Position

Research Associate (post-doc) at Department of Computing,
Imperial College London

Short Bio

Research interests

Publications

  1. Mistry, M., Callia D’Iddio, A., Huth, M., & Misener, R. (2018). Satisfiability modulo theories for process systems engineering. Computers & Chemical Engineering, 113, 98–114.
  2. Callia D’Iddio, A., & Huth, M. (2017). Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving. ArXiv Preprint ArXiv:1702.01332.
  3. Lundbæk, L.-N., Callia D’Iddio, A., & Huth, M. (2017). Centrally governed blockchains: Optimizing security, cost, and availability. In Models, Algorithms, Logics and Tools (pp. 578–599). Springer, Cham.
  4. Lundbaek, L.-N., Callia D’Iddio, A., & Huth, M. (2016). Optimizing governed blockchains for financial process authentications. ArXiv Preprint ArXiv:1612.00407.
  5. Callia D’Iddio, A., Schunck, C. H., Arcieri, F., & Talamo, M. (2016). Extending abstraction-refinement methods for compliance checking of inter-organizational business processes with incomplete information. In Security Technology (ICCST), 2016 IEEE International Carnahan Conference on (pp. 1–7). IEEE.
  6. Callia D’Iddio, A., Schunck, C. H., Arcieri, F., & Talamo, M. (2016). Online and offline conformance checking of inter-organizational business processes with incomplete process logs. In Security Technology (ICCST), 2016 IEEE International Carnahan Conference on (pp. 1–8). IEEE.
  7. Fedyukovich, G., Callia D’Iddio, A., Hyvärinen, A. E. J., & Sharygina, N. (2015). Symbolic detection of assertion dependencies for bounded model checking. In International Conference on Fundamental Approaches to Software Engineering (pp. 186–201). Springer, Berlin, Heidelberg.
  8. Talamo, M., Arcieri, F., Schunck, C. H., & Callia D’Iddio, A. (2013). Conformance checking of electronic business processes to secure distributed transactions. In Security Technology (ICCST), 2013 47th International Carnahan Conference on (pp. 1–6). IEEE.
  9. Talamo, M., Arcieri, F., Schunck, C. H., & Callia D’Iddio, A. (2013). Providing context-based security for inter-organizational electronic business processes. In Communications and Network Security (CNS), 2013 IEEE Conference on. IEEE.
  10. Talamo, M., Callia D’Iddio, A., Schunck, C. H., & Arcieri, F. (2012). Real time scheduling verification with incomplete information. In Proceedings of the 6th WSEAS international conference on Computer Engineering and Applications, and Proceedings of the 2012 American conference on Applied Mathematics (pp. 336–344).