skip to content
  • it
UNIVERSITÀ DEGLI STUDI
DEL SANNIO   Benevento

Pubblicazioni di ateneo

Found 63 results
Author [ Titolo(Desc)] Tipo Anno
Filters: Author is Antoniol, G.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Antoniol, G.., U.. Villano, E.. Merlo, and M. Di Penta, "Analyzing cloning evolution in the Linux kernel", Information and Software Technology, vol. 44, no. 13, 2002.
Di Lucca, G.A.., M. Di Penta, G.. Antoniol, and G.. Casazza, "An approach for reverse engineering of web-based applications", Reverse Engineering - Working Conference Proceedings, 2001.
Romano, D.., M. Di Penta, and G.. Antoniol, "An approach for search based testing of null pointer exceptions", Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011, 2011.
Antoniol, G.., G.. Casazza, A.. Cimitile, and M.. Tortorella, "Approach to limit the WYNOT problem", Conference on Software Maintenance, pp. 207-215, 2000.
Antoniol, G.., A.. Cimitile, G.A.. Di Lucca, and M. Di Penta, "Assessing staffing needs for a software maintenance project through queuing simulation", IEEE Transactions on Software Engineering, vol. 30, no. 1, 2004.
Antoniol, G.., M. Di Penta, and E.. Merlo, "An automatic approach to identify class evolution discontinuities", International Workshop on Principles of Software Evolution (IWPSE), 2004.
C
Antoniol, G.., L.C.. Briand, M. Di Penta, and Y.. Labiche, "A case study using the round-trip strategy for state-based class testing", Proceedings - International Symposium on Software Reliability Engineering, ISSRE, vol. 2002-Janua, 2002.
German, D.M.., M. Di Penta, Y.-G.. Guéhéneuc, and G.. Antoniol, "Code siblings: Technical and legal implications of copying code between applications", Proceedings of the 2009 6th IEEE International Working Conference on Mining Software Repositories, MSR 2009, 2009.
Antoniol, G.., M. Di Penta, G.. Masone, and U.. Villano, "Compiler hacking for source code analysis", Software Quality Journal, vol. 12, no. 4, 2004.
Antoniol, G.., M. Di Penta, G.. Masone, and U.. Villano, "Compiler Hacking for Source Code Analysis", SOFTWARE QUALITY JOURNAL, vol. n. 12, pp. 383–486, 2004.
D
Antoniol, G.., and M. Di Penta, "A distributed architecture for dynamic analyses on user-profile data", Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, vol. 8, 2004.
F
Medini, S.., P.. Galinier, M. Di Penta, Y.-G.. Guéhéneuc, and G.. Antoniol, "A fast algorithm to locate concepts in execution traces", Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6956 LNCS, 2011.
Di Penta, M., G.. Antoniol, D.M.. German, Y.-G.. Guéhéneuc, and B.. Adams, "Five days of empirical software engineering: The PASED experience", Proceedings - International Conference on Software Engineering, 2012.
H
Asadi, F.., M. Di Penta, G.. Antoniol, and Y.-G.. Guéhéneuc, "A heuristic-based approach to identify concepts in execution traces", Proceedings of the European Conference on Software Maintenance and Reengineering, CSMR, 2011.
Panichella, S.., G.. Bavota, M. Di Penta, G. Canfora, and G.. Antoniol, "How developers' collaborations identified from different sources tell us about code changes", Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014, 2014.
I
Eshkevari, L.., G.. Antoniol, J.R.. Cordy, and M. Di Penta, "Identifying and locating interference issues in PHP applications: The case of WordPress", 22nd International Conference on Program Comprehension, ICPC 2014 - Proceedings, 2014.
Casazza, G.., G.. Antoniol, U.. Villano, E.. Merlo, and M. Di Penta, "Identifying clones in the Linux kernel", Proceedings - 1st IEEE International Workshop on Source Code Analysis and Manipulation, 2001.
Di Penta, M., D.M.. German, and G.. Antoniol, "Identifying licensing of jar archives using a code-search approach", Proceedings - International Conference on Software Engineering, 2010.
Del Grosso, C.., G.. Antoniol, M. Di Penta, P.. Galinier, and E.. Merlo, "Improving network applications security: A new heuristic to generate stress testing data", GECCO 2005 - Genetic and Evolutionary Computation Conference, 2005.

Pages