Sfoglia per Autore
Remote entrusting by run-time software authentication
2008-01-01 Ceccato, Mariano; Yoram, Ofek; Tonella, Paolo
Goto elimination strategies in the migration of legacy code to java
2008-01-01 Ceccato, Mariano; Tonella, Paolo; Matteotti, Christina
Automatic Support for the Migration Towards Aspects
2008-01-01 Ceccato, Mariano
Data Model Reverse Engineering in Migrating a Legacy System to Java
2008-01-01 Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo; Davide, Marchignoli
The use of executable Fit tables to support maintenance and evolution tasks
2008-01-01 Ricca, Filippo; Marco, Torchiano; Massimiliano Di, Penta; Ceccato, Mariano; Tonella, Paolo
Towards experimental evaluation of code obfuscation techniques
2008-01-01 Ceccato, Mariano; M., Di Penta; Jasvir, Nagra; Paolo, Falcarin; Ricca, Filippo; Marco, Torchiano; Tonella, Paolo
Are Fit tables really talking? A series of experiments to understand whether Fit tables are useful during evolution tasks
2008-01-01 Ricca, Filippo; M., Di Penta; Marco, Torchiano; Tonella, Paolo; Ceccato, Mariano; Corrado, Visaggio
Using Program Transformations to Add Structure to a Legacy Data Model
2008-01-01 Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo
Inference of a structured data model in migrating a legacy system to Java
2008-01-01 Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo; Davide, Marchignoli
Remote software protection by orthogonal client replacement
2009-01-01 Ceccato, Mariano; Tonella, Paolo; Mila Dalla, Preda; Majumdar, Anirban
Trading-off security and performance in barrier slicing for remote software entrusting
2009-01-01 Ceccato, Mariano; Mila Dalla, Preda; Jasvir, Nagra; Christian, Collberg; Tonella, Paolo
Workshop on maintenance of aspect oriented systems
2009-01-01 Mario, Bernardi; Lucca G., Di; Ceccato, Mariano
Using acceptance tests as a support for clarifying requirements: A series of experiments
2009-01-01 Ricca, Filippo; Marco, Torchiano; M., Di Penta; Ceccato, Mariano; Tonella, Paolo
Recovering structured data types from a legacy data model with overlays
2009-01-01 Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo
MIGRAZIONE DI SISTEMI SOFTWARE LEGACY
2009-01-01 Tonella, Paolo; Ceccato, Mariano; Davide, Marchignoli; Matteotti, Christina; Dean, Thomas Roy
Dynamic aspect mining
2009-01-01 Ceccato, Mariano; Tonella, Paolo
The Effectiveness of Source Code Obfuscation: an Experimental Assessment
2009-01-01 Ceccato, Mariano; Massimiliano Di, Penta; Jasvir, Nagra; Paolo, Falcarin; Ricca, Filippo; Marco, Torchiano; Tonella, Paolo
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: a Series of Four Experiments
2010-01-01 Ricca, Filippo; Massimiliano Di, Penta; Marco, Torchiano; Tonella, Paolo; Ceccato, Mariano
Towards Security Testing with Taint Analysis and Genetic Algorithms
2010-01-01 Avancini, Andrea; Ceccato, Mariano
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system
2010-01-01 Ceccato, Mariano; Tonella, Paolo
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Remote entrusting by run-time software authentication | 1-gen-2008 | Ceccato, Mariano; Yoram, Ofek; Tonella, Paolo | |
Goto elimination strategies in the migration of legacy code to java | 1-gen-2008 | Ceccato, Mariano; Tonella, Paolo; Matteotti, Christina | |
Automatic Support for the Migration Towards Aspects | 1-gen-2008 | Ceccato, Mariano | |
Data Model Reverse Engineering in Migrating a Legacy System to Java | 1-gen-2008 | Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo; Davide, Marchignoli | |
The use of executable Fit tables to support maintenance and evolution tasks | 1-gen-2008 | Ricca, Filippo; Marco, Torchiano; Massimiliano Di, Penta; Ceccato, Mariano; Tonella, Paolo | |
Towards experimental evaluation of code obfuscation techniques | 1-gen-2008 | Ceccato, Mariano; M., Di Penta; Jasvir, Nagra; Paolo, Falcarin; Ricca, Filippo; Marco, Torchiano; Tonella, Paolo | |
Are Fit tables really talking? A series of experiments to understand whether Fit tables are useful during evolution tasks | 1-gen-2008 | Ricca, Filippo; M., Di Penta; Marco, Torchiano; Tonella, Paolo; Ceccato, Mariano; Corrado, Visaggio | |
Using Program Transformations to Add Structure to a Legacy Data Model | 1-gen-2008 | Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo | |
Inference of a structured data model in migrating a legacy system to Java | 1-gen-2008 | Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo; Davide, Marchignoli | |
Remote software protection by orthogonal client replacement | 1-gen-2009 | Ceccato, Mariano; Tonella, Paolo; Mila Dalla, Preda; Majumdar, Anirban | |
Trading-off security and performance in barrier slicing for remote software entrusting | 1-gen-2009 | Ceccato, Mariano; Mila Dalla, Preda; Jasvir, Nagra; Christian, Collberg; Tonella, Paolo | |
Workshop on maintenance of aspect oriented systems | 1-gen-2009 | Mario, Bernardi; Lucca G., Di; Ceccato, Mariano | |
Using acceptance tests as a support for clarifying requirements: A series of experiments | 1-gen-2009 | Ricca, Filippo; Marco, Torchiano; M., Di Penta; Ceccato, Mariano; Tonella, Paolo | |
Recovering structured data types from a legacy data model with overlays | 1-gen-2009 | Ceccato, Mariano; Dean, Thomas Roy; Tonella, Paolo | |
MIGRAZIONE DI SISTEMI SOFTWARE LEGACY | 1-gen-2009 | Tonella, Paolo; Ceccato, Mariano; Davide, Marchignoli; Matteotti, Christina; Dean, Thomas Roy | |
Dynamic aspect mining | 1-gen-2009 | Ceccato, Mariano; Tonella, Paolo | |
The Effectiveness of Source Code Obfuscation: an Experimental Assessment | 1-gen-2009 | Ceccato, Mariano; Massimiliano Di, Penta; Jasvir, Nagra; Paolo, Falcarin; Ricca, Filippo; Marco, Torchiano; Tonella, Paolo | |
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: a Series of Four Experiments | 1-gen-2010 | Ricca, Filippo; Massimiliano Di, Penta; Marco, Torchiano; Tonella, Paolo; Ceccato, Mariano | |
Towards Security Testing with Taint Analysis and Genetic Algorithms | 1-gen-2010 | Avancini, Andrea; Ceccato, Mariano | |
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system | 1-gen-2010 | Ceccato, Mariano; Tonella, Paolo |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile