11 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
Typology operator: and / or
Language operator: and / or
Date operator: and / or
Rights operator: and / or
2020 Conference article Open Access OPEN

An experience with the application of three nlp tools for the analysis of natural language requirements
Arrabito M., Fantechi A., Gnesi S., Semini L.
We report on the experience made with three Natural Language Processing analysis tools, aimed to compare their performance in detecting ambiguity and under-specification in requirements documents, and to compare them with respect to other qualities like learnability, usability, and efficiency. Two industrial tools, Requirements Scout and QVscribe, and an academic one, QuARS, are compared.Source: Quality of Information and Communications Technology 13th International Conference, QUATIC 2020, pp. 488–498, Faro, Portugal, 9-11/09/2020
DOI: 10.1007/978-3-030-58793-2_39

See at: link.springer.com Open Access | ISTI Repository Open Access | CNR ExploRA Open Access | academic.microsoft.com Restricted | link.springer.com Restricted | link.springer.com Restricted


2019 Conference article Open Access OPEN

Applying the QARS tool to detect variability
Fantechi A., Gnesi S., Semini L.
In this demo paper we present how to use the QuARS tool to extract variability information from requirements documents. The main functionality of QuARS is to detect ambiguity in Natural Language (NL) requirement documents. Ambiguity in requirements may be due to intentional or unintentional indication of possible variability; an ambiguity detecting tool can hence be useful to analysts and clients to figure the potential of a requirements document to describe a family of different products.Source: SPLC 2019 - 23rd International Systems and Software Product Line Conference, Paris, France, 09-13 September, 2019
DOI: 10.1145/3307630.3342388

See at: ISTI Repository Open Access | academic.microsoft.com Restricted | dblp.uni-trier.de Restricted | dl.acm.org Restricted | dl.acm.org Restricted | flore.unifi.it Restricted | CNR ExploRA Restricted


2019 Conference article Open Access OPEN

From generic requirements to variability
Fantechi A., Gnesi S., Semini L.
This paper describes a research activity aiming at extracting variability information from ambiguities and vagueness of generic requirement documents, written in Natural Language. The proposed activity continues a research stream focusing on techniques to extract variability information from requirement documents. Here, we study the introduction of a process able to distinguish structural from functional variability, both in the extracted variability model and in the derived lower-level requirements. The problem is stated with reference to an example, a solution proposal is sketched together with related research questions, and a validation path is envisaged.Source: REFSQ-2019 - Workshops, Doctoral Symposium, Live Studies Track, and Poster Track, Essen, Germany, 18 March, 2019.

See at: ceur-ws.org Open Access | ISTI Repository Open Access | CNR ExploRA Open Access


2017 Journal article Open Access OPEN

An experience in using machine learning for short-term predictions in smart transportation systems
Bacciu D., Carta A., Gnesi S., Semini L.
Bike-sharing systems (BSS) are a means of smart transportation with the benefit of a positive impact on urban mobility. To improve the satisfaction of a user of a BSS, it is useful to inform her/him on the status of the stations at run time, and indeed most of the current systems provide the information in terms of number of bicycles parked in each docking stations by means of services available via web. However, when the departure station is empty, the user could also be happy to know how the situation will evolve and, in particular, if a bike is going to arrive (and vice versa when the arrival station is full). To fulfill this expectation, we envisage services able to make a prediction and infer if there is in use a bike that could be, with high probability, returned at the station where she/he is waiting. The goal of this paper is hence to analyze the feasibility of these services. To this end, we put forward the idea of using Machine Learning methodologies, proposing and comparing different solutions. (C) 2016 Elsevier Inc. All rights reserved.Source: Journal of Logical and Algebraic Methods in Programming [online] 87 (2017): 52–66. doi:10.1016/j.jlamp.2016.11.002
DOI: 10.1016/j.jlamp.2016.11.002

See at: Journal of Logical and Algebraic Methods in Programming Open Access | Journal of Logical and Algebraic Methods in Programming Restricted | Journal of Logical and Algebraic Methods in Programming Restricted | Journal of Logical and Algebraic Methods in Programming Restricted | Journal of Logical and Algebraic Methods in Programming Restricted | Journal of Logical and Algebraic Methods in Programming Restricted | Journal of Logical and Algebraic Methods in Programming Restricted | CNR ExploRA Restricted | Journal of Logical and Algebraic Methods in Programming Restricted


2017 Conference article Open Access OPEN

Optimizing Feature Interaction Detection
Fantechi A., Gnesi S., Semini L.
The feature interaction problem has been recognized as a general problem of software engineering. The problem appears when a combination of features interacts generating a conflict, exhibiting a behaviour that is unexpected for the features considered in isolation, possibly resulting in some critical safety violation. Verification of absence of critical feature interactions has been the subject of several studies. In this paper, we focus on functional interactions and we address the problem of the 3-way feature interactions, i.e. interactions that occur only when three features are all included in the system, but not when only two of them are. In this setting, we define a widely applicable definition framework, within which we show that a 3 (or greater)-way interaction is always caused by a 2-way interaction, i.e. that pairwise sampling is complete, hence reducing to quadratic the complexity of automatic detection of incorrect interaction.Source: Joint 22nd International Workshop on Formal Methods for Industrial Critical Systems - and - 17th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2017, pp. 201–216, Turin, Italy, 18-20/09/2017
DOI: 10.1007/978-3-319-67113-0_13

See at: ISTI Repository Open Access | academic.microsoft.com Restricted | core.ac.uk Restricted | dblp.uni-trier.de Restricted | doi.org Restricted | flore.unifi.it Restricted | link.springer.com Restricted | link.springer.com Restricted | link.springer.com Restricted | CNR ExploRA Restricted | rd.springer.com Restricted


2017 Conference article Open Access OPEN

Ambiguity defects as variation points in requirements
Fantechi A., Gnesi S., Semini L.
Software requirements are generally expressed in Natural Language. NL is intrinsically ambiguous, and this is seen as a possible source of problems in the later interpretation of requirements. However, ambiguity or under-specification at requirements level can in some cases give an indication of possible variability, either in design choice, in implementation choices or configurability. Taking into account the results of previous analyses conducted on different requirements documents with NL analysis tools, we attempt a first classification of the forms of ambiguity that indicate variation points, and we indicate an approach to achieve automated support to variability elicitation.Source: Eleventh International Workshop on Variability Modelling of Software-intensive Systems, VaMoS 2017, pp. 13–19, Eindhoven, Netherlands, 1-3/02/2017
DOI: 10.1145/3023956.3023964

See at: ISTI Repository Open Access | academic.microsoft.com Restricted | core.ac.uk Restricted | dblp.uni-trier.de Restricted | dl.acm.org Restricted | dl.acm.org Restricted | doi.org Restricted | flore.unifi.it Restricted | CNR ExploRA Restricted


2016 Journal article Open Access OPEN

Adopting a Machine Learning Approach in the design of Smart Transportation Systems
Gnesi S., Bacciu D., Carta A., Semini L.
We have applied a machine learning approach to both implement and assess new services for the users of a bike-sharing system. The aim is to predict the destination station of a bike in use, given information on its pick up details.Source: ERCIM news (2016): 24–24.
Project(s): QUANTICOL via OpenAIRE

See at: ercim-news.ercim.eu Open Access | CNR ExploRA Open Access


1999 Report Open Access OPEN

Formal description and validation of an interaction policy in an object-oriented framework
Fantechi A., Gnesi S., Semini L.
Formal methods are increasingly used to validate the design of software and hardware components of safety critical systems. We describe here a case study where a formal verification method was applied in practice. As a case study we have considered a safe interaction policy between communicating objects, the Multiple Levels of Integrity policy. This policy can be seen as a communication protocol that guarantees the integrity of sensible data. Formal specification is given using a process algebra, and validation is done following a model checking approach.Source: ISTI Technical reports, pp.1–24, 1999

See at: CNR ExploRA Open Access


1999 Conference article Open Access OPEN

Implementation of coordination primitives in a mobile architecture
Gnesi S., Semini L.
Coordination languages based on multiple tuple spaces and asynchronous communication provide an high level description formalism which is adequate to model applications in a mobile environment. These languages have the advantage, with respect to most languages to describe mobile systems, of permitting to describe the applications without considering low level issues like subsystems location or communication failures. To support this claim we formally show how simple coordination primitives can be implemented when the underlying architecture is a mobile one. Finally, we prove that our implementation model is correct with respect to the coordination language semantics.Source: International Conference on Parallel and Distributed Processing Techniques and Applications: PDPTA'99., pp. 1012–1018, Las Vegas, USA, June 28 - July 1 1999

See at: CNR ExploRA Open Access


1999 Contribution to book Restricted

Formal description and validation for an integrity policy supporting multiple levels of criticality
Fantechi A., Gnesi S., Semini L.
Formal methods are increasingly used to validate the design of softwar and hardware components of safety critical system. In particular formal validation is needed for those mechanism which support the overall dependability of the systems. Inside the GUARDS project, a novel integrity mechanism has been proposed to implement the Multiple Levels of Criticality model within an object-oriented framework. In this paper we present the application of model checking techniques to the formal validation of this integrity level mechanism.Source: Dependable Computing for Critical Applications 7: DCCA-7, edited by Weinstock C.B., Rushby J., pp. 129–146, 1999
DOI: 10.1109/dcfts.1999.814293

See at: academic.microsoft.com Restricted | arpi.unipi.it Restricted | doi.ieeecomputersociety.org Restricted | CNR ExploRA Restricted | www.scopus.com Restricted | xplorestaging.ieee.org Restricted


1999 Journal article Restricted

Modelling mobile applications
Gnesi S., Semini L.
There has been growing interest in wide-area distributed applications in recent years. A key concept for structuring such applications is represented by mobile agents, units of executing code that can migrate between sites.Source: ERCIM news 36 (1999): 27–28.

See at: CNR ExploRA Restricted