List View
 |   | 
   web
Author Title Year Publication Publisher ISSN ISBN DOI Volume Pages
Tronci, Enrico Equational Programming in Lambda-Calculus via SL-Systems. Part 1 1996 Theoretical Computer Science 10.1016/0304-3975(95)00105-0 160 145-184
Tronci, Enrico Equational Programming in Lambda-Calculus via SL-Systems. Part 2 1996 Theoretical Computer Science 10.1016/0304-3975(95)00106-9 160 185-216
Mancini, T.; Mari, F.; Massini, A.; Melatti, I.; Tronci, E. SyLVaaS: System Level Formal Verification as a Service 2016 Fundamenta Informaticae 10.3233/FI-2016-1444 149 101-132
Alimguzhin, V.; Mari, F.; Melatti, I.; Salvo, I.; Tronci, E. Linearising Discrete Time Hybrid Systems 2017 IEEE Transactions on Automatic Control 0018-9286 10.1109/TAC.2017.2694559 62 5357-5364
Cesta, Amedeo; Fratini, Simone; Orlandini, Andrea; Finzi, Alberto; Tronci, Enrico Flexible Plan Verification: Feasibility Results 2011 Fundamenta Informaticae 10.3233/FI-2011-397 107 111-137
Gribaudo, Marco; Horváth, Andras; Bobbio, Andrea; Tronci, Enrico; Ciancamerla, Ester; Minichino, Michele Fluid Petri Nets and hybrid model checking: a comparative case study 2003 Int. Journal on: Reliability Engineering & System Safety Elsevier 10.1016/S0951-8320(03)00089-9 81 239-257
Piperno, Adolfo; Tronci, Enrico Regular Systems of Equations in λ-calculus 1990 Int. J. Found. Comput. Sci. 10.1142/S0129054190000230 1 325-340
Hayes, B. P. ; Melatti, I.; Mancini, T.; Prodanovic, M.; Tronci, E. Residential Demand Management using Individualised Demand Aware Price Policies 2017 IEEE Transactions On Smart Grid 10.1109/TSG.2016.2596790 8 1284-1294
Bobbio, Andrea; Ciancamerla, Ester; Minichino, Michele; Tronci, Enrico Functional analysis of a telecontrol system and stochastic measures of its GSM/GPRS connections 2005 Archives of Transport – International Journal of Transport Problems 17
Gorrieri, Roberto; Lanotte, Ruggero; Maggiolo-Schettini, Andrea; Martinelli, Fabio; Tini, Simone; Tronci, Enrico Automated analysis of timed security: a case study on web privacy 2004 International Journal of Information Security 10.1007/s10207-004-0037-9 2 168-186