Sfoglia per Relatore
Blacksheep: a tool for kernel rootkit detection, based on physical memory crowdsourced analysis
2010/2011 BIANCHI, ANTONIO
Building deductive proofs of LTL properties for iteratively refined systems
2014/2015 BERNASCONI, ANNA
Contextual, requirements driven, adaptive access control
2011/2012 MENGHI, CLAUDIO
Dealing with incompleteness in automata based model checking
MENGHI, CLAUDIO
Design and development of a probabilistic framework for automatic software fault localization
2014/2015 PAGANO, DAVIDE
Engineering adaptive security for the Cloud. An experience with Google Apps
2011/2012 ZANINI, MARCO
Gestione del processo di collaudo : un'esperienza industriale
2009/2010 SOSSELLA, CLAUDIO
HarVey. On runtime veri cation of cyber-physical spaces
2016/2017 SCOLARI, GIACOMO
Incremental reachability checking of KernelC programs using matching logic
2012/2013 RIZZI, ALESSANDRO MARIA
KAMI : un framework distribuito per modelli non funzionali a tempo di esecuzione
2009/2010 BONFANTI, GIANNI
Mining unit test cases to synthesize API usage examples automatically
GHAFARI, MOHAMMAD
Model based verification and adaptation of software systems @runtime
FILIERI, ANTONIO
Modeling, analyzing, and monitoring interacting software components
SANGIORGIO, MARIO
Modelling and verification of evolving cyber-physical spaces
TSIGKANOS, CHRISTOS
On model-driven design of city spaces. A bidirectional transformations approach to city spaces design and operations
2018/2019 VISCONTI, ENNIO
Requirements Verification of Variability-Intensive Systems
MOLZAM SHARIFLOO, AMIR
Safe and Efficient Dynamic Updates of Distributed Software Systems
PANZICA LA MANNA, VALERIO
SAMA : un framework per applicazioni mobili adattive
2012/2013 HUANG, TENGDA
SAME : un framework per la gestione dell'incertezza nei sistemi software self adaptive
2011/2012 BROGNOLI, NICOLÒ
Security requirements, modelling and analysis in a courthouse case study
2015/2016 RUBINO, WALTER
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili