mariano ceccato
mariano ceccato
Verified email at fbk.eu - Homepage
TitleCited byYear
Aspect mining through the formal concept analysis of execution traces
P Tonella, M Ceccato
11th Working Conference on Reverse Engineering, 112-121, 2004
2382004
Measuring the effects of software aspectization
M Ceccato, P Tonella
1st Workshop on Aspect Reverse Engineering 12, 2004
1662004
A qualitative comparison of three aspect mining techniques
M Ceccato, M Marin, K Mens, L Moonen, P Tonella, T Tourwe
13th International Workshop on Program Comprehension (IWPC'05), 13-22, 2005
1042005
Tool-supported refactoring of existing object-oriented code into aspects
D Binkley, M Ceccato, M Harman, F Ricca, P Tonella
IEEE Transactions on Software Engineering 32 (9), 698-717, 2006
972006
Automated refactoring of object oriented code into aspects
D Binkley, M Ceccato, M Harman, F Ricca, P Tonella
21st IEEE International Conference on Software Maintenance (ICSM'05), 27-36, 2005
842005
How developers' experience and ability influence web application comprehension tasks supported by uml stereotypes: A series of four experiments
F Ricca, M Di Penta, M Torchiano, P Tonella, M Ceccato
IEEE Transactions on Software Engineering 36 (1), 96-118, 2010
802010
The role of experience and ability in comprehension tasks supported by UML stereotypes
F Ricca, M Di Penta, M Torchiano, P Tonella, M Ceccato
Proceedings of the 29th international conference on Software Engineering …, 2007
802007
Is AOP code easier or harder to test than OOP code
M Ceccato, P Tonella, F Ricca
First Workshop on Testing Aspect-Oriented Program (WTAOP), Chicago, Illinois, 2005
752005
Applying and combining three different aspect mining techniques
M Ceccato, M Marin, K Mens, L Moonen, P Tonella, T Tourwé
Software Quality Journal 14 (3), 209-231, 2006
682006
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
M Ceccato, M Di Penta, P Falcarin, F Ricca, M Torchiano, P Tonella
Empirical Software Engineering 19 (4), 1040-1074, 2014
672014
Using acceptance tests as a support for clarifying requirements: A series of experiments
F Ricca, M Torchiano, M Di Penta, M Ceccato, P Tonella
Information and Software Technology 51 (2), 270-283, 2009
652009
The effectiveness of source code obfuscation: An experimental assessment
M Ceccato, M Di Penta, J Nagra, P Falcarin, F Ricca, M Torchiano, ...
2009 IEEE 17th International Conference on Program Comprehension, 178-187, 2009
602009
Refactoring the aspectizable interfaces: An empirical assessment
P Tonella, M Ceccato
IEEE Transactions on Software Engineering 31 (10), 819-832, 2005
582005
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks
F Ricca, M Di Penta, M Torchiano, P Tonella, M Ceccato, CA Visaggio
Proceedings of the 30th international conference on Software engineering …, 2008
462008
Towards security testing with taint analysis and genetic algorithms
A Avancini, M Ceccato
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
422010
Security testing of web applications: A search-based approach for cross-site scripting vulnerabilities
A Avancini, M Ceccato
2011 IEEE 11th international working conference on source code analysis and …, 2011
362011
Migrating interface implementations to aspects
P Tonella, M Ceccato
20th IEEE International Conference on Software Maintenance, 2004 …, 2004
352004
Towards experimental evaluation of code obfuscation techniques
M Ceccato, M Di Penta, J Nagra, P Falcarin, F Ricca, M Torchiano, ...
Proceedings of the 4th ACM workshop on Quality of Protection, 39-46, 2008
332008
Barrier slicing for remote software trusting
M Ceccato, M Dalla Preda, J Nagra, C Collberg, P Tonella
Seventh IEEE International Working Conference on Source Code Analysis and …, 2007
292007
Security testing of the communication among Android applications
A Avancini, M Ceccato
2013 8th International Workshop on Automation of Software Test (AST), 57-63, 2013
272013
The system can't perform the operation now. Try again later.
Articles 1–20