2001) (0)
- Timing attacks on blinded and bucketed cryptography (2020) (0)
- Int. Conf. Principles of Declarative Programming (PLILP), LNCS 1490 (1998) (0)
- Trading Optimality for Performance in Location Privacy (2017) (0)
- MPRI: Foundations of Privacy Final Exam (2020) (0)
- Research Overview and Plans (2002) (0)
- Fair Π ? (2006) (0)
- [Apropos of multiple primary malignancy: pulmonary anaplastic carc0 inoma and mammary adenocarcinoma]. (1967) (0)
- Proceedings of the 35th Conference on Current Trends in Theory and Practice of Computer Science (2009) (0)
- SOFSEM 2009: Theory and Practice of Computer Science 35th Conference on Current Trends in Theory and Practice of Computer Science, Spindleruv Mln, Czech ... Computer Science and General Issues) (2009) (0)
- Quantitative information flow in sequential computer programs (2020) (0)
- Reconstruction of the distribution of sensitive data under free-will privacy (2022) (0)
- The Journal of Functional and Logic Programming the Journal of Functional and Logic Programming a Declarative Debugging Scheme (1997) (0)
- Interactive Information Flow - (Invited Talk) (2010) (0)
- The Dalenius perspective (2020) (0)
- Quantitative Security Analysis (2013) (0)
- Proceedings of the 2011 international conference on Theory of Security and Applications (2011) (0)
- Identifiability of Causal-based ML Fairness Notions (2022) (0)
- Multi-party computation: The Three Judges protocol (2020) (0)
- Probabilistic Information Flow ( Invited Lecture ) (2018) (0)
- Probable Innocence and Independent Knowledge (2021) (0)
- [Present diagnostic methods in pneumology (value of collaboration between ambulatory dispensatory observations and those of the Hospital Pneumology Center)]. (1969) (0)
- A Multiplicative Variant of the Kantorovich distance for Differential Privacy (2014) (0)
- Compositionality of Secure Information Flow (2010) (0)
- [More on the subject of cholesterol pleurisy]. (1977) (0)
- CONCUR Test-Of-Time Award 2021 (Invited Paper) (2021) (0)
- Expressiveness and Distributed Implementation of Conciurrent Calculi with Link Mobility (1999) (0)
- Identifying the optimal di ff erential private mechanisms for di ff erent users ? (2012) (0)
- Hidden-Markov modeling of QIF in sequential programs (2020) (0)
- 10 46 5 v 2 [ cs . C R ] 3 0 M ar 2 01 8 Leakage and Protocol Composition in a Game-Theoretic Perspective ⋆ (2018) (0)
- Scientific Foundations - Process calculi (2005) (0)
- Journal of Computer Security: Preface (2010) (0)
- Voting systems (2020) (0)
- The Crowds protocol (2020) (0)
- Modern Applications of Game-Theoretic Principles (2020) (0)
- Frequency Estimation of Evolving Data Under Local Differential Privacy (2022) (0)
- Editorial: Selected Papers from the Joint International Symposium PLILP/ALP'98 (1999) (0)
- Chair's Letter (2023) (0)
- A Randomized Solution to the Distributed Resource Allocation Problem (2002) (0)
- Proving correctness of Concurrent Constraint Programs (1994) (0)
- Research Program - Probability and information theory (2013) (0)
- On the (Im)Possibility of Estimating Various Notions of Differential Privacy (2022) (0)
- Logic programming : 19th International Conference, ICLP 2003, Mumbai, India, December 9-13, 2003 : proceedings (2003) (0)
- The Journal of Functional and Logic Programming the Journal of Functional and Logic Programming Compile-time Pointer Reversal (1996) (0)
- Foundational Aspects of Syntax Introduction (1999) (0)
- Revised Selected Papers of the 7th International Symposium on Trustworthy Global Computing - Volume 8191 (2012) (0)
- Foreword: Volume 7 (1997) (0)
- Proceedings of the 10th International Symposium on Principles of Declarative Programming (1998) (0)
- The geometry of hypers, gains and losses (2020) (0)
- [Qualitative diagnosis of chronic bronchopneumopathies with regard to a more qualified therapy]. (1971) (0)
- Quantitative Information Flow and applications (2011) (0)
- Program algebra for QIF (2020) (0)
- Trustworthy Global Computing (2012) (0)
- Foreword (1997) (0)
- Composition of channels (2020) (0)
- [Data on the variations of some epidemiological and clinical aspects of tuberculosis in childhood during the period from 1935 to 1959]. (1961) (0)
- On the incompatibility of accuracy and equal opportunity (2023) (0)
- CONCUR Test-Of-Time Award 2022 (2021) (0)
- Defense against side channels (2020) (0)
- Software and Platforms - Calculating the set of corner points of a channel (2013) (0)
- Denotational semantics for Concurrent Constraint Programs analyses (1994) (0)
- Tight Differential Privacy Guarantees for the Shuffle Model with k-Randomized Response (2022) (0)
- Local Methods for Privacy Protection and Impact on Fairness (2023) (0)
- Abstract Interpretation and Logic Programming: Festschrift in honor of professor Giorgio Levi (2009) (0)
- Observations on the Variations of Certain Epidemiological and Clinical Aspects of Tuberculosis in Children from 1935 to 1959. (1961) (0)
- Asynchronous communication in process algebra : extended (2001) (0)
- Quantitative Approaches to Information Protection (2013) (0)
- Explorer Layout Randomization and Nondeterminism (2014) (0)
- Proceedings of the 34th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (2014) (0)
- Special Issue dedicated to a selection of the best papers presented at SECCO'07. Journal of Computer Security 18(2). (2010) (0)
- Research Program - Expressiveness of Concurrent Formalisms (2013) (0)
- Tight Differential Privacy Blanket for Shuffle Model (2022) (0)
- Bounds on the Leakage of the Input's Distribution in Information-Hiding Protocols (2009) (0)
- Modern Applications of Game-Theoretic Principles (Invited Paper) (2020) (0)
- Application Domains - Security and privacy (2013) (0)
- Asynchronous communication in process algebra : extended abstract (1991) (0)
- (Local) Differential Privacy has NO Disparate Impact on Fairness (2023) (0)
- Modeling secrets (2020) (0)
- Session details: Session 3A: Privacy (2020) (0)
- Preface (2000) (0)
- Principles of Declarative Programming, 10th International Symposium, PLILP'98 Held Jointly with the 7th International Conference, ALP'98, Pisa, Italy, September 16-18, 1998, Proceedings (1998) (0)
- Three-way optimization of privacy and utility of location data (2022) (0)
- [Clinico-radiological aspects of the "pulmonary hilus" in the ambulatory diagnosis of primary infection]. (1972) (0)
- Making Random Choices Invisible to the Scheduler (cid:73) (2010) (0)
- Entropy and Attack Models in Information Flow (2018) (0)
- P L ] 3 S ep 2 00 1 Probabilistic asynchronous π-calculus (2008) (0)
- Enhanced models for privacy and utility in continuous-time diffusion networks (2021) (0)
- Alonzo Church Award 2018 - Call for Nominations (2018) (0)
- [Epidemiological study on chronic bronchitis with special reference to various occupational environments in a sample of the population from the town of Pistoia]. (1977) (0)
- Iteration and nontermination (2020) (0)
- A Paradigm for Asynchronous Communication and itsApplication to Concurrent Constraint (1993) (0)
- [HEMATOLOGIC AND HEMATOCHEMICAL ASPECTS OF SUBJECTS WITH RESPIRATORY INSUFFICIENCY DUE TO CHRONIC DISEASES OF THE RESPIRATORY APPARATUS]. (1963) (0)
- Contents and abstracts of the Electronic Notes in Theoretical Computer Science vol. 7: foreword (1999) (0)
- Foreword (2009) (0)
- Semantics for Guarded Horn Clauses * (2007) (0)
- LIC 2015 Conference Organization General Chair (2015) (0)
- Derivation of Constraints from Machine Learning Models and Applications to Security and Privacy (2020) (0)
- Minimizing Information Leakage under Padding Constraints (2022) (0)
- New Software and Platforms - Trace Slicer for Timed Concurrent Constraint Programming (2016) (0)
- Weak Relative Pseudo-complements of Closure Operators Weak Relative Pseudo-complements of Closure Operators (1995) (0)
This paper list is powered by the following services:
Other Resources About Catuscia Palamidessi
What Schools Are Affiliated With Catuscia Palamidessi?
Catuscia Palamidessi is affiliated with the following schools: