Publications of Massimo Merro
This list is not maintained anymore, please for up-to-date publications refer to:
-
my DBLP
(link)
-
my Google Scholar page
(link)
-
my Scopus page
(link)
In Journals
- A Probabilistic Calculus of Cyber-Physical Systems
R. Lanotte, M. Merro and S. Tini.
Information and Computation,
n. 104618, 35 pages, 2021,
(pdf).
- Equational Reasonings in Wireless Network Gossip Protocols
R. Lanotte, M. Merro and S. Tini.
Logical Methods in Computer Science, 14(3)
46 pages, 2018.
(pdf).
- A Semantic Theory of the Internet of Things
R. Lanotte and M. Merro.
Information and Computation, 259(1):72-101, 2018,
DOI .
- Modelling MAC-Layer Communications in Wireless Systems
(pdf)
A. Cerone, M. Hennessy and M. Merro
Logical Methods in Computer Science,
volume 11(1:18), pp. 1-59. 2015.
-
A Semantic Analysis of Key Management Protocols
for Wireless Sensor Networks
(pdf)
D. Macedonio and M. Merro.
Science of Computer Programming, 81:53-78,
2014.
DOI: 10.1016/j.scico.2013.01.005.
- A Calculus of Trustworthy Ad Hoc Networks
(pdf)
M. Merro and E. Sibilio
Formal Aspects of Computing,
25(5):801-832, 2013.
- A Timed Calculus for Wireless Systems
(pdf)
M. Merro, F. Ballardin and E. Sibilio
Theoretical Computer Science,
412(47):6585-6611, 2011.
- On the Observational Theory of the CPS-calculus
(pdf)
M. Merro
Acta Informatica 47(2):111-132, 2010.
- An Observational Theory for Mobile Ad
Hoc Networks (full version) (pdf)
M. Merro
Information and Computation 207(2):194-208, 2009.
- Distributed Consensus, Revisited (pdf)
R. Fuzzati, M. Merro and U. Nestmann
Acta Informatica 44(6):377-425, 2007.
- A Bisimulation Semantic Theory of Safe Ambients
(pdf)
M. Merro and M. Hennessy
ACM Transactions on Programming Languages and Systems
28(2):290-330, 2006.
- Behavioural Theory for Mobile Ambients
(pdf)
M. Merro and F. Zappa Nardelli
Journal of the ACM 52(6):961-1023, 2005.
- Towards a behavioural theory of
access and mobility control in distributed systems
(pdf)
M. Hennessy, M. Merro and J. Rathke
Theoretical Computer Science 322(3):615-669, 2004.
- Communication and Mobility Control in Boxed Ambients
(pdf)
M. Bugliesi, S.
Crafa, M. Merro and V. Sassone.
Information & Computation 202(1):39-86, 2005.
- On asynchrony in name-passing calculi
(pdf)
M. Merro and D. Sangiorgi
Mathematical Structures in Computer Science
14(5):715-767, 2004.
- Mobile Objects as Mobile Processes
(pdf)
M. Merro, J. Kleist and U. Nestmann
Information & Computation 177(2):195-241, 2002.
- Aliasing Models for Mobile Objects
(pdf)
U. Nestmann, H. Huttel, J. Kleist and M. Merro
Information & Computation 175(1):3-33, 2002.
In Conferences and Workshops
- Towards a formal notion of impact metric for cyber-physical attacks
R. Lanotte, M. Merro and S. Tini
In the Proc. of the
14th International Conference on integrated Formal Methods
(iFM 2018).
Lecture Notes in Computer Science, to appear.
- A Modest Security Analysis of Cyber-Physical Systems: A Case Study
R. Lanotte, M. Merro and A. Munteanu
In the Proc. of the
38th IFIP WG 6.1 International Conference on Formal Techniques for Distributed
Objects, Components, and Systems
(FORTE 2018).
Volume 10854 of
Lecture Notes in Computer Science, pp. 58-78, Springer, 2018.
- On cyber-physical attacks in bilateral teleoperation systems: An experimental analysis
A. Munteanu, R. Muradore, M. Merro and P. Fiorini
In the Proc. of the
1st IEEE International Conference
on Industrial Cyber-Physical Systems
(ICPS-2018).
pp. 159-166, IEEE Industrial Electronics Society, 2018.
- AODVv2: Performance vs. Loop Freedom
M. Kamali, M. Merro and A. Dal Corso
In the Proc. of the
44th International Conference on Current Trends in Theory and Practice of Computer Science
(SOFSEM 2018).
Lecture Notes in Computer Science,
volume 10706, pp. 337-350, Springer, 2017.
- Compositional weak metrics for group key update
R. Lanotte, M. Merro and S. Tini
In the Proc. of the
42nd International Symposium on Mathematical Foundations of Computer Science
(MFCS 2017).
LIPIcs, volume 83, pp. 72:1--72:16,
Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2017.
- A Formal Approach to Cyber-Physical Attacks
(pdf)
R. Lanotte, M. Merro, R. Muradore and L. Viganò
In the Proc. of the
30th IEEE International Computer Security Foundations Symposium
(CSF 2017).
IEEE Computer Society, pp. 436-450, 2017.
- Weak Simulation Quasimetric in a Gossip Scenario
R. Lanotte, M. Merro and S. Tini
In the Proc. of the
37th IFIP WG 6.1 International Conference on Formal Techniques for Distributed
Objects, Components, and Systems
(FORTE 2017).
Lecture Notes in Computer Science,
volume 10321, pp. 139-155, Springer, 2017.
- A Calculus of Cyber-Physical Systems
R. Lanotte and M. Merro
In the Proc. of the
11th International Conference on Languages and Automata Theory and Applications
(LATA 2017).
Lecture Notes in Computer Science,
volume 10168, pp. 115-127, Springer, 2017.
- A Semantic Theory of the Internet of Things (extended abstract)
(pdf)
R. Lanotte and M. Merro
In the Proc. of the
18th IFIP International Conference on Coordination Models and Languages
(COORDINATION 2016).
Lecture Notes in Computer Science,
volume 9686, pp. 157-174, Springer 2016.
- Semantics for Locking Specifications
(pdf)
M.D. Ernst, D. Macedonio, M. Merro and F. Spoto
In the Proc. of the
8th NASA Formal Methods Symposium
(NFM 2016).
Lecture Notes in Computer Science,
volume 9690, pp. 355-372, Springer 2016
- Statistical Model Checking of Ad Hoc Routing Protocols in Lossy Grid Networks
(pdf)
A. Dal Corso, D. Macedonio and M. Merro
In the Proc. of the
7th NASA Formal Methods Symposium
(NFM 2015).
Lecture Notes in Computer Science,
volume 9058, pp. 112-126, Springer 2015.
- Modelling MAC-layer communications in wireless systems (Extended abstract)
(pdf)
A. Cerone, M. Hennessy and M. Merro
In the Proc. of the
15th International Conference on Coordination Models and Languages
(COORDINATION 2013).
Lecture Notes in Computer Science,
volume 7890, pp. 16-30, Springer 2013. Best paper award!
- Statistical Model Checking of a Clock Synchronization Protocol for Sensor Networks
(pdf)
L. Battisti, D. Macedonio and M. Merro
In the Proc. of the
5th IPM International Conference of Fundamentals of Software Engineering
(FSEN 2013).
Lecture Notes in Computer Science,
volume 8161, pp. 168-182, Springer 2013.
- A Semantic Analysis of Wireless Network Security Protocols
(pdf)
D. Macedonio and M. Merro
In the Proc. of the
4th NASA Formal Methods
Symposium (NFM 2012).
Lecture Notes in Computer Science,
volume 7226, pp. 403-417, Springer 2012.
- Semantic Analysis of Gossip Protocols for Wireless Sensor Networks
(pdf)
R. Lanotte and M. Merro
In the Proc. of the
22nd International Conference on
Concurrency Theory (CONCUR 2011)
Lecture Notes in Computer Science,
volume 6901, pp. 156-170, Springer 2011.
- A Calculus for the Analysis of Wireless Network Security Protocols
(pdf)
F. Ballardin and M. Merro
In the Proc. of the 7th Workshop on
Formal Aspects in Security and Trust
(FAST'10)
Lecture Notes in Computer Science,
volume 6561, pp. 206-222, Springer 2011.
- Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA
(pdf)
D. Benetti, M. Merro and L. Viganò
In the Proc. of the 8th IEEE Conference on Software Engineering
and Formal Methods (SEFM'10)
IEEE Computer Society Press,
pp. 191-202, 2010.
- A Calculus of Trustworthy Ad Hoc Networks
(pdf)
M. Merro and E. Sibilio.
In the Proc. of the 6th Workshop on
Formal Aspects in Security and Trust (FAST'09)
Lecture Notes in Computer Science,
volume 5983, pp. 157-172, 2010.
- A Timed Calculus for Wireless Systems
(pdf)
M. Merro and E. Sibilio
In the Proc. of the 3rd Conference on Fundamentals
of Software Engineering (FSEN'09)
Lecture Notes in Computer Science,
volume 5961, pp. 228-243, 2010.
- An Observational Theory for Mobile Ad Hoc Networks
M. Merro
In the Proc. of the 23rd Conference on the Mathematical Foundations
of Programming Semantics (MFPS'07)
Electronic Notes in Theoretical Computer Science
173:275-293, 2007.
- On the Observational Theory of the CPS-calculus
(Extended Abstract)
(pdf)
M. Merro and C. Biasi
In the Proc. of the 22nd Conference on the Mathematical
Foundations of Programming Semantics (MFPS'06)
Electronic Notes in Theoretical Computer Science
158:2307-330, 2007
- Behavioural Theory for Mobile Ambients
M. Merro and F. Zappa Nardelli
In the Proc. of the 3rd Conference on Theoretical Computer Science
(IFIP TCS 2004) 2004.
- Modeling Consensus in a Process Calculus
U. Nestmann, R. Fuzzati, M. Merro
In the Proc. of the 14th Conference on Concurrency Theory
(CONCUR'03)
Lecture Notes in Computer Science, volume 2761, pp.399-414, 2003.
- Bisimulation Proof Methods for Mobile Ambients
M. Merro and F. Zappa Nardelli.
In the Proc. of the 30th International Colloquium on Automata,
Languages, and Programming (ICALP'03)
Lecture Notes in Computer Science, volume 2719, pp.584-598, 2003.
- Towards a Behavioural Theory of Access and Mobility Control
in Distributed Systems
M. Hennessy, M. Merro and J. Rathke
In the Proc. of the 6th Conference on the Foundations of Software
Science and Computation
Structures (FOSSACS'03)
Lecture Notes in Computer Science, volume 2620, pp. 282-297, 2003.
- Communication Interference in Mobile Boxed Ambients
(pdf)
M. Bugliesi, S. Crafa, M. Merro and V. Sassone
In Proc. of the 22th Conference on the Foundations
of Software Technology and Theoretical Computer Science (FST&TCS
2002),
Lecture Notes in Computer Science,
volume 2556, pp. 304-320, 2002.
- Typing and Subtyping Mobility in Boxed Ambients
(pdf)
M. Merro and V. Sassone
In Proc. of the 13th Conference on Concurrency Theory (CONCUR'02)
Lecture Notes in Computer Science,
volume 2421, pages 304-320, 2002.
- Bisimulation Congruences in Safe Ambients
(pdf)
M. Merro and M. Hennessy
In Conference Record of the 29th Symposium on
Principle of Programming Languages (POPL 2002), volume 37(1), pp. 71-80, 2002.
- Local Pi-calculus at Work: Mobile Objects as Mobile Processes
M. Merro, J. Kleist and U. Nestmann
In Proc. of the 1st Conference on
Theoretical Computer Science (IFIP TCS2000),
Lecture Notes in Computer Science,
volume 1872, pp. 390-408, 2000.
- Locality and polyadicity in asynchronous name-passing calculi
M. Merro
In Proc. of the 3rd Conference on the Foundations of
Software Science and Computation Structures (FOSSACS 2000)
Lecture Notes in Computer Science,
volume 1784, pp. 238-251, 2000.
- On Equators in Asynchronous Name-passing Calculi without Matching
(pdf)
M. Merro
In Proc. of the 6th Workshop on Expressiveness in Concurrency
(EXPRESS'99)
Electronic Notes in Theoretical Computer Science,
volume 27, 1999.
- Aliasing Models for Object Migration
U. Nestmann, H. Huttel, J. Kleist and M. Merro
In Proc. of the 5th Conference on Parallel
Computing (EURO-PAR 1999),
Lecture Notes in Computer Science,
volume 1685, pp. 1353-1368, 1999.
- On the Expressiveness of Chi, Update, and Fusion calculi
(pdf)
M. Merro
In Proc. of the 5th Workshop on Expressiveness
in Concurrency (EXPRESS'98)
Electronic Notes in Theoretical Computer
16(2), 1998.
- On asynchrony in name-passing calculi
M. Merro and D. Sangiorgi
In Proc. of the 25th Colloquium on Automata,
Languages, and Programming (ICALP'98)
Lecture Notes in Computer Science,
volume 1443, pp. 856-867, 1998.
- Priorities in Statecharts (pdf)
A. Maggiolo-Schettini and M. Merro
In Proc. of the Workshop on Analysis and
Verification of Multiple-agent Languages (LOMAPS 1996)
Lecture Notes in Computer Science,
volume 1192, pp. 404-429, 1996.
PhD Thesis
My PhD thesis, Locality
in the pi-calculus and applications to distributed objects ,
concerns the study of Local pi, an asynchronous fragment of Milner,
Parrow, and Walker's pi-calculus where only the output capability of
names may be transmitted. This restriction makes Local pi
particularly suitable for giving semantics to, and reasoning about,
concurrent or distributed object-based languages. As a major
application of the theory of Local pi, I study the correctness of
object migration in Cardelli's distributed object-based programming
language Obliq.
Last modified: Thu Mar 19 15:47:02 CET 2009