Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trace Checking of Streaming Applications through DICE-TraCT., , and . ICPE Companion, page 159-160. ACM, (2018)On the Timed Analysis of Big-Data Applications., , , , and . NFM, volume 10811 of Lecture Notes in Computer Science, page 315-332. Springer, (2018)Verifying big data topologies by-design : a semi-automated approach., , , , and . J. Big Data, (2019)Using formal verification to evaluate the execution time of Spark applications., , , , and . Formal Aspects Comput., 32 (1): 33-70 (2020)Formal verification of storm topologies through D-VerT., , and . SAC, page 1168-1174. ACM, (2017)Formal verification of timed properties for data-intensive applications.. Polytechnic University of Milan, Italy, (2018)Towards the Formal Verification of Data-Intensive Applications Through Metric Temporal Logic., , , and . ICFEM, volume 10009 of Lecture Notes in Computer Science, page 193-209. (2016)Continuous Architecting of Stream-Based Systems., , , , and . WICSA, page 146-151. IEEE Computer Society, (2016)Formal verification of data-intensive applications through model checking modulo theories., , , , and . SPIN, page 98-101. ACM, (2017)Towards DevOps for Privacy-by-Design in Data-Intensive Applications: A Research Roadmap., , , , , and . ICPE Companion, page 139-144. ACM, (2017)