Sfoglia per Relatore
A syntactic-semantic approach for incremental program verification of matching logic properties
RIZZI, ALESSANDRO MARIA
Algoritmi efficienti per model checking parametrico di modelli markoviani discreti
2010/2011 BUSSI, MARCO
Un approccio per l'aggiornamento dinamico sicuro di controllori a stati finiti
2014/2015 CLUN, DONATO
Architetture e linguaggi per runtime software adaptation : computational REST ed Erlang
2009/2010 SIVIERI, ALESSANDRO
Automatic detection and correction of client side and server side input validation inconsistencies
2011/2012 FAZZINI, MATTIA
Automatic metaresearch on scientific communities
2009/2010 SANGIORGIO, MARIO
Automatic quality driven exploration of design alternatives with model transformations
2010/2011 VILLA, MATTEO
Blacksheep: a tool for kernel rootkit detection, based on physical memory crowdsourced analysis
2010/2011 BIANCHI, ANTONIO
Building deductive proofs of LTL properties for iteratively refined systems
2014/2015 BERNASCONI, ANNA
Contextual, requirements driven, adaptive access control
2011/2012 MENGHI, CLAUDIO
Dealing with incompleteness in automata based model checking
MENGHI, CLAUDIO
Design and development of a probabilistic framework for automatic software fault localization
2014/2015 PAGANO, DAVIDE
Engineering adaptive security for the Cloud. An experience with Google Apps
2011/2012 ZANINI, MARCO
Gestione del processo di collaudo : un'esperienza industriale
2009/2010 SOSSELLA, CLAUDIO
HarVey. On runtime veri cation of cyber-physical spaces
2016/2017 SCOLARI, GIACOMO
Incremental reachability checking of KernelC programs using matching logic
2012/2013 RIZZI, ALESSANDRO MARIA
KAMI : un framework distribuito per modelli non funzionali a tempo di esecuzione
2009/2010 BONFANTI, GIANNI
Mining unit test cases to synthesize API usage examples automatically
GHAFARI, MOHAMMAD
Model based verification and adaptation of software systems @runtime
FILIERI, ANTONIO
Modeling, analyzing, and monitoring interacting software components
SANGIORGIO, MARIO
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili