default search action
Luca Martini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Daniele Zolezzi, Saverio Iacono, Luca Martini, Gianni Viardo Vercelli:
Comunicazione Digitale XR: Assessing the impact of extended reality technologies on learning. Comput. Educ. X Real. 5: 100077 (2024)
2010 – 2019
- 2017
- [c8]Federico Maria Pandolfi, Davide Desirello, Luca Martini, Rosario Di Stabile:
A Framework for Visual Search in Broadcast archives. IIR 2017: 28-39 - [i28]Luca Martini, Giles Heron:
Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP). RFC 8077: 1-35 (2017) - [i27]Luca Martini, George Swallow, Elisa Bellagamba:
MPLS Label Switched Path (LSP) Pseudowire (PW) Status Refresh Reduction for Static PWs. RFC 8237: 1-20 (2017) - 2015
- [c7]Nicola Lovecchio, Giulia Petrucci, Domenico Caputo, Samia Alameddine, Matteo Carpentiero, Luca Martini, Emanuele Parisi, Giampiero de Cesare, Augusto Nascetti:
Thermal control system based on thin film heaters and amorphous silicon diodes. IWASI 2015: 277-282 - [i26]Thomas D. Nadeau, Luca Martini, Stewart Bryant:
Using a Generic Associated Channel Label as a Virtual Circuit Connectivity Verification Channel Indicator. RFC 7708: 1-9 (2015) - 2014
- [i25]Luca Martini, Matthew Bocci, Florin Balus:
Dynamic Placement of Multi-Segment Pseudowires. RFC 7267: 1-24 (2014) - [i24]Luca Martini, Samer Salam, Ali Sajassi, Matthew Bocci, Satoru Matsushima, Thomas D. Nadeau:
Inter-Chassis Communication Protocol for Layer 2 Virtual Private Network (L2VPN) Provider Edge (PE) Redundancy. RFC 7275: 1-83 (2014) - [i23]Kamran Raza, Sami Boutros, Luca Martini, Nicolai Leymann:
Label Advertisement Discipline for LDP Forwarding Equivalence Classes (FECs). RFC 7358: 1-8 (2014) - [i22]Pranjal Kumar Dutta, Matthew Bocci, Luca Martini:
Explicit Path Routing for Dynamic Multi-Segment Pseudowires. RFC 7392: 1-10 (2014) - 2013
- [i21]Thomas Beckhaus, Bruno Decraene, Kishore Tiruveedhula, Maciek Konstantynowicz, Luca Martini:
LDP Downstream-on-Demand in Seamless MPLS. RFC 7032: 1-35 (2013) - 2012
- [j9]Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini:
Efficient Genotype Elimination via Adaptive Allele Consolidation. IEEE ACM Trans. Comput. Biol. Bioinform. 9(4): 1180-1189 (2012) - [i20]Luca Martini, George Swallow, Giles Heron, Matthew Bocci:
Pseudowire Status for Static Pseudowires. RFC 6478: 1-13 (2012) - [i19]Stewart Bryant, Luca Martini, George Swallow, Andrew G. Malis:
Packet Pseudowire Encapsulation over an MPLS PSN. RFC 6658: 1-15 (2012) - 2011
- [i18]Luca Martini, Chris Metz, Thomas D. Nadeau, Matthew Bocci, Mustapha Aïssaoui:
Segmented Pseudowire. RFC 6073: 1-43 (2011) - [i17]Mustapha Aïssaoui, Peter Busschbach, Luca Martini, Monique Morrow, Thomas D. Nadeau, Yaakov Stein:
Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping. RFC 6310: 1-40 (2011) - [i16]Han Li, Luca Martini, Jia He, Feng Huang:
Using the Generic Associated Channel Label for Pseudowire in the MPLS Transport Profile (MPLS-TP). RFC 6423: 1-5 (2011) - 2010
- [b1]Luca Martini:
Checking Secure Information Flow in Programs. University of Pisa, Italy, 2010 - [j8]Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini, Gigliola Vaglini:
Partial model checking via abstract interpretation. Inf. Process. Lett. 110(3): 99-103 (2010) - [j7]Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini:
Using abstract interpretation to add type checking for interfaces in Java bytecode verification. Theor. Comput. Sci. 411(22-24): 2174-2201 (2010) - [c6]Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini:
Celer: an Efficient Program for Genotype Elimination. AMCA-POP 2010: 56-70
2000 – 2009
- 2008
- [j6]Cinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini, Paolo Masci:
Decomposing bytecode verification by abstract interpretation. ACM Trans. Program. Lang. Syst. 31(1): 3:1-3:63 (2008) - [i15]Andrew G. Malis, Jeremy Brayley, John Shirron, Luca Martini, Steve Vogelsang:
Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) Circuit Emulation Service over MPLS (CEM) Encapsulation. RFC 5143: 1-24 (2008) - [i14]Nabil Bitar, Matthew Bocci, Luca Martini:
Requirements for Multi-Segment Pseudowire Emulation Edge-to-Edge (PWE3). RFC 5254: 1-27 (2008) - 2007
- [j5]Nicoletta De Francesco, Luca Martini:
Instruction-level security analysis for information flow in stack-based assembly languages. Inf. Comput. 205(9): 1334-1370 (2007) - [j4]Nicoletta De Francesco, Luca Martini:
Instruction-level security typing by abstract interpretation. Int. J. Inf. Sec. 6(2-3): 85-106 (2007) - [i13]Andrew G. Malis, Luca Martini, Jeremy Brayley, Tom Walsh:
Pseudowire Emulation Edge-to-Edge (PWE3) Asynchronous Transfer Mode (ATM) Transparent Cell Transport Service. RFC 4816: 1-5 (2007) - [i12]Luca Martini, George Swallow:
Wildcard Pseudowire Type. RFC 4863: 1-6 (2007) - [i11]Luca Martini, Eric C. Rosen, Nasser El-Aawar:
Encapsulation Methods for Transport of Layer 2 Frames over MPLS Networks. RFC 4905: 1-20 (2007) - [i10]Luca Martini, Eric C. Rosen, Nasser El-Aawar:
Transport of Layer 2 Frames Over MPLS. RFC 4906: 1-22 (2007) - [i9]Chris Metz, Luca Martini, Florin Balus, Jeff Sugimoto:
Attachment Individual Identifier (AII) Types for Aggregation. RFC 5003: 1-7 (2007) - 2006
- [j3]Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci:
Using Control Dependencies for Space-Aware Bytecode Verification. Comput. J. 49(2): 234-248 (2006) - [j2]Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci:
Using postdomination to reduce space requirements of data flow analysis. Inf. Process. Lett. 98(1): 11-18 (2006) - [i8]Stewart Bryant, George Swallow, Luca Martini, Danny McPherson:
Pseudowire Emulation Edge-to-Edge (PWE3) Control Word for Use over an MPLS PSN. RFC 4385: 1-12 (2006) - [i7]Luca Martini:
IANA Allocations for Pseudowire Edge to Edge Emulation (PWE3). RFC 4446: 1-9 (2006) - [i6]Luca Martini, Eric C. Rosen, Nasser El-Aawar, Toby Smith, Giles Heron:
Pseudowire Setup and Maintenance Using the Label Distribution Protocol (LDP). RFC 4447: 1-33 (2006) - [i5]Luca Martini, Eric C. Rosen, Nasser El-Aawar, Giles Heron:
Encapsulation Methods for Transport of Ethernet over MPLS Networks. RFC 4448: 1-24 (2006) - [i4]Luca Martini, Eric C. Rosen, Giles Heron, Andrew G. Malis:
Encapsulation Methods for Transport of PPP/High-Level Data Link Control (HDLC) over MPLS Networks. RFC 4618: 1-16 (2006) - [i3]Luca Martini, Claude Kawa, Andrew G. Malis:
Encapsulation Methods for Transport of Frame Relay over Multiprotocol Label Switching (MPLS) Networks. RFC 4619: 1-19 (2006) - [i2]Pedro R. Marques, Ronald P. Bonica, Luyuan Fang, Luca Martini, Robert Raszuk, Keyur Patel, Jim Guichard:
Constrained Route Distribution for Border Gateway Protocol/MultiProtocol Label Switching (BGP/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs). RFC 4684: 1-14 (2006) - [i1]Luca Martini, J. Jayakumar, Matthew Bocci, Nasser El-Aawar, Jeremy Brayley, Ghassem Koleyni:
Encapsulation Methods for Transport of Asynchronous Transfer Mode (ATM) over MPLS Networks. RFC 4717: 1-40 (2006) - 2005
- [c5]Nicoletta De Francesco, Luca Martini:
Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations. Formal Aspects in Security and Trust 2005: 63-80 - [c4]Cinzia Bernardeschi, Giuseppe Lettieri, Luca Martini, Paolo Masci:
A Space-Aware Bytecode Verifier for Java Cards. Bytecode@ETAPS 2005: 237-254 - 2004
- [j1]Cinzia Bernardeschi, Nicoletta De Francesco, Giuseppe Lettieri, Luca Martini:
Checking secure information flow in Java bytecode by code transformation and standard bytecode verification. Softw. Pract. Exp. 34(13): 1225-1255 (2004) - [c3]Cinzia Bernardeschi, Luca Martini:
Enforcement of applet boundaries in Java card systems. IASTED Conf. on Software Engineering and Applications 2004: 96-101 - [c2]Cinzia Bernardeschi, Luca Martini, Paolo Masci:
Java bytecode verification with dynamic structures. IASTED Conf. on Software Engineering and Applications 2004: 559-564 - 2003
- [c1]Cinzia Bernardeschi, Nicoletta De Francesco, Luca Martini:
Efficient Bytecode Verification Using Immediate Postdominators in Control Flow Graphs: Extended Abstract. OTM Workshops 2003: 425-436
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint