
Marco Pedicini
-
Associate Professor in Computer Science
Department of Mathematics and Physics
Roma Tre University -
Research Associate
Istituto per le Applicazioni del Calcolo "Mauro Picone"
Associate Professor in Computer Science
Department of Mathematics and Physics
Roma Tre University
Research Associate
Istituto per le Applicazioni del Calcolo "Mauro Picone"
Linear Logic and its applications to design and evaluation of functional programming languages.
Representation of real numbers in non-integer bases. Pisot Numbers and their properties.
Genetic Networks. Characterization of Limit Cycles. Immune System Simulation.
@unpublished{komornik2022, author={KOMORNIK V and LORETI P and PEDICINI M}, title={A quasi-ergodic approach to non-integer base expansions}, year=2022 }
@article{komornik2017b, author={KOMORNIK V and PEDICINI M. and PETHO A.}, doi={10.14232/actasm-015-080-0}, issn={0001-6969}, journal={ACTA SCIENTIARUM MATHEMATICARUM}, pages={51 -- 60}, title={Multiple common expansions in non-integer base}, url={http://acta.fyx.hu/acta/home.action}, volume={83}, year=2017 }
@Article{Komornik2017a, author="Komornik, V. and Pedicini, M.", title="Critical bases for ternary alphabets", journal="Acta Mathematica Hungarica", year="2017", volume="152", number="1", month="June", pages="25--57", abstract="Glendinning and Sidorov discovered an important feature of the Komornik--Loreti constant $q' \approx 1.78723$ in non-integer base expansions on two-letter alphabets: in bases $1 \leq q \leq q'$ only countably numbers have unique expansions, while for $q \geq q'$ there is a continuum of such numbers. We investigate the analogous question for ternary alphabets.", issn="1588-2632", doi="10.1007/s10474-017-0706-6", url="http://dx.doi.org/10.1007/s10474-017-0706-6" }
@article{Onofri2022, author={Castiglione, Filippo and Nardini, Christine and Onofri, Elia and Pedicini, Marco and Tieri, Paolo}, title={Explainable Drug Repurposing Approach from Biased Random Walks}, journal={IEEE/ACM Transactions on Computational Biology and Bioinformatics}, note={in press}, year={2022} }
@incollection{Castiglione2018, title = "Quantitative Modelling Approaches", editor = "Shoba Ranganathan and Michael Gribskov and Kenta Nakai and Christian Schönbach", booktitle = "Encyclopedia of Bioinformatics and Computational Biology", publisher = "Academic Press", address = "Oxford", pages = "874 - 883", year = "2019", isbn = "978-0-12-811432-2", doi = "https://doi.org/10.1016/B978-0-12-809633-8.20454-8", url = "http://www.sciencedirect.com/science/article/pii/B9780128096338204548", author = "Filippo Castiglione and Emiliano Mancini and Marco Pedicini and Abdul Salam Jarrah", keywords = "Computation", keywords = "Dynamics", keywords = "Mathematical modelling", keywords = "Networks", keywords = "Simulation", keywords = "Stochasticity ", abstract = "Abstract Computational biology aims at disentangling the complexity of biological phenomena by providing tools/algorithms to analyse experimental data or models to predict outcomes of the biological system based on experimental and clinical data. Bioinformatics tools are used to analyse and interpret large scale experimental data and to distil useful information necessary to set up mathematical/computational models. In turn, computational models replicate the dynamics of complex biological systems thus offering in silico evaluations of a hypothesis. Models can be used to predict changes in the behaviour of a system over time and further unravel the complexity of the phenomena under study. Together, these methodologies have the potential to reshape our understanding of biology at all levels of details eventually allowing the optimization of existing therapies or even the formulation of new ones. In this article, we present succinct and informal descriptions of the main approaches or frameworks underlying most mathematical and computational methods currently used in quantitative studies of biological systems." }
@article{pedicini2018, author={PEDICINI M and PALUMBO M C and CASTIGLIONE F}, doi={10.1007/978-3-319-78658-2}, issn={1865-0929}, journal={Communications in Computer and Information Science}, pages={--}, title={Computing Hierarchical Transition Graphs of Asynchronous Genetic Regulatory Networks}, url={http://www.springer.com/us/book/9783319786575}, volume={830}, year=2018 }
@article{GrassiOPS22, author = {Lorenzo Grassi and Silvia Onofri and Marco Pedicini and Luca Sozzi}, title = {Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over {\unicode{54589}}\({}_{\mbox{p\({}^{\mbox{n}}\)}}\)}: : Application to Poseidon}, journal = {Transactions on Symmetric Cryptology}, number = {3}, year = {2022}, issn = {ISSN 2519-173X}, url = {https://tosc.iacr.org/index.php/ToSC/issue/archive} }
@article{DBLP:journals/iacr/CianfrigliaOOP22, author = {Marco Cianfriglia and Elia Onofri and Silvia Onofri and Marco Pedicini}, title = {Ten years of cube attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, number = {137}, year = {2022}, url = {https://eprint.iacr.org/2022/137}, timestamp = {Fri, 18 Feb 2022 14:25:16 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CianfrigliaOOP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrassiOPS21, author = {Lorenzo Grassi and Silvia Onofri and Marco Pedicini and Luca Sozzi}, title = {Invertible Quadratic Non-Linear Layers for MPC-/FHE-/ZK-Friendly Schemes over {\unicode{54589}}\({}_{\mbox{p\({}^{\mbox{n}}\)}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, number = {1695}, year = {2021}, url = {https://eprint.iacr.org/2021/1695}, timestamp = {Mon, 17 Jan 2022 17:05:16 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GrassiOPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{Onofri2021, author = {Onofri, Elia and Pedicini, Marco}, booktitle = {De Cifris Cryptanalysis Selected papers from the ITASEC2020 Workshop De Cifris Cryptanalysis: Cryptanalysis a Key Tool in Securing and Breaking Ciphers}, date-added = {2021-12-14 19:34:07 +0100}, date-modified = {2021-12-14 20:03:18 +0100}, editor = {La Scala, Roberto and Pedicini, Marco and Visconti, Andrea}, number = {2}, publisher = {Arcne editrice}, series = {Collectio Ciphrarum}, title = {Novel notation on Cube Attacks}, volume = {1}, year = {2022}}
@inproceedings{Cianfriglia2021, author = {Cianfriglia, Marco and Pedicini, Marco}, booktitle = {De Cifris Cryptanalysis Selected papers from the ITASEC2020 Workshop De Cifris Cryptanalysis: Cryptanalysis a Key Tool in Securing and Breaking Ciphers}, editor = {La Scala, Roberto and Pedicini, Marco and Visconti, Andrea}, pages = {31--38}, publisher = {Aracne editrice}, series = {Collectio Ciphrarum}, title = {Unboxing the Kite Attack}, volume = {1}, year = {2022}}
@Article{Cianfriglia2019, author="Cianfriglia, Marco and Guarino, Stefano and Bernaschi, Massimo and Lombardi, Flavio and Pedicini, Marco", title="Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search", journal="Journal of Cryptographic Engineering", year="2019", month="May", day="27", abstract="Dinur and Shamir's cube attack has attracted significant attention in the literature. Nevertheless, the lack of implementations achieving effective results casts doubts on its practical relevance. On the theoretical side, promising results have been recently achieved leveraging on division trails. The present paper follows a more practical approach and aims at giving new impetus to this line of research by means of a cipher-independent flexible framework that is able to carry out the cube attack on GPU/CPU clusters. We address all issues posed by a GPU implementation, providing evidence in support of parallel variants of the attack and identifying viable directions for solving open problems in the future. We report the results of running our GPU-based cube attack against round-reduced versions of three well-known ciphers: Trivium, Grain-128 and SNOW 3G. Our attack against Trivium improves the state of the art, permitting full key recovery for Trivium reduced to (up to) 781 initialization rounds (out of 1152) and finding the first-ever maxterm after 800 rounds. In this paper, we also present the first standard cube attack (i.e., neither dynamic nor tester) to yield maxterms for Grain-128 up to 160 initialization rounds on non-programmable hardware. We include a thorough evaluation of the impact of system parameters and GPU architecture on the performance. Moreover, we demonstrate the scalability of our solution on multi-GPU systems. We believe that our extensive set of results can be useful for the cryptographic engineering community at large and can pave the way to further results in the area.", issn="2190-8516", doi="10.1007/s13389-019-00217-3", url="https://doi.org/10.1007/s13389-019-00217-3" }
@Inbook{cianfriglia2017, author="Cianfriglia, Marco and Guarino, Stefano and Bernaschi, Massimo and Lombardi, Flavio and Pedicini, Marco", editor="Gollmann, Dieter and Miyaji, Atsuko and Kikuchi, Hiroaki", title="A Novel GPU-Based Implementation of the Cube Attack", bookTitle="Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings", year="2017", publisher="Springer International Publishing", address="Cham", pages="184--207", isbn="978-3-319-61204-1", doi="10.1007/978-3-319-61204-1_10", url="http://dx.doi.org/10.1007/978-3-319-61204-1_10" }
@inproceedings{Pedicini2021, title={On the number of provable formulas}, author={Pedicini, Marco and Piazza, Mario and Puite, Quentijn W.Q.}, editor={L. Bellotti, G. Turbanti}, booktitle={Fourth Pisa Colloquium in Logic, Language and Epistemology. Essays in Honour of E. Moriconi}, publisher={Edizioni ETS}, year={2021}, pages={145-166} }
@article{Lai2019, doi = {10.1017/s096012951900001x}, url = {https://doi.org/10.1017%2Fs096012951900001x}, year = 2019, month = {apr}, publisher = {Cambridge University Press ({CUP})}, pages = {1--32}, author = {Anna Chiara Lai and Marco Pedicini and Mario Piazza}, title = {Abstract machines, optimal reduction, and streams}, journal = {Mathematical Structures in Computer Science} }
@article{pedicini:JSP2013, title = "Light combinators for finite fields arithmetic ", journal = "Science of Computer Programming ", volume = "111, Part 3", number = "", pages = "365 - 394", year = "2015", note = "Special Issue on Foundational and Practical Aspects of Resource Analysis (FOPARA) 2009 & 2011 ", issn = "0167-6423", doi = "http://dx.doi.org/10.1016/j.scico.2015.04.001", url = "http://www.sciencedirect.com/science/article/pii/S0167642315000672", author = "D. Canavese and E. Cesena and R. Ouchary and M. Pedicini and L. Roversi", keywords = "Lambda calculus", keywords = "Finite fields arithmetic", keywords = "Type assignments", keywords = "Implicit computational complexity ", abstract = "Abstract This work completes the definition of a library which provides the basic arithmetic operations in binary finite fields as a set of functional terms with very specific features. Such a functional terms have type in Typeable Functional Assembly (TFA). \{TFA\} is an extension of Dual Light Affine Logic (DLAL). \{DLAL\} is a type assignment designed under the prescriptions of Implicit Computational Complexity (ICC), which characterises polynomial time costing computations. We plan to exploit the functional programming patterns of the terms in the library to implement cryptographic primitives whose running-time efficiency can be obtained by means of the least hand-made tuning as possible. We propose the library as a benchmark. It fixes a kind of lower bound on the difficulty of writing potentially interesting low cost programs inside languages that can express only computations with predetermined complexity. In principle, every known and future \{ICC\} compliant programming language for polynomially costing computations should supply a simplification over the encoding of the library we present, or some set of combinators of comparable interest and difficulty. We finally report on the applicative outcome that our library has and which is a reward we get by programming in the very restrictive scenario that \{TFA\} provides. The term of \{TFA\} which encodes the inversion in binary fields suggested us a variant of a known and efficient imperative implementation of the inversion itself given by Fong. Our variant, can outperform Fong's implementation of inversion on specific hardware architectures." }
@incollection{ year={2014}, isbn={978-3-319-12465-0}, booktitle={Foundational and Practical Aspects of Resource Analysis}, series={Lecture Notes in Computer Science}, editor={Dal Lago, Ugo and Peña, Ricardo}, doi={10.1007/978-3-319-12466-7_3}, title={Can a Light Typing Discipline Be Compatible with an Efficient Implementation of Finite Fields Inversion?}, url={http://dx.doi.org/10.1007/978-3-319-12466-7_3}, publisher={Springer International Publishing}, author={Canavese, Daniele and Cesena, Emanuele and Ouchary, Rachid and Pedicini, Marco and Roversi, Luca}, pages={38-57}, language={English} }
@Unpublished{pedicini:TFP2014, author = "M. Pedicini, G. Pellitta, M. Piazza.", title = "Sequential and Parallel Abstract Machines for Optimal Reduction", year = "2014" }
@Article{Lai2016, author="Lai, Anna Chiara and Pedicini, Marco and Rognone, Silvia", title="Quantum entanglement and the Bell matrix", journal="Quantum Information Processing", year="2016", volume="15", number="7", pages="2923 -- 2936", abstract="We present a class of maximally entangled states generated by a high-dimensional generalisation of the cnot gate. The advantage of our constructive approach is the simple algebraic structure of both entangling operator and resulting entangled states. In order to show that the method can be applied to any dimension, we introduce new sufficient conditions for global and maximal entanglement with respect to Meyer and Wallach's measure.", issn="1573-1332", doi="10.1007/s11128-016-1302-3", url="http://dx.doi.org/10.1007/s11128-016-1302-3" }
@article{clancy2011, author={CLANCY T and PEDICINI M. and CASTIGLIONE F and SANTONI D and NYGAARD V and LAVELLE T. J and BENSON M and HOVIG E}, doi={10.1186/1755-8794-4-28}, issn={1755-8794}, journal={BMC MEDICAL GENOMICS}, pages={--}, title={Immunological network signatures of cancer progression and survival}, url={http://dx.medra.org/10.1186/1755-8794-4-28}, volume={4:28}, year=2011, }
@inproceedings{agnesse2011, author = {Agnesse, Andrea and Pedicini, Marco}, title = {Cube Attack in Finite Fields of Higher Order}, booktitle = {Proceedings of the Ninth Australasian Information Security Conference - Volume 116}, series = {AISC '11}, year = {2011}, isbn = {978-1-920682-96-5}, location = {Perth, Australia}, pages = {9--14}, numpages = {6}, url = {http://dl.acm.org/citation.cfm?id=2460416.2460419}, url = { http://crpit.com/confpapers/CRPITV116Agnesse.pdf }, acmid = {2460419}, publisher = {Australian Computer Society, Inc.}, address = {Darlinghurst, Australia, Australia}, keywords = {algebraic cryptanalysis, cube attack}, }
@article{komornik2015, author={KOMORNIK V and LAI A. C and PEDICINI M.}, issn={1435-9855}, journal={JOURNAL OF THE EUROPEAN MATHEMATICAL SOCIETY}, pages={1113--1146}, title={Generalized golden ratios of ternary alphabets}, url={http://dx.medra.org/10.4171/JEMS/277}, volume=13, year=2011, }
@incollection{pedicini:LNCS2011, year={2012}, isbn={978-3-642-32494-9}, booktitle={Foundational and Practical Aspects of Resource Analysis}, volume={7177}, series={Lecture Notes in Computer Science}, editor={Peña, Ricardo and van Eekelen, Marko and Shkaravska, Olha}, doi={10.1007/978-3-642-32495-6_2}, title={Typing a Core Binary-Field Arithmetic in a Light Logic}, url={http://dx.doi.org/10.1007/978-3-642-32495-6_2}, publisher={Springer Berlin Heidelberg}, author={Cesena, Emanuele and Pedicini, Marco and Roversi, Luca}, pages={19-35}, language={English} }
@misc{pedicini2009, author={PEDICINI M. and PIAZZA M}, note={preprint sottomesso per la publicazione su rivista.}, pages={1--22}, title={Elementary computation and von Neumann Algebras}, volume={arXiv:0912.5342v1}, year=2009, }
@inproceedings{pedicini2010-1, address={LONDON -- GBR}, author={PEDICINI M. and PIAZZA M}, booktitle={New Essays In Logic and Philosophy of Science}, location={Milan}, month={8-10 Ottobre 2007}, pages={183--194}, publisher={College Pubblications}, title={An application of von Neumann Algebras to computational complexity}, volume=1, year=2010, }
@article{pedicini2010, author={PEDICINI M. and BARRENÄS F and CLANCY T and CASTIGLIONE F and HOVIG E and KANDURI K and SANTONI D and BENSON M}, doi={10.1371/journal.pcbi.1001032}, issn={1553-734X}, journal={PLOS COMPUTATIONAL BIOLOGY}, pages={e1001032--}, title={Combining network modeling and gene expression microarray analysis to explore the dynamics of Th1 and Th2 cell regulation}, url={http://dx.medra.org/10.1371/journal.pcbi.1001032}, volume={6 (12)}, year=2010, }
@inbook{castiglione2010, address={ANNERLEY -- AUS}, author={CASTIGLIONE F and SANTONI D and PEDICINI M.}, chapter={Implementing agent's rules with gene regulatory networks in mesoscopic-level models of cellular interactions.}, isbn={978-0-9807330-2-0}, publisher={iConcept Press Pty Ltd.}, title={A PRACTICAL GUIDE TO BIOINFORMATICS ANALYSIS}, year=2010, }
@article{santoni2008, author={SANTONI D and PEDICINI M. and CASTIGLIONE F}, doi={10.1093/bioinformatics/btn135}, issn={1367-4803}, journal={BIOINFORMATICS}, pages={1374--1380}, title={Implementation of a regulatory gene network to simulate the TH1/2 differentiation in an agent-based model of hypersensitivity reactions}, url={http://dx.medra.org/10.1093/bioinformatics/btn135}, volume=24, year=2008, }
@inproceedings{pedicini2007-1, author={PEDICINI M. and PIAZZA M}, booktitle={CiE 2007}, location={Siena, Italy}, title={Elementary Complexity into the Hyperfinite II1 Factor}, year=2007, }
@inproceedings{baillot2006, author={BAILLOT P and PEDICINI M.}, booktitle={LCC'06}, location={Seattle, USA}, note={online proceedings: http://www.easychair.org/FLoC-06/LCC.html}, title={An embedding of the BSS model of computation in light affine lambda-calculus}, year=2006, }
@article{pedicini2007, author={PEDICINI M. and QUAGLIA F}, doi={10.1145/1243996.1243997}, issn={1529-3785}, journal={ACM TRANSACTIONS ON COMPUTATIONAL LOGIC}, pages={1--36}, title={PELCR: Parallel Environment for Optimal Lambda-Calculus Reduction}, url={http://dx.medra.org/10.1145/1243996.1243997}, volume=8, year=2007, }
@article{cosentino2006, author={COSENTINO A and PEDICINI M. and QUAGLIA F}, doi={10.1016/j.entcs.2005.09.025}, issn={1571-0661}, journal={ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE}, pages={107--117}, title={Supporting Function Calls within PELCR}, url={http://dx.medra.org/10.1016/j.entcs.2005.09.025}, volume=135, year=2006, }
@article{pedicini2002, author={PEDICINI M. and QUAGLIA F}, doi={10.1007/3-540-45706-2_89}, issn={0302-9743}, journal={LECTURE NOTES IN COMPUTER SCIENCE}, pages={648--655}, title={Scheduling vs Communication in PELCR}, url={http://dx.medra.org/10.1007/3-540-45706-2_89}, volume=2400, year=2002, }
@inproceedings{quaglia2000, title = {A Parallel Implementation for Optimal Lambda-Calculus Reduction.}, author = {Pedicini, Marco and Quaglia, Francesco}, booktitle = {PPDP}, pages = {3-14}, year = 2000, ee = \url{http://doi.acm.org/10.1145/351268.351270}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@article{baillot2000, author={BAILLOT P and PEDICINI M.}, issn={0169-2968}, journal={FUNDAMENTA INFORMATICAE}, note={http://iospress.metapress.com/link.asp?id=9d1cd4ucuha04uvt}, pages={1--31}, title={Elementary complexity and geometry of interaction}, volume=45, year=2000, }
@book{loreti2005, address={PROVIDENCE -- USA}, author={LORETI P and PEDICINI M.}, isbn={978-0-8218-3538-8}, publisher={AMS}, title={An object-oriented approach to idempotent analysis: Integral equations as optimal control problems}, volume=377, year=2005, }
@article{loreti2001, author={LORETI P and PEDICINI M.}, doi={10.1023/A:1002824402949}, issn={1067-9073}, journal={MATHEMATICAL NOTES}, note={Paper appeared in russian and then in english}, pages={235--244}, title={An idempotent analogue of resolvent kernels for a deterministic optimal control problem}, url={http://dx.medra.org/10.1023/A:1002824402949}, volume=69, year=2001, }
@article{pedicini2005, author={PEDICINI M.}, doi={10.1016/j.tcs.2004.11.002}, issn={0304-3975}, journal={THEORETICAL COMPUTER SCIENCE}, pages={313--336}, title={Greedy expansions and sets with deleted digits}, url={http://dx.medra.org/10.1016/j.tcs.2004.11.002}, volume=332, year=2005, }
@article{komornik2000, author={KOMORNIK V and LORETI P and PEDICINI M.}, doi={10.1006/jnth.1999.2456}, issn={0022-314X}, journal={JOURNAL OF NUMBER THEORY}, pages={218--237}, title={An approximation property of Pisot numbers}, url={http://dx.medra.org/10.1006/jnth.1999.2456}, volume=80, year=2000, }
@incollection{baillot1999, year={1999}, isbn={978-3-540-65763-7}, booktitle={Typed Lambda Calculi and Applications}, volume={1581}, series={Lecture Notes in Computer Science}, editor={Girard, Jean-Yves}, doi={10.1007/3-540-48959-2_4}, title={Elementary Complexity and Geometry of Interaction}, url={http://dx.doi.org/10.1007/3-540-48959-2_4}, publisher={Springer Berlin Heidelberg}, author={Baillot, Patrick and Pedicini, Marco}, pages={25-33}, language={English} }
@incollection{mascari1998, title = {Types and Dynamics in Partially Additive Categories.}, author = {Mascari, Gianfranco and Pedicini, Marco}, booktitle = {Gunawardena, Jeremy (ed.), Idempotency. Based on a Workshop, Bristol, UK, October 3--7, 1994, Cambridge: Cambridge University Press. 112-132 }, year = 1998, language = {English}, abstract = {{A challenging problem in studying complex systems is to model the internal structure of the system and its dynamical evolution in an integrated view. An algorithm computes a function with domain consisting of all its possible inputs and as codomain all possible outputs. In order to ``compare'' algorithms computing the same function (e.g. with respect to time or space complexity) it is necessary to model the ``dynamic behavior'' of the algorithm. The main approach for modeling the dynamic behavior $Bh ({\cal P})$ of an algorithm is ``the dynamic system paradigm'': $Bh ({\cal P})$ is obtained as the action of a (control) monoid on a (state) space.\par Various mathematical structures have been considered for attacking such a problem; among others, deterministic automata and stochastic automata. In order to capture the fine structure of computation, an attempt to describe the ``macroscopic'' global dynamic behavior of an algorithm in terms of the ``microscopic'' local dynamic behavior of its components has recently been proposed within a logical approach to computing called ``geometry of interaction'' developed within $C^*$-algebras. We propose an algebraic approach to ``structured dynamics'' inspired by the geometry of interaction and based on a ``many objects'' generalization of semirings: partially additive categories.}}, keywords = {{time complexity; dynamic behavior of algorithm; $C^*$-algebras; complex systems; internal structure; dynamical evolution; space complexity; deterministic automata; stochastic automata; geometry of interaction; generalization of semirings; partially additive categories}}, classmath = {{*18B20 Categories of automata, etc. 68Q25 Analysis of algorithms and problem complexity 68Q70 Algebraic theory of automata 68Q45 Formal languages 16Y60 Semirings 18E05 Additive categories, etc.}} }
@inproceedings{danos1997, address={BERLIN -- DEU}, author={DANOS V and PEDICINI M. and REGNIER L}, booktitle={Computer science logic (Utrecht, 1996)}, doi={10.1007/3-540-63172-0_33}, location={Utrecht}, pages={76--88}, publisher={Springer-Verlag}, title={Directed virtual reductions}, url={http://dx.medra.org/10.1007/3-540-63172-0_33}, volume=1258, year=1997, }
@article{pedicini1996, title = "Remarks on Elementary Linear Logic: Preliminary Report ", journal = "Electronic Notes in Theoretical Computer Science ", volume = "3", number = "0", pages = "208 - 219", year = "1996", note = "Linear Logic 96 Tokyo Meeting ", issn = "1571-0661", doi = "http://dx.doi.org/10.1016/S1571-0661(05)80419-0", url = "http://www.sciencedirect.com/science/article/pii/S1571066105804190", author = "Marco Pedicini" }
@article{mascari1994, author={MASCARI G. F and PEDICINI M.}, doi={10.1016/0304-3975(94)90263-1}, issn={0304-3975}, journal={THEORETICAL COMPUTER SCIENCE}, pages={111--137}, title={Head linear reduction and pure proof net extraction}, url={http://dx.medra.org/10.1016/0304-3975(94)90263-1}, volume=135, year=1994, }
+39 06 57338519, fax: +39 06 57338080
marco.pedicini@uniroma3.it