Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spyware Detection using Temporal Logic., , , , and . ICISSP, page 690-699. SciTePress, (2019)Enhancing Rationale Management with Second Life Meetings, , , and . Proceedings of the 14th International Conference on Distributed Multimedia Systems (DMS 2008), page 118--123. SKOKIE, ILLINOIS -- USA, Knowledge Systems Institute Graduate School, (4-6 settembre 2008)Does software error/defect identification matter in the italian industry?, , , and . IET Softw., (2013)Visual Attention and Privacy Indicators in Android: Insights from Eye Tracking., , , , and . ICISSP, page 320-329. SCITEPRESS, (2024)Energy Consumption Metrics for Mobile Device Dynamic Malware Detection., , , and . KES, volume 159 of Procedia Computer Science, page 1045-1052. Elsevier, (2019)Assessing the Effectiveness of a Distributed Method for Code Inspection: A Controlled Experiment., , , and . ICGSE, page 252-261. IEEE Computer Society, (2007)ADAMS: an Artefact-based Process Support System., , , and . SEKE, page 31-36. (2004)Recovering traceability links in software artifact management systems using information retrieval methods., , , and . ACM Trans. Softw. Eng. Methodol., 16 (4): 13 (2007)Supporting Distributed Software Development with fine-grained Artefact Management., , , and . ICGSE, page 213-222. IEEE Computer Society, (2006)Can Information Retrieval Techniques Effectively Support Traceability Link Recovery?, , , and . ICPC, page 307-316. IEEE Computer Society, (2006)