Author image not provided
 Ugo Alessandro Buy

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article7.76
Citation Count163
Publication count21
Publication years1990-2005
Available for download7
Average downloads per article626.86
Downloads (cumulative)4,388
Downloads (12 Months)216
Downloads (6 Weeks)23
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


30 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 30
Result page: 1 2

Sort by:

1 published by ACM
September 2018 A-Mobile 2018: Proceedings of the 1st International Workshop on Advances in Mobile App Analysis
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 47,   Downloads (Overall): 47

Full text available: PDFPDF
We identify several reliability issues arising from interactions between components of system-defined Android apps and components of third-party apps. These issues are generally caused by incorrect assumptions that system apps make about the behavior of third-party apps, resulting in significant vulnerabilities in system apps. For instance, it is possible for ...
Keywords: Denial-of-service attacks, Mobile platform security, Software testing

2 published by ACM
May 2016 GAS '16: Proceedings of the 5th International Workshop on Games and Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 15,   Downloads (Overall): 105

Full text available: PDFPDF
Novice programmers often struggle with many concepts underlying computer programming. The concept of a program variable--that is, a named storage location--is a centerpiece of the programming languages typically taught in introductory computer science courses including C, Java, JavaScript, Python, and C++. However, to date empirical studies suggest that misinterpretation of ...
Keywords: program debugging, program visualization, software education

3 published by ACM
August 2014 ECSAW '14: Proceedings of the 2014 European Conference on Software Architecture Workshops
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 14,   Downloads (Overall): 84

Full text available: PDFPDF
Experience with system-level concerns demonstrates that fitness for context is a consideration that is equally significant in making architectural decisions as is fitness for purpose. This requires architects to consider contextual factors in making decisions. These decisions are probabilistic in nature and they represent the subjective belief of the architect ...
Keywords: Bayesian belief network, Bayesian net, architecture decision network, contextual factors, decision network, enterprise, influence diagram, macro-architecture, probabilistic graphical model, software architecture, systems

4
August 2014 ASONAM '14: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 25,   Downloads (Overall): 27

Full text available: PDFPDF
Over the past decade Online Social Networks (OSNs) have been helping hundreds of millions of people develop reliable computer-mediated relations. However, many user profiles in OSNs contain misleading, inconsistent or false information. Existing studies have shown that lying in OSNs is quite widespread, often for protecting a user's privacy. In ...
Keywords: profile characteristics, Twitter, gender classification, deception detection

5
December 2013 ICMLA '13: Proceedings of the 2013 12th International Conference on Machine Learning and Applications - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

Online Social Networks (OSNs) provide reliable communication among users from different countries. The volume of texts generated by OSNs is huge and highly informative. Gender classification can serve commercial organizations for advertising, law enforcement for legal investigation, and others for social reasons. Here we explore profile characteristics for gender classification ...
Keywords: Color-based features, profile characteristics, phonemes as features, color quantization, social networks, language independence

6 published by ACM
August 2013 ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 6,   Downloads (12 Months): 54,   Downloads (Overall): 270

Full text available: PDFPDF
Online Social Networks (OSNs) generate a huge volume of user-originated texts. Gender classification can serve multiple purposes. For example, commercial organizations can use gender classification for advertising. Law enforcement may use gender classification as part of legal investigations. Others may use gender information for social reasons. Here we explore language ...
Keywords: color-based features, application for social network, language independent, social network

7 published by ACM
August 2013 ESEC/FSE 2013: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 2,   Downloads (12 Months): 20,   Downloads (Overall): 271

Full text available: PDFPDF
Many organizations deploy applications that use databases by sending Structured Query Language (SQL) statements to them and obtaining data that result from the execution of these statements. Since applications often share the same databases concurrently, database deadlocks routinely occur in these databases resulting in major performance degradation in these applications. ...
Keywords: Petri net, database deadlock, hold-and-wait cycle

8 published by ACM
August 2013 ESEC/FSE 2013: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 14,   Downloads (Overall): 163

Full text available: PDFPDF
In this demonstration, we will present a database deadlocks prevention system that visualizes our algorithm for detecting hold-and-wait cycles that specify how resources (e.g., database tables) are locked and waited on to be locked during executions of SQL statements and utilizes those cycles information to prevent database deadlocks automatically.
Keywords: Database deadlocks, concurrency

9
March 2013 ICST '13: Proceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 6

Many organizations deploy applications that use databases by sending Structured Query Language (SQL) statements to them and obtaining data that result from executions of these statements. Since applications often share the same databases concurrently, database deadlocks routinely occur in these databases. Testing applications to determine how they cause database deadlocks ...
Keywords: database deadlock, concurrency, testing

10
July 2005 COMPSAC-W'05: Proceedings of the 29th annual international conference on Computer software and applications conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

We define supervisory controllers for enforcing deadlines on transition firings in time Petri nets. Given a target net transition t d , and a deadline λ, we generate a controller that under broad assumptions forces t d to fire every λ time units. Our supervisory controller is based on the ...

11
April 2005 SEW '05: Proceedings of the 29th Annual IEEE/NASA on Software Engineering Workshop
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

We outline a supervisory control method for enforcing deadlines in real-time systems modeled as time Petri nets. Given a time Petri net NT, a net transition td, and a deadline d, we generate supervisory controllers that force td to fire at most d time units since the previous firing of ...

12
June 2003 ISCC '03: Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

To date developers can exploit a wealth of existinglanguages and tools when designing and implementingweb applications; however, comprehensive andautomated tools and techniques for producing theseapplications are still conspicuously lacking. Here wedescribe a framework for efficient production of webapplications, which synergistically integrates techniquesfor automatic code generation with some of the mostrecent ...

13
August 2002 COMPSAC '02: Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Compositional methods for Petri-net-based verification of concurrent systems are appealing because they allow the analysis of a complex system to be carried out in a piece-by-piecemanner. An issue in compositional Petri-net analysis is the generation of a compact net from a Labeled Transition System (LTS) isomorphic to the reachability graph ...
Keywords: Petri nets, transition systems, concurrency, automatic verification, Petri net generation, reachability graph

14
October 2001 COMPSAC '01: Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0


15
August 2001 Automated Software Engineering: Volume 8 Issue 3-4, August 2001
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

Real-time systems are becoming increasingly widespread, often in safety-critical applications. It is therefore crucial that these systems be correct; however, there are few automated tools for analyzing concurrency and timing properties of these systems. The PARTS toolset uses a Petri-net-based reachability analysis to analyze program specifications written in an Ada-83 ...
Keywords: experimental evaluation, real-time systems, Petri nets, automated analysis, real-time verification

16 published by ACM
August 2000 ISSTA '00: Proceedings of the 2000 ACM SIGSOFT international symposium on Software testing and analysis
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 1,442

Full text available: PDFPDF
Programs developed with object technologies have unique features that often make traditional testing methods inadequate. Consider, for instance, the dependence between the state of an object and the behavior of that object: The outcome of a method executed by an object often depends on the state of the object when ...
Keywords: symbolic execution, testing and analysis, testing object-oriented software, data flow analysis, class testing
Also published in:
September 2000  ACM SIGSOFT Software Engineering Notes: Volume 25 Issue 5, Sept. 2000

17
April 1998 ICSE '98: Proceedings of the 20th international conference on Software engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1,   Downloads (12 Months): 1,   Downloads (Overall): 353

Full text available: PDFPDF

18
August 1997 COMPSAC '97: Proceedings of the 21st International Computer Software and Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The authors present LTP (Language of Timed Processes), a process-algebra-based specification language, for the specification of real-time applications. In addition to timing requirements involving the execution time of individual computations, LTP can specify timing constraints that are associated with process descriptions: periodic constraints and sporadic constraints. Periodic processes (e.g. sensors) ...
Keywords: computations, deadlines, delays, execution time, periodic behavior modelling, periodic constraints, real-time applications, LTP, algebraic specification, process algebraic specification compilation, sporadic constraints, timed automata, Language of Timed Processes, finite representation, process descriptions, process-algebra-based specification language, timing requirement, automatic verification, timed transition systems, timeouts, translation

19
July 1997 Formal Methods in System Design: Volume 11 Issue 1, July 1997
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 6

The stubborn-set method attempts to reduce the number of states that must be explicitly enumerated during reachability analysis of a concurrent system, while preserving crucial concurrency properties in the reduced state space. Here we extend the method to the analysis of certain timed models. We also prove that timing properties ...

20
August 1996 Acta Informatica: Volume 33 Issue 5, August 1996
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

The goal of net reduction is to increase the effectiveness of Petri-netbased real-time program analysis. Petri-net-based analysis, like all reachabilitybased methods, suffers from the state explosion problem. Petri net reduction is one key method for combating this problem. In this paper, we extend several rules for the reduction of ordinary ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us