
Strategyproof Mechanisms for Additively Separable Hedonic Games and Fractional Hedonic Games
Additively separable hedonic games and fractional hedonic games have rec...
read it

Query Answering in ResourceBased Answer Set Semantics
In recent work we defined resourcebased answer set semantics, which is ...
read it

CommittmentBased DataAware MultiAgentContexts Systems
Communication and interaction among agents have been the subject of exte...
read it

Towards Active Logic Programming
In this paper we present the new logic programming language DALI, aimed ...
read it

Characterizing and computing stable models of logic programs: The nonstratified case
Stable Logic Programming (SLP) is an emergent, alternative style of logi...
read it

On Colorful Bin Packing Games
We consider colorful bin packing games in which selfish players control ...
read it

Hardness, Approximability, and FixedParameter Tractability of the Clustered ShortestPath Tree Problem
Given an nvertex nonnegatively realweighted graph G, whose vertices a...
read it

On the Metastability of Quadratic Majority Dynamics on Clustered Graphs and its Biological Implications
We investigate the behavior of a simple majority dynamics on network top...
read it

Consensus Needs Broadcast in Noiseless Models but can be Exponentially Easier in the Presence of Noise
Consensus and Broadcast are two fundamental problems in distributed comp...
read it

Coalition Resilient Outcomes in Max kCut Games
We investigate strong Nash equilibria in the max kcut game, where we ar...
read it

Regular subgroups with large intersection
In this paper we study the relationships between the elementary abelian ...
read it

On the fixedparameter tractability of the maximum 2edgecolorable subgraph problem
A kedgecoloring of a graph is an assignment of colors {1,...,k} to edg...
read it

Stochastic hybrid differential games and match race problems
We discuss the general framework of a stochastic twoplayer, hybrid diff...
read it

Entropy and Compression: A simple proof of an inequality of Khinchin
We prove that Entropy is a lower bound for the average compression ratio...
read it

Entropy and Compression: A simple proof of an inequality of KhinchinOrnsteinShields
We prove that Entropy is a lower bound for the average compression ratio...
read it

About epistemic negation and world views in Epistemic Logic Programs
In this paper we consider Epistemic Logic Programs, which extend Answer ...
read it

A Collocation Method in Spline Spaces for the Solution of Linear Fractional Dynamical Systems
We used a collocation method in refinable spline space to solve a linear...
read it

Towards Ethical Machines Via Logic Programming
Autonomous intelligent agents are playing increasingly important roles i...
read it

A Temporal Module for Logical Frameworks
In artificial intelligence, multi agent systems constitute an interestin...
read it

Memory Management in ResourceBounded Agents
In artificial intelligence, multi agent systems constitute an interestin...
read it

Some grouptheoretical results on Feistel Networks in a longkey scenario
The study of the trapdoors that can be hidden in a block cipher is and h...
read it

NeurOpt: Neural network based optimization for building energy management and climate control
Model predictive control (MPC) can provide significant energy cost savin...
read it

Quality Assurance Technologies of Big Data Applications: A Systematic Literature Review
Big data applications are currently used in many application domains, ra...
read it

Detecting Latency Degradation Patterns in Servicebased Systems
Performance in heterogeneous servicebased systems shows nondetermistic...
read it

Cutting Bamboo Down to Size
This paper studies the problem of programming a robotic panda gardener t...
read it

Convergence analysis of Adaptive Locally Iterative Filtering and SIFT method
Adaptive Local Iterative Filtering (ALIF) is a currently proposed novel ...
read it

Why and How Your Traceability Should Evolve: Insights from an Automotive Supplier
Traceability is a key enabler of various activities in automotive softwa...
read it

Parallel Load Balancing on Constrained ClientServer Topologies
We study parallel Load Balancing protocols for a clientserver distribut...
read it

An Authenticated Key Scheme over Elliptic Curves and Security Considerations
Nodes of sensor networks may be resourceconstrained devices, often havi...
read it

GPUbased parallel simulations of the GatenbyGawlinski model with anisotropic, heterogeneous acid diffusion
We introduce a variant of the GatenbyGawlinski model for acidmediated ...
read it

An Authenticated Key Scheme over Elliptic Curves for Topological Networks
Nodes of sensor networks may be resourceconstrained devices, often havi...
read it

QuasiInterpolant Operators and the Solution of Fractional Differential Problems
Nowadays, fractional differential equations are a well established tool ...
read it

On the primitivity of LaiMassey schemes
In symmetric cryptography, the round functions used as building blocks f...
read it

Sharp Thresholds for a SIR Model on OneDimensional SmallWorld Networks
We study epidemic spreading according to a SusceptibleInfectiousRecove...
read it

Wireless for Control: OvertheAir Controller
In closedloop wireless control systems, the stateoftheart approach p...
read it

Towards a modeling and analysis environment for industrial IoT systems
The development of Industrial Internet of Things systems (IIoT) requires...
read it

MultiContext Systems: Dynamics and Evolution (PrePrint of "Multicontext systems in dynamic environments")
MultiContext Systems (MCS) model in Computational Logic distributed sys...
read it

Finding singlesource shortest pdisjoint paths: fast computation and sparse preservers
Let G be a directed graph with n vertices, m edges, and nonnegative edg...
read it

On the impact of Performance Antipatterns in multiobjective software model refactoring optimization
Software quality estimation is a challenging and timeconsuming activity...
read it

Multiple Sclerosis Lesions Identification/Segmentation in Magnetic Resonance Imaging using Ensemble CNN and Uncertainty Classification
To date, several automated strategies for identification/segmentation of...
read it

A Service for Supporting Digital and Immersive Cultural Experiences
Cultural heritage sites in Italy typically attract a large number of tou...
read it

A Logicbased Multiagent System for Ethical Monitoring and Evaluation of Dialogues
Dialogue Systems are tools designed for various practical purposes conce...
read it

Resilient Level Ancestor, Bottleneck, and Lowest Common Ancestor Queries in Dynamic Trees
We study the problem of designing a resilient data structure maintaining...
read it

A domainspecific modeling and analysis environment for complex IoT applications
To cope with the complexities found in the Internet of Things domain, de...
read it

Architecture Design for HumanDriven Systems
This paper highlights humans' social and mobility behaviors' role in the...
read it
Università degli Studi dell'Aquila
Established in 1952 and located in L'Aquila, administrative centre of the Abruzzo Region, our University is a public teaching and research institution offering a full range of academic programmes including biotechnologies, sciences, economics, engineering, education, humanities, medicine, psychology, and sport sciences. With 7 departments, the University of L'Aquila offers its over 20,000 enrolled students 69 degree courses (divided between first and second level degrees), 26 research doctorate programmes, specialisation schools, specializingmaster courses and vocational courses. Many members of its distinguished faculty of about 600 professors and researchers have received international recognition and are considered leaders in their fields of research.