Search Results - "Spoletini, Paola"

Refine Results
  1. 1

    TOrPEDO: witnessing model correctness with topological proofs by Menghi, Claudio, Rizzi, Alessandro Maria, Bernasconi, Anna, Spoletini, Paola

    Published in Formal aspects of computing (01-12-2021)
    “…Model design is not a linear, one-shot process. It proceeds through refinements and revisions. To effectively support developers in generating model…”
    Get full text
    Journal Article
  2. 2

    A verification-driven framework for iterative design of controllers by Menghi, Claudio, Spoletini, Paola, Chechik, Marsha, Ghezzi, Carlo

    Published in Formal aspects of computing (01-11-2019)
    “…Controllers often are large and complex reactive software systems and thus they typically cannot be developed as monolithic products. Instead, they are usually…”
    Get full text
    Journal Article
  3. 3

    SaPeer and ReverseSaPeer: teaching requirements elicitation interviews with role-playing and role reversal by Ferrari, Alessio, Spoletini, Paola, Bano, Muneera, Zowghi, Didar

    Published in Requirements engineering (01-12-2020)
    “…Among the variety of the available requirements elicitation techniques, interviews are the most commonly used. Performing effective interviews is challenging,…”
    Get full text
    Journal Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation by Ferrari, Alessio, Spoletini, Paola

    “…App store-inspired elicitation is the practice of exploring competitors' apps, to get inspiration for requirements. This activity is common among developers,…”
    Get full text
    Conference Proceeding
  9. 9

    Ambiguity and tacit knowledge in requirements elicitation interviews by Ferrari, Alessio, Spoletini, Paola, Gnesi, Stefania

    Published in Requirements engineering (01-09-2016)
    “…Interviews are the most common and effective means to perform requirements elicitation and support knowledge transfer between a customer and a requirements…”
    Get full text
    Journal Article
  10. 10
  11. 11

    How do requirements evolve during elicitation? An empirical study combining interviews and app store analysis by Ferrari, Alessio, Spoletini, Paola, Debnath, Sourav

    Published in Requirements engineering (01-12-2022)
    “…Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions…”
    Get full text
    Journal Article
  12. 12

    Teaching requirements elicitation interviews: an empirical study of learning from mistakes by Bano, Muneera, Zowghi, Didar, Ferrari, Alessio, Spoletini, Paola, Donati, Beatrice

    Published in Requirements engineering (01-09-2019)
    “…Interviews are the most widely used elicitation technique in requirements engineering (RE). However, conducting a requirements elicitation interview is…”
    Get full text
    Journal Article
  13. 13

    Evaluating the understandability and user acceptance of Attack-Defense Trees: Original experiment and replication by Broccia, Giovanna, ter Beek, Maurice H., Lluch Lafuente, Alberto, Spoletini, Paola, Fantechi, Alessandro, Ferrari, Alessio

    Published in Information and software technology (01-02-2025)
    “…Attack-Defense Trees (ADTs) are a graphical notation used to model and evaluate security requirements. ADTs are popular because they facilitate communication…”
    Get full text
    Journal Article
  14. 14

    Measuring Team Members' Contributions in Software Engineering Projects using Git-driven Technology by Parizi, Reza M., Spoletini, Paola, Singh, Amritraj

    “…Software engineering is inherently a human-centric and collaborative process and this reflects in its teaching programs, as most of the courses comprise…”
    Get full text
    Conference Proceeding
  15. 15

    Bias-aware guidelines and fairness-preserving Taxonomy in software engineering education by Spoletini, Paola, Parizi, Reza M.

    “…This innovative practice work in progress paper tackles the problem of unfairness and bias in software, that recently has emerged in countless cases. This…”
    Get full text
    Conference Proceeding
  16. 16

    Privacy as first-class requirements in software development: A socio-technical approach by Benbenisty, Yizhaq, Hadar, Irit, Luria, Gil, Spoletini, Paola

    “…Privacy requirements have become increasingly important as information about us is continuously accumulated and digitally stored. However, despite the many…”
    Get full text
    Conference Proceeding
  17. 17

    Towards Quantum Requirements Engineering by Spoletini, Paola

    “…Quantum computing is rapidly transitioning from a scientific curiosity to an industrial reality, offering the potential to overcome classical computation…”
    Get full text
    Conference Proceeding
  18. 18

    Automating trade-off analysis of security requirements by Pasquale, Liliana, Spoletini, Paola, Salehie, Mazeiar, Cavallaro, Luca, Nuseibeh, Bashar

    Published in Requirements engineering (01-11-2016)
    “…A key aspect of engineering secure systems is identifying adequate security requirements to protect critical assets from harm. However, security requirements…”
    Get full text
    Journal Article
  19. 19

    Bounded variability of metric temporal logic by Furia, Carlo A., Spoletini, Paola

    “…Deciding validity of Metric Temporal Logic (MTL) formulas is generally very complex and even undecidable over dense time domains; bounded variability is one of…”
    Get full text
    Journal Article
  20. 20

    Bounded Variability of Metric Temporal Logic by Furia, Carlo A., Spoletini, Paola

    “…Previous work has shown that reasoning with real-time temporal logics is often simpler when restricted to models with bounded variability-where no more than v…”
    Get full text
    Conference Proceeding