1

DBCChecker: A Bigraph-Based Tool for Checking Security Properties of Container Compositions

Despite their widespread application in modern systems, container composition is often complex and error-prone. In this work, we present DBCChecker, a tool aiming to verify security properties of systems obtained by composition of containers. From …

Graph-Theoretical Arguments in Support of a Quantum Declarative Manifesto

The encoding of graphs and the development of efficient algorithms over graphs in the Quantum framework is still a challenging problem. More in general, the understanding of whether a problem can benefit of the Quantum speed-up or not is far from …

Modeling Carne PRI supply chain with the *-Chain Platform

Certification of the origin of products and control over the production chain are fundamental activities that can make goods competitive. Therefore, it is of great interest to develop platforms that enable domain experts to build supply chain …

Neural Networks Reduction via Lumping

The increasing size of recently proposed Neural Networks makes it hard to implement them on embedded devices, where memory, battery and computational power are a non-trivial bottleneck. For this reason during the last years network compression …

Optimal Wheeler Language Recognition

A Wheeler automaton is a finite state automaton whose states admit a total Wheeler order, reflecting the co-lexicographic order of the strings labeling source-to-node paths). A Wheeler language is a regular language admitting an accepting Wheeler …

Pairing an Autoencoder and a SF-SOINN for Implementing an Intrusion Detection System

Intrusion Detection System are systems aiming to detect intrusions within individual computers or networks. These systems are of fundamental importance nowadays, as the number of attacks on networks is ever increasing. In this paper, a prototype of a …

Set-Based Invariants over Polynomial Systems

Dynamical systems model the time evolution of both natural and engineered processes. The automatic analysis of such models relies on different techniques ranging from reachability analysis, model checking, theorem proving, and abstractions. In this …

Synthesis of CNOT minimal quantum circuits with topological constraints through ASP

Although with some yet severe limitations, Physical working Quantum Computers are becoming available for end users. Such devices are based on the rules of Quantum Mechanics, which state that physical systems evolve through unitary transformations. …

Towards explainable data-to-text generation

In recent years there has been a renewed burst of interest in systems able to textually summarize data, producing natural language text as a description of input data series. Many of the recently proposed approaches to solve the data-to-text task are …

A Calculus for Subjective Communication

In this paper we introduce Subjective Communication, a new interaction model for CAS and generalizing the attribute-based communication introduced in the AbC calculus. In this model, a message is broadcasted to every process, but each process can …