Search Results - "Spoletini, Paola"
-
1
TOrPEDO: witnessing model correctness with topological proofs
Published in Formal aspects of computing (01-12-2021)“…Model design is not a linear, one-shot process. It proceeds through refinements and revisions. To effectively support developers in generating model…”
Get full text
Journal Article -
2
A verification-driven framework for iterative design of controllers
Published in Formal aspects of computing (01-11-2019)“…Controllers often are large and complex reactive software systems and thus they typically cannot be developed as monolithic products. Instead, they are usually…”
Get full text
Journal Article -
3
SaPeer and ReverseSaPeer: teaching requirements elicitation interviews with role-playing and role reversal
Published in Requirements engineering (01-12-2020)“…Among the variety of the available requirements elicitation techniques, interviews are the most commonly used. Performing effective interviews is challenging,…”
Get full text
Journal Article -
4
-
5
-
6
-
7
-
8
Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation
Published in 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) (01-05-2023)“…App store-inspired elicitation is the practice of exploring competitors' apps, to get inspiration for requirements. This activity is common among developers,…”
Get full text
Conference Proceeding -
9
Ambiguity and tacit knowledge in requirements elicitation interviews
Published in Requirements engineering (01-09-2016)“…Interviews are the most common and effective means to perform requirements elicitation and support knowledge transfer between a customer and a requirements…”
Get full text
Journal Article -
10
-
11
How do requirements evolve during elicitation? An empirical study combining interviews and app store analysis
Published in Requirements engineering (01-12-2022)“…Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions…”
Get full text
Journal Article -
12
Teaching requirements elicitation interviews: an empirical study of learning from mistakes
Published in Requirements engineering (01-09-2019)“…Interviews are the most widely used elicitation technique in requirements engineering (RE). However, conducting a requirements elicitation interview is…”
Get full text
Journal Article -
13
Evaluating the understandability and user acceptance of Attack-Defense Trees: Original experiment and replication
Published in Information and software technology (01-02-2025)“…Attack-Defense Trees (ADTs) are a graphical notation used to model and evaluate security requirements. ADTs are popular because they facilitate communication…”
Get full text
Journal Article -
14
Measuring Team Members' Contributions in Software Engineering Projects using Git-driven Technology
Published in 2018 IEEE Frontiers in Education Conference (FIE) (01-10-2018)“…Software engineering is inherently a human-centric and collaborative process and this reflects in its teaching programs, as most of the courses comprise…”
Get full text
Conference Proceeding -
15
Bias-aware guidelines and fairness-preserving Taxonomy in software engineering education
Published in 2018 IEEE Frontiers in Education Conference (FIE) (01-10-2018)“…This innovative practice work in progress paper tackles the problem of unfairness and bias in software, that recently has emerged in countless cases. This…”
Get full text
Conference Proceeding -
16
Privacy as first-class requirements in software development: A socio-technical approach
Published in 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01-11-2021)“…Privacy requirements have become increasingly important as information about us is continuously accumulated and digitally stored. However, despite the many…”
Get full text
Conference Proceeding -
17
Towards Quantum Requirements Engineering
Published in 2023 IEEE 31st International Requirements Engineering Conference Workshops (REW) (01-09-2023)“…Quantum computing is rapidly transitioning from a scientific curiosity to an industrial reality, offering the potential to overcome classical computation…”
Get full text
Conference Proceeding -
18
Automating trade-off analysis of security requirements
Published in Requirements engineering (01-11-2016)“…A key aspect of engineering secure systems is identifying adequate security requirements to protect critical assets from harm. However, security requirements…”
Get full text
Journal Article -
19
Bounded variability of metric temporal logic
Published in Annals of mathematics and artificial intelligence (01-08-2017)“…Deciding validity of Metric Temporal Logic (MTL) formulas is generally very complex and even undecidable over dense time domains; bounded variability is one of…”
Get full text
Journal Article -
20
Bounded Variability of Metric Temporal Logic
Published in 2014 21st International Symposium on Temporal Representation and Reasoning (01-09-2014)“…Previous work has shown that reasoning with real-time temporal logics is often simpler when restricted to models with bounded variability-where no more than v…”
Get full text
Conference Proceeding