Luigia Carlucci Aiello

Learn More
We illustrate <i>AL<inf>SP</inf></i> (Action Language for Security Protocol), a declarative executable specification language for planning attacks to security protocols. <i>AL<inf>SP</inf></i> is based on logic programming with negation as failure, and with stable model semantics. In <i>AL<inf>SP</inf></i> we can give a declarative specification of a(More)
Formal verification of security protocols has become a key issue in computer security. Yet, it has proven to be a hard task often error prone and discouraging for non-experts in formal methods. In this paper we show how security protocols can be specified and verified efficiently and effectively by embedding reasoning about actions into a logic programming(More)
We present a general proof theoretical methodology for default systems. Given a default theory 〈W, D〉, the default rules D are simply understood as restrictions on the tableaux construction of the logic. Different default approaches have their own way of understanding these restrictions and executing them. For each default approach (such as Reiter, Brewka(More)
A basic feature of Intelligent Tutoring Systems (ITS) is their ability to represent domain knowledge that can be attributed to the student at each stage of the learning process. In this paper we present a general (first order logic) framework for the representation of this kind of knowledge acquired by the system through the analysis of the student answers.(More)
The currently available speech technologies on mobile devices achieve effective performance in terms of both reliability and the language they are able to capture. The availability of performant speech recognition engines may also support the deployment of vocal interfaces in consumer robots. However, the design and implementation of such interfaces still(More)