Skip to main content

Showing 1–11 of 11 results for author: Spoletini, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.06386  [pdf, other

    cs.SE cs.CR

    Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security Requirements

    Authors: Giovanna Broccia, Maurice H. ter Beek, Alberto Lluch Lafuente, Paola Spoletini, Alessio Ferrari

    Abstract: Context and Motivation Attack-Defense Trees (ADTs) are a graphical notation used to model and assess security requirements. ADTs are widely popular, as they can facilitate communication between different stakeholders involved in system security evaluation, and they are formal enough to be verified, e.g., with model checkers. Question/Problem While the quality of this notation has been primarily as… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    ACM Class: D.2.1

  2. arXiv:2301.12090  [pdf, other

    cs.SE

    Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation

    Authors: Alessio Ferrari, Paola Spoletini

    Abstract: App store-inspired elicitation is the practice of exploring competitors' apps, to get inspiration for requirements. This activity is common among developers, but little insight is available on its practical use, advantages, and possible issues. This paper aims to study strategies, benefits, and challenges of app store-inspired elicitation, and to compare this technique with the more traditional re… ▽ More

    Submitted 28 January, 2023; originally announced January 2023.

  3. arXiv:2208.00825  [pdf, other

    cs.SE cs.HC

    How Do Requirements Evolve During Elicitation? An Empirical Study Combining Interviews and App Store Analysis

    Authors: Alessio Ferrari, Paola Spoletini, Sourav Debnath

    Abstract: Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototy**, and other interactive sessions. Then, requirements can be further extended, based on the analysis of the features of competing products available on the market. Understanding how this process takes place can help to identify the contribution of the different elicitation phase… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    ACM Class: D.2; D.2.1; H.1.2

  4. arXiv:2104.02410  [pdf, other

    cs.SE cs.LG cs.SD eess.AS

    Using Voice and Biofeedback to Predict User Engagement during Product Feedback Interviews

    Authors: Alessio Ferrari, Thaide Huichapa, Paola Spoletini, Nicole Novielli, Davide Fucci, Daniela Girardi

    Abstract: Capturing users' engagement is crucial for gathering feedback about the features of a software product. In a market-driven context, current approaches to collect and analyze users' feedback are based on techniques leveraging information extracted from product reviews and social media. These approaches are hardly applicable in bespoke software development, or in contexts in which one needs to gathe… ▽ More

    Submitted 1 July, 2024; v1 submitted 6 April, 2021; originally announced April 2021.

    Comments: This paper contains updated experimental results with respect to the initial version

    MSC Class: 68N30 ACM Class: D.2.1; D.2.2

  5. arXiv:2001.08525  [pdf, other

    cs.SE cs.AI cs.MA

    Optimal by Design: Model-Driven Synthesis of Adaptation Strategies for Autonomous Systems

    Authors: Yehia Elrakaiby, Paola Spoletini, Bashar Nuseibeh

    Abstract: Many software systems have become too large and complex to be managed efficiently by human administrators, particularly when they operate in uncertain and dynamic environments and require frequent changes. Requirements-driven adaptation techniques have been proposed to endow systems with the necessary means to autonomously decide ways to satisfy their requirements. However, many current approaches… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

  6. arXiv:1706.02701  [pdf, other

    cs.LO

    From model checking to a temporal proof for partial models: preliminary example

    Authors: A. Bernasconi, C. Menghi, P. Spoletini, L. D. Zuck, C. Ghezzi

    Abstract: This paper describes in detail the example introduced in the preliminary evaluation of THRIVE. Specifically, it evaluates THRIVE over an abstraction of the ground model proposed for a critical component belonging to a medical device used by optometrists and ophtalmologits to dected visual problems.

    Submitted 8 June, 2017; originally announced June 2017.

    Comments: 5 pages, 3 figures

  7. arXiv:1609.00610  [pdf, other

    cs.FL

    Modeling, refining and analyzing Incomplete Büchi Automata

    Authors: Claudio Menghi, Paola Spoletini, Carlo Ghezzi

    Abstract: Software development is an iterative process which includes a set of development steps that transform the initial high level specification of the system into its final, fully specified, implementation. This report discusses the theoretical foundations that allow Incomplete Büchi Automata (IBAs) to be used in the iterative development of a sequential system.

    Submitted 2 September, 2016; originally announced September 2016.

  8. Bounded Variability of Metric Temporal Logic

    Authors: Carlo A. Furia, Paola Spoletini

    Abstract: Previous work has shown that reasoning with real-time temporal logics is often simpler when restricted to models with bounded variability---where no more than v events may occur every V time units, for given v, V. When reasoning about formulas with intrinsic bounded variability, one can employ the simpler techniques that rely on bounded variability, without any loss of generality. What is then the… ▽ More

    Submitted 4 July, 2014; v1 submitted 10 June, 2013; originally announced June 2013.

  9. arXiv:1203.6278  [pdf, other

    cs.LO

    Fuzzy Time in LTL

    Authors: Achille Frigeri, Liliana Pasquale, Paola Spoletini

    Abstract: In the last years, the adoption of active systems has increased in many fields of computer science, such as databases, sensor networks, and software engineering. These systems are able to automatically react to events, by collecting information from outside and internally generating new events. However, the collection of data is often hampered by uncertainty and vagueness that can arise from the i… ▽ More

    Submitted 28 March, 2012; originally announced March 2012.

    Comments: 10 pages

    ACM Class: F.4.1; I.2.3

  10. arXiv:0912.0759   

    cs.LO cs.CR cs.DC cs.PL

    Proceedings 2nd Interaction and Concurrency Experience: Structured Interactions

    Authors: Filippo Bonchi, Davide Grohmann, Paola Spoletini, Emilio Tuosto

    Abstract: This volume contains the proceedings of the 2nd Workshop on Interaction and Concurrency Experience (ICE'09). The workshop was held in Bologna, Italy on 31th of August 2009, as a satellite workshop of CONCUR'09. The previous edition of ICE has been organized in Reykjavik (2008). The ICE workshop is intended as a series of international scientific meetings oriented to researchers in various fiel… ▽ More

    Submitted 3 December, 2009; originally announced December 2009.

    Journal ref: EPTCS 12, 2009

  11. On Relaxing Metric Information in Linear Temporal Logic

    Authors: Carlo A. Furia, Paola Spoletini

    Abstract: Metric LTL formulas rely on the next operator to encode time distances, whereas qualitative LTL formulas use only the until operator. This paper shows how to transform any metric LTL formula M into a qualitative formula Q, such that Q is satisfiable if and only if M is satisfiable over words with variability bounded with respect to the largest distances used in M (i.e., occurrences of next), but t… ▽ More

    Submitted 17 June, 2011; v1 submitted 25 June, 2009; originally announced June 2009.

    Comments: Minor changes

    Journal ref: Proceedings of the 18th International Symposium on Temporal Representation and Reasoning (TIME'11). Pgg. 72--79, IEEE Computer Society, September 2011