Palamidessi, Catuscia, 19..-....
Palamidessi, Catuscia
Palamidessi, Catuscia 1959-
Palamidessi, C. (Catuscia)
Palamidessi, C.
Catuscia Palamidessi informaticienne italienne
VIAF ID: 5760909 (Personal)
Permalink: http://viaf.org/viaf/5760909
Preferred Forms
- 100 0 _ ‡a Catuscia Palamidessi ‡c informaticienne italienne
- 100 1 _ ‡a Palamidessi, C.
-
-
-
-
-
- 100 1 0 ‡a Palamidessi, Catuscia
- 100 1 _ ‡a Palamidessi, Catuscia (sparse)
-
-
- 100 1 _ ‡a Palamidessi, Catuscia ‡d 1959-
- 100 1 _ ‡a Palamidessi, Catuscia ‡d 1959-
- 100 1 _ ‡a Palamidessi, Catuscia, ‡d 19..-....
4xx's: Alternate Name Forms (3)
5xx's: Related Names (5)
- 510 2 _ ‡a Centre Inria Saclay - Île-de-France ‡4 affi ‡4 https://d-nb.info/standards/elementset/gnd#affiliation ‡e Affiliation
- 510 2 _ ‡a Centre Inria Saclay - Île-de-France
- 551 _ _ ‡a Fucecchio ‡4 ortg ‡4 https://d-nb.info/standards/elementset/gnd#placeOfBirth
- 511 2 _ ‡a Laboratoire d'informatique de l'École polytechnique (Palaiseau, Essonne)
- 510 2 _ ‡a PLILP'98 (1998 : Pisa, Italy)
Works
Title | Sources |
---|---|
Adversarial mitigation to reduce unwanted biases in machine learning | |
An algebraic perspective of constraint logic programming | |
Apprentissage de la Représentation des Graphes : des Noyaux aux Réseaux Neuronaux. | |
Apprentissage de quantificateurs pour la détection distribuée préservant la confidentialité, avec application aux compteurs intelligents. | |
Une approche formelle à la modélisation, simulation et analyse de nano-machines | |
Approches formelles pour l'analyse de la performabilité des systèmes communicants mobiles : Applications aux réseaux de capteurs sans fil | |
Approches géométriques et duales pour l'ordonnancement cumulatif. | |
Approches quantitatives de la protection de l'information. | |
Asynchronous communication in process algebra : (extended abstract) | |
Automata, Languages and Programming : 32nd International Colloquim, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings | |
Automated Verification of Privacy in Security Protocols : Back and Forth Between Theory & Practice. | |
Behavioural distances for probabilistic higher-order programs | |
Comprendre et optimiser le compromis entre vie privée et utilité d'un point de vue fondamental. | |
Computational Logic — CL 2000 : First International Conference London, UK, July 24–28, 2000 Proceedings | |
Concevoir mécanismes pour la confidentialité géographique avec flexibilité dans le temps et l'espace. | |
CONCUR 2000 - concurrency theory : 11th international conference, University Park, PA, USA, August 22-25, 2000 : proceedings | |
Designing Location Privacy Mechanisms for flexibility over time and space | |
Differential privacy for metric spaces : information-theoretic models for privacy and utility with new applications to metric domains. | |
Distances comportementales pour des programmes probabilistes d'ordre supérieur. | |
Embedding as a tool for language comparison: on the CSP hierarchy | |
The Epistemic View of Concurrency Theory | |
Des études sur l’équité et la confidentialité dans l’apprentissage automatique. | |
Exploring fairness and privacy in machine learning | |
Express 1997 - special issue : revised and completed versions of some of papers | |
A fixpoint semantics for guarded horn clauses | |
A formal approach to the modeling, simulation and analysis of nano-devices. | |
Formal approaches for performability analysis of communicating systems : an application to wireless sensor networks. | |
Formal approaches to information hiding : an analysis of interactive systems statistical disclosure control and refinement of specifications | |
Formal Techniques for Distributed Objects, Components, and Systems : 34th IFIP WG 6.1 International Conference, FORTE 2014, Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014, Proceedings | |
Formal verification of differential privacy in concurrent systems | |
Fuite de données par les réseaux de neurones. | |
A fully abstract model for concurrent logic languages | |
Geometric and Dual Approaches to Cumulative Scheduling | |
Graph Representation Learning : from Kernel to Neural Networks | |
Graphs, geometry, and representations for language models and networks of entities. | |
Horizons of the Mind. A Tribute to Prakash Panangaden : Essays Dedicated to Prakash Panangaden on the Occasion of His 60th Birthday | |
Leakage of Sensitive Data from Deep Neural Networks | |
Logic programming : 19th International conference, ICLP 2003, Mumbai, India, December 9-13, 2003 : proceedings | |
Mathematical foundations of programming semantics (MFPS XXV) | |
Measuring Privacy with Distinguishability Metrics: Definitions, Mechanisms and Application to Location Privacy | |
Mesurer la confidentialité avec des métriques de discernabilité: définitions, mécanismes et confidentialité des informations liées à la localisation. | |
Méthodes d'apprentissage machine pour la protection de la vie privée : mesure de leakage et design des mécanismes | |
Nondeterminism and infinite computations in constraint programming | |
On the expressiveness of spatial constraint systems | |
On the expressivity of infinite and local behaviour in fragments of the pi-calculus | |
PLILP'98 | |
Principles of declarative programming, 1998: | |
Privacy-Preserving Quantization Learning for Distributed Detection with Applications to Smart Meters | |
Réduire les biais indésirables en apprentissage automatique par atténuation adverse. | |
Safe Programming in Finite Precision: Controlling Errors and Information Leaks | |
The Science of Quantitative Information Flow | |
Securing Machine Learning Algorithms | |
Sécurisation des Algorithmes d'Apprentissage Automatique. | |
Social Graph Anonymization | |
Sur l'expressivité des systèmes de contraintes spatiales. | |
Sur l'expressivité du comportement infini et local dans quelques fragments du calcul pi. | |
Symbolic Proofs of Computational Indistinguishability. | |
A theory of first-order built-in's of Prolog | |
Theory of security and applications joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers | |
TOSCA 2011 | |
Trustworthy Global Computing : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers | |
Understanding and optimizing the trade-off between privacy and utility from a foundational perspective | |
Universal temporal Concurrent Constraint Programming | |
Vérification automatique de la protection de la vie privée : entre théorie et pratique | |
Vérification de propriétés d'indistinguabilité pour les protocoles cryptographiques | |
Vérification efficace d'équivalences observationnelles de processus cryptographiques : théorie et pratique. | |
Vérification Efficace Et Nouvelles Techniques De Raisonnement Pour La Programmation Concurrente Par Contraintes. |