default search action
Monica Nesi
Person information
- affiliation: University of L'Aquila, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i1]Karthik Vaidhyanathan, Antonio Bruno, Eleonora Mendola, Filippo Mignosi, Mahyar Tourchi Moghaddam, Henry Muccini, Monica Nesi:
A Service for Supporting Digital and Immersive Cultural Experiences. CoRR abs/2109.07900 (2021)
2000 – 2009
- 2006
- [j7]Monica Nesi, Giustina Nocera:
Deriving the Type Flaw Attacks in the Otway-Rees Protocol by Rewriting. Nord. J. Comput. 13(1-2): 78-97 (2006) - 2005
- [c16]Monica Nesi, Giuseppina Rucci:
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting. ARSPA@ICALP 2005: 95-114 - 2004
- [c15]Paola Inverardi, Fabio Mancinelli, Monica Nesi:
A declarative framework for adaptable applications in heterogeneous environments. SAC 2004: 1177-1183 - 2003
- [j6]Benedetto Intrigila, Monica Nesi:
On structural properties of eta-expansions of identity. Inf. Process. Lett. 87(6): 327-333 (2003) - [c14]Monica Nesi, Giuseppina Rucci, Massimo Verdesca:
A rewriting strategy for protocol verification. WRS 2003: 657-672
1990 – 1999
- 1999
- [j5]Monica Nesi:
Formalising a Value-Passing Calculus in HOL. Formal Aspects Comput. 11(2): 160-199 (1999) - [c13]Paola Inverardi, Monica Nesi:
Adding sorts to TRSs: a result on modularity of termination. APPIA-GULP-PRODE 1999: 273-288 - 1997
- [b1]Monica Nesi:
Formalising process calculi in higher order logic. University of Cambridge, UK, Technical Report / University of Cambridge / Computer Laboratory 411, 1997, pp. I-X, 1-182 - 1996
- [c12]Monica Nesi:
Mechanising a modal logic for value-passing agents in HOL. INFINITY 1996: 31-46 - 1995
- [j4]Paola Inverardi, Monica Nesi:
Deciding Observational Congruence of Finite-State CCS Expressions by Rewriting. Theor. Comput. Sci. 139(1&2): 315-354 (1995) - [j3]Paola Inverardi, Monica Nesi:
Infinite Normal Forms for Non-Linear Term Rewritting Systems. Theor. Comput. Sci. 152(2): 285-303 (1995) - 1993
- [c11]Monica Nesi, Valeria de Paiva, Eike Ritter:
Rewriting Properties of Combinators for Rudimentary Linear Logic. HOA 1993: 256-275 - [c10]Monica Nesi:
Value-Passing CCS in HOL. HUG 1993: 352-365 - 1992
- [j2]Michele Boreale, Paola Inverardi, Monica Nesi:
Complete Sets of Axioms for Finite Basic LOTOS Behavioural Equivalences. Inf. Process. Lett. 43(3): 155-160 (1992) - [c9]Paola Inverardi, Monica Nesi:
A Strategy to Deal with Divergent Rewrite Systems. CTRS 1992: 458-467 - [c8]Monica Nesi:
Formalizing a Modal Logic for CSS in the HOL Theorem Prover. TPHOLs 1992: 279-294 - 1991
- [c7]Paola Inverardi, Monica Nesi:
On Rewriting Behavioral Semantics in Process Algebras. AMAST 1991: 108-116 - [c6]Monica Nesi:
Mechanizing a Proof by Induction of Process Algebrs Specifications in Higher Order Logic. CAV 1991: 288-298 - [c5]Rocco De Nicola, Paola Inverardi, Monica Nesi:
Equational reasoning about LOTOS specifications: a rewriting approach. IWSSD 1991: 148-155 - [c4]Paola Inverardi, Monica Nesi:
Infinite Normal Forms for Non-Linear Term Rewriting Systems. MFCS 1991: 231-239 - [c3]Albert John Camilleri, Paola Inverardi, Monica Nesi:
Combining Interaction and Automation in Process Algebra Verification. TAPSOFT, Vol.2 1991: 283-296 - 1990
- [j1]Paola Inverardi, Monica Nesi:
A Rewriting Strategy to Verify Observational Congruence. Inf. Process. Lett. 35(4): 191-199 (1990)
1980 – 1989
- 1989
- [c2]Rocco De Nicola, Paola Inverardi, Monica Nesi:
Using the Axiomatic Presentation of Behavioural Equivalences for Manipulating CCS Specifications. Automatic Verification Methods for Finite State Systems 1989: 54-67 - 1988
- [c1]Stefania Gnesi, Paola Inverardi, Monica Nesi:
A Logic-Functional Approach to the Execution of CCS Specifications Modulo Behavioural Equivalences. Concurrency 1988: 181-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint