Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating trade-off analysis of security requirements., , , , and . Requir. Eng., 21 (4): 481-504 (2016)An approach to adapt service requests to actual service interfaces., and . SEAMS, page 129-136. ACM, (2008)A Tile-Based Approach for Self-Assembling Service Compositions., , , and . ICECCS, page 43-52. IEEE Computer Society, (2010)Adapting Service Requests to Actual Service Interfaces through Semantic Annotations, , and . Proceedings of Principles of Engineering Service Oriented Systems (PESOS 2009), co-located with ICSE 2009, Vancouver, Canada, IEEE Computer Society Press, (2009)Slicing AspectJ Woven Code, , , and . Proceedings of the Foundations of Aspect-Oriented Languages workshop (FOAL2005), (March 2005)An approach to develop self-assembling self-adaptive service oriented applications.. Polytechnic University of Milan, Italy, (2010)SMT-based Verification of LTL Specifications with Integer Constraints and its Application to Runtime Checking of Service Substitutability, , , , and . CoRR, (2010)Requirements-driven adaptive digital forensics., , , , , and . RE, page 340-341. IEEE Computer Society, (2013)On bytecode slicing and AspectJ interferences, , and . FOAL'07: Proceedings of the 6th workshop on Foundations of aspect-oriented languages, page 35--43. ACM, ACM Press, (March 2007)Artificial Neural Networks for the forecasting of wave climate in proximity of harbour area., , , , , , and . MetroXRAINE, page 618-623. IEEE, (2022)