
Position
Research Associate (post-doc) at Department of Computing,
Imperial College London
Short Bio
Research interests
- Risk and cost analysis for non-linear models
- Logic-based methods for dynamic non-linear optimization
- SMT Solving and SAT Solving
- Symbolic execution for automatic code analysis
- Language-based security
- Concurrency theory
- Formal Methods in general
Publications
- Mistry, M., Callia D’Iddio, A., Huth, M., & Misener, R. (2018). Satisfiability modulo theories for process systems engineering. Computers & Chemical Engineering, 113, 98–114.
- Callia D’Iddio, A., & Huth, M. (2017). Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving. ArXiv Preprint ArXiv:1702.01332.
- Lundbæk, L.-N., Callia D’Iddio, A., & Huth, M. (2017). Centrally governed blockchains: Optimizing security, cost, and availability. In Models, Algorithms, Logics and Tools (pp. 578–599). Springer, Cham.
- Lundbaek, L.-N., Callia D’Iddio, A., & Huth, M. (2016). Optimizing governed blockchains for financial process authentications. ArXiv Preprint ArXiv:1612.00407.
- Callia D’Iddio, A., Schunck, C. H., Arcieri, F., & Talamo, M. (2016). Extending abstraction-refinement methods for compliance checking of inter-organizational business processes with incomplete information. In Security Technology (ICCST), 2016 IEEE International Carnahan Conference on (pp. 1–7). IEEE.
- Callia D’Iddio, A., Schunck, C. H., Arcieri, F., & Talamo, M. (2016). Online and offline conformance checking of inter-organizational business processes with incomplete process logs. In Security Technology (ICCST), 2016 IEEE International Carnahan Conference on (pp. 1–8). IEEE.
- Fedyukovich, G., Callia D’Iddio, A., Hyvärinen, A. E. J., & Sharygina, N. (2015). Symbolic detection of assertion dependencies for bounded model checking. In International Conference on Fundamental Approaches to Software Engineering (pp. 186–201). Springer, Berlin, Heidelberg.
- Talamo, M., Arcieri, F., Schunck, C. H., & Callia D’Iddio, A. (2013). Conformance checking of electronic business processes to secure distributed transactions. In Security Technology (ICCST), 2013 47th International Carnahan Conference on (pp. 1–6). IEEE.
- Talamo, M., Arcieri, F., Schunck, C. H., & Callia D’Iddio, A. (2013). Providing context-based security for inter-organizational electronic business processes. In Communications and Network Security (CNS), 2013 IEEE Conference on. IEEE.
- Talamo, M., Callia D’Iddio, A., Schunck, C. H., & Arcieri, F. (2012). Real time scheduling verification with incomplete information. In Proceedings of the 6th WSEAS international conference on Computer Engineering and Applications, and Proceedings of the 2012 American conference on Applied Mathematics (pp. 336–344).