Sfoglia per Rivista THE JOURNAL OF SYSTEMS AND SOFTWARE
Mostrati risultati da 1 a 6 di 6
A Language-Independent Software Renovation Framework
2005-01-01 M., Di Penta; Neteler, Markus; G., Antoniol; E., Merlo
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes
2015-01-01 Sabatucci, Luca; Ceccato, Mariano; Marchetto, Alessandro; Susi, Angelo
Formal Specification and Verification of an e-voting System: An experience Report.
2011-01-01 Weldemariam, Komminist Sisai; Richard A., Kemmerer; Villafiorita Monteleone, Adolfo
A goal-oriented approach for representing and using design patterns
2015-01-01 Sabatucci, Luca; Cossentino, Massimo; Susi, Angelo
Procedural Security Analysis: A Methodological Approach
2011-01-01 Weldemariam, Komminist Sisai; Villafiorita Monteleone, Adolfo
Supporting concept location through identifier parsing and ontology extraction
2013-01-01 Abebe, S. L.; Alicante, A.; Corazza, A.; Tonella, Paolo
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A Language-Independent Software Renovation Framework | 1-gen-2005 | M., Di Penta; Neteler, Markus; G., Antoniol; E., Merlo | |
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes | 1-gen-2015 | Sabatucci, Luca; Ceccato, Mariano; Marchetto, Alessandro; Susi, Angelo | |
Formal Specification and Verification of an e-voting System: An experience Report. | 1-gen-2011 | Weldemariam, Komminist Sisai; Richard A., Kemmerer; Villafiorita Monteleone, Adolfo | |
A goal-oriented approach for representing and using design patterns | 1-gen-2015 | Sabatucci, Luca; Cossentino, Massimo; Susi, Angelo | |
Procedural Security Analysis: A Methodological Approach | 1-gen-2011 | Weldemariam, Komminist Sisai; Villafiorita Monteleone, Adolfo | |
Supporting concept location through identifier parsing and ontology extraction | 1-gen-2013 | Abebe, S. L.; Alicante, A.; Corazza, A.; Tonella, Paolo |
Mostrati risultati da 1 a 6 di 6
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile