default search action
Luigi Sauro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Marco Faella, Luigi Sauro:
On preferences and reward policies over rankings. Auton. Agents Multi Agent Syst. 38(2): 29 (2024) - [c50]Piero Andrea Bonatti, Francesco Magliocca, Luigi Sauro:
Lost in the Crowd: k-unmatchability in Anonymized Knowledge Graphs. KR 2024 - 2023
- [c49]Piero A. Bonatti, Gianluca Cima, Domenico Lembo, Lorenzo Marconi, Riccardo Rosati, Luigi Sauro, Domenico Fabio Savo:
Dynamic Controlled Query Evaluation over DL-Lite Ontologies (Extended Abstract). Description Logics 2023 - [c48]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
Optimizing the Computation of Overriding in DLN (Extended Abstract). IJCAI 2023: 6860-6862 - 2022
- [j15]Piero Andrea Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Optimizing the computation of overriding in DLN. Artif. Intell. 311: 103764 (2022) - [c47]Marco Faella, Luigi Sauro:
Universal Thompson Sampling. ICMLA 2022: 1109-1114 - [c46]Piero A. Bonatti, Luigi Sauro:
Sticky Policies in OWL2: Extending PL with Fixpoints and Transitive Closure. KR 2022 - [c45]Piero A. Bonatti, Gianluca Cima, Domenico Lembo, Lorenzo Marconi, Riccardo Rosati, Luigi Sauro, Domenico Fabio Savo:
Controlled Query Evaluation in OWL 2 QL: A "Longest Honeymoon" Approach. ISWC 2022: 428-444 - [i7]Piero A. Bonatti, Gianluca Cima, Domenico Lembo, Lorenzo Marconi, Riccardo Rosati, Luigi Sauro, Domenico Fabio Savo:
CQE in OWL 2 QL: A "Longest Honeymoon" Approach (extended version). CoRR abs/2207.11155 (2022) - 2021
- [j14]Marco Faella, Luigi Sauro:
Irrelevant matches in round-robin tournaments. Auton. Agents Multi Agent Syst. 35(1): 5 (2021) - [c44]Piero A. Bonatti, Luigi Sauro:
Tractable Compliance Checking with Negation. Description Logics 2021 - [c43]Piero A. Bonatti, Luigi Sauro, Jonathan Langens:
Representing Consent and Policies for Compliance. EuroS&P Workshops 2021: 283-291 - [c42]Marco Faella, Alberto Finzi, Luigi Sauro:
A practical query selection framework for real-time Bayesian preference elicitation. ICTAI 2021: 248-255 - 2020
- [j13]Piero A. Bonatti, Luca Ioffredo, Iliana M. Petrova, Luigi Sauro, Ida Sri Rejeki Siahaan:
Real-time reasoning in OWL2 for GDPR compliance. Artif. Intell. 289: 103389 (2020) - [j12]Dario Della Monica, Aniello Murano, Luigi Sauro:
Preface. Fundam. Informaticae 176(3-4) (2020) - [j11]Piero A. Bonatti, Sabrina Kirrane, Iliana M. Petrova, Luigi Sauro:
Machine Understandable Policies and GDPR Compliance Checking. Künstliche Intell. 34(3): 303-315 (2020) - [c41]Marco Faella, Luigi Sauro:
Preferences over Rankings and How to Control Them Using Rewards. ECAI 2020: 59-66 - [c40]Marco Faella, Alberto Finzi, Luigi Sauro:
Rapidly Finding the Best Arm Using Variance. ECAI 2020: 2585-2591 - [p2]Piero Andrea Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Defeasible Reasoning in Description Logics: An Overview on DLN. Applications and Practices in Ontology Design, Extraction, and Reasoning 2020: 178-193 - [i6]Piero A. Bonatti, Luca Ioffredo, Iliana Mineva Petrova, Luigi Sauro, Ida Sri Rejeki Siahaan:
Real Time Reasoning in OWL2 for GDPR Compliance. CoRR abs/2001.05390 (2020) - [i5]Piero A. Bonatti, Luca Ioffredo, Iliana M. Petrova, Luigi Sauro:
Fast Compliance Checking with General Vocabularies. CoRR abs/2001.06322 (2020) - [i4]Piero A. Bonatti, Sabrina Kirrane, Iliana M. Petrova, Luigi Sauro:
Machine Understandable Policies and GDPR Compliance Checking. CoRR abs/2001.08930 (2020) - [i3]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
Defeasible reasoning in Description Logics: an overview on DLN. CoRR abs/2009.04978 (2020)
2010 – 2019
- 2019
- [c39]Marco Faella, Luigi Sauro:
Preference Theories on Weak Orders. OVERLAY@AI*IA 2019: 53-58 - [c38]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
A Richer Policy Language for GDPR Compliance. Description Logics 2019 - 2018
- [c37]Marco Faella, Luigi Sauro:
Do all Tournaments Admit Irrelevant Matches? AAMAS 2018: 982-989 - [c36]Piero A. Bonatti, Luigi Sauro:
On the Logical Properties of the Description Logic DL^N (Extended abstract). IJCAI 2018: 5558-5562 - 2017
- [j10]Luigi Sauro:
On the hierarchical nature of partial preferences over lotteries. Auton. Agents Multi Agent Syst. 31(6): 1467-1505 (2017) - [j9]Piero A. Bonatti, Luigi Sauro:
On the logical properties of the nonmonotonic description logic DLN. Artif. Intell. 248: 85-111 (2017) - [c35]Piero A. Bonatti, Marco Faella, Iliana M. Petrova, Luigi Sauro:
A New Semantics for Overriding in Description Logics (Extended Abstract). IJCAI 2017: 4975-4979 - [c34]Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Inference-proof Data Filtering for a Probabilistic Setting. PrivOn@ISWC 2017 - [e1]Dario Della Monica, Aniello Murano, Sasha Rubin, Luigi Sauro:
Joint Proceedings of the 18th Italian Conference on Theoretical Computer Science and the 32nd Italian Conference on Computational Logic co-located with the 2017 IEEE International Workshop on Measurements and Networking (2017 IEEE M&N), Naples, Italy, September 26-28, 2017. CEUR Workshop Proceedings 1949, CEUR-WS.org 2017 [contents] - 2016
- [c33]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Generalized Agent-mediated Procurement Auctions. AAMAS 2016: 77-85 - 2015
- [j8]Piero A. Bonatti, Marco Faella, Iliana M. Petrova, Luigi Sauro:
A new semantics for overriding in description logics. Artif. Intell. 222: 1-48 (2015) - [c32]Piero A. Bonatti, Marco Faella, Carsten Lutz, Luigi Sauro, Frank Wolter:
Decidability of Circumscribed Description Logics Revisited. Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation 2015: 112-124 - [c31]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
Optimized Construction of Secure Knowledge-Base Views. Description Logics 2015 - [c30]Luigi Sauro:
On the Hierarchical Nature of Partial Preferences. PRIMA 2015: 169-184 - [c29]Piero A. Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Optimizing the Computation of Overriding. ISWC (1) 2015: 356-372 - [i2]Piero Andrea Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Optimizing the computation of overriding. CoRR abs/1507.04630 (2015) - 2014
- [c28]Marco Anisetti, Claudio A. Ardagna, Piero A. Bonatti, Ernesto Damiani, Marco Faella, Clemente Galdi, Luigi Sauro:
E-Auctions for Multi-Cloud Service Provisioning. IEEE SCC 2014: 35-42 - [c27]Fabio Mogavero, Aniello Murano, Luigi Sauro:
Strategy games: a renewed framework. AAMAS 2014: 869-876 - [c26]Piero A. Bonatti, Luigi Sauro, Iliana M. Petrova:
A Mechanism for Ontology Confidentiality. CILC 2014: 147-161 - [c25]Fabio Mogavero, Aniello Murano, Luigi Sauro:
A Behavioral Hierarchy of Strategy Logic. CLIMA 2014: 148-165 - [c24]Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Optimality and Complexity of Inference-Proof Data Filtering and CQE. ESORICS (2) 2014: 165-181 - [c23]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Partial Preferences for Mediated Bargaining. SR 2014: 105-111 - [i1]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Defeasible Inclusions in Low-Complexity DLs. CoRR abs/1401.3901 (2014) - 2013
- [j7]Luigi Sauro, Serena Villata:
Dependency in Cooperative Boolean Games. J. Log. Comput. 23(2): 425-444 (2013) - [c22]Fabio Mogavero, Aniello Murano, Luigi Sauro:
On the Boundary of Behavioral Strategies. LICS 2013: 263-272 - [c21]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Auctions for Partial Heterogeneous Preferences. MFCS 2013: 183-194 - [c20]Piero A. Bonatti, Luigi Sauro:
A Confidentiality Model for Ontologies. ISWC (1) 2013: 17-32 - [c19]Piero A. Bonatti, Luigi Sauro, Marco Faella, Clemente Galdi:
An Integrated Formal Approach to Usage Control. IEEE Symposium on Security and Privacy Workshops 2013: 8-12 - 2011
- [j6]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Defeasible Inclusions in Low-Complexity DLs. J. Artif. Intell. Res. 42: 719-764 (2011) - [j5]Piero A. Bonatti, Aidan Hogan, Axel Polleres, Luigi Sauro:
Robust and scalable Linked Data reasoning incorporating provenance and trust annotations. J. Web Semant. 9(2): 165-201 (2011) - [c18]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Adding Default Attributes to EL++. AAAI 2011: 171-176 - [c17]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Towards a Mechanism for Incentivating Privacy. ESORICS 2011: 472-488 - [c16]Piero A. Bonatti, Marco Faella, Luigi Sauro:
On the Complexity of EL with Defeasible Inclusions. IJCAI 2011: 762-767 - 2010
- [j4]Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro:
A Rule-Based Trust Negotiation System. IEEE Trans. Knowl. Data Eng. 22(11): 1507-1520 (2010) - [c15]Piero A. Bonatti, Marco Faella, Luigi Sauro:
EL\mathcal{EL} with Default Attributes and Overriding. ISWC (1) 2010: 64-79
2000 – 2009
- 2009
- [j3]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
Algorithms for finding coalitions exploiting a new reciprocity condition. Log. J. IGPL 17(3): 273-297 (2009) - [c14]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Defeasible Inclusions in Low-Complexity DLs: Preliminary Notes. IJCAI 2009: 696-701 - [c13]Luigi Sauro, Leendert W. N. van der Torre, Serena Villata:
Dependency in Cooperative Boolean Games. KES-AMSTA 2009: 1-10 - [c12]Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, Wolfgang Nejdl, Piero A. Bonatti, Luigi Sauro:
Policy Based Protection and Personalized Generation of Web Content. LA-WEB/CLIHC 2009: 112-119 - [p1]Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro:
Rule-Based Policy Representations and Reasoning. REWERSE 2009: 201-232 - 2008
- [c11]Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro:
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security. ICLP 2008: 779-784 - [c10]Juri Luca De Coi, Daniel Olmedilla, Sergej Zerr, Piero A. Bonatti, Luigi Sauro:
A Trust Management Package for Policy-Driven Protection & Personalization of Web Content. POLICY 2008: 228-230 - [c9]Juri Luca De Coi, Daniel Olmedilla, Piero A. Bonatti, Luigi Sauro:
Protune: A Framework for Semantic Web Policies. ISWC (Posters & Demos) 2008 - 2007
- [j2]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
From social power to social importance. Web Intell. Agent Syst. 5(4): 393-404 (2007) - 2006
- [b1]Luigi Sauro:
Formalizing admissibility criteria in coalition formation among goal-directed agents. University of Turin, Italy, 2006 - [j1]Luigi Sauro:
Qualitative criteria of admissibility for enforced agreements. Comput. Math. Organ. Theory 12(2-3): 147-168 (2006) - [c8]Luigi Sauro, Jelle Gerbrandy, Wiebe van der Hoek, Michael J. Wooldridge:
Reasoning about action and cooperation. AAMAS 2006: 185-192 - [c7]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
Strengthening Admissible Coalitions. ECAI 2006: 195-199 - 2005
- [c6]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
Reducing coalition structures via agreement specification. AAMAS 2005: 1187-1188 - [c5]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
Admissible Agreements among Goal-directed Agents. IAT 2005: 543-554 - [c4]Luigi Sauro:
Formalizing Coalition Structures via Obligations. NORMAS 2005: 48-53 - 2004
- [c3]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
Social Viewpoints on Multiagent Systems. AAMAS 2004: 1358-1359 - [c2]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
An Abstraction from Power to Coalition Structures. ECAI 2004: 965-966 - [c1]Guido Boella, Luigi Sauro, Leendert W. N. van der Torre:
Power and Dependence Relations in Groups of Agents. IAT 2004: 246-252
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint