Skip to main content

and
  1. Chapter and Conference Paper

    Integrated and Composable Supervision of BPEL Processes

    In the past few years many supervision techniques were developed to provide reliable business processes and guarantee the established SLAs. Since none of them provided a definitive solution, the paper proposes...

    Luciano Baresi, Sam Guinea, Liliana Pasquale in Service-Oriented Computing – ICSOC 2008 (2008)

  2. Chapter and Conference Paper

    Distributed Cross-Domain Configuration Management

    Applications make extensive use of services offered by distributed platforms ranging from software services to application platforms or mere computational resources. In these cross-domain environments applicat...

    Liliana Pasquale, Jim Laredo, Heiko Ludwig in Service-Oriented Computing (2009)

  3. No Access

    Chapter and Conference Paper

    The eGovernment Use Case Scenario

    The SLA@SOI framework-a solution for the automated management of services on the basis of Service Level Agreements (SLAs)-is usually applied to automated software or hardware services. The eGovernment use case...

    Giampaolo Armellin, Annamaria Chiasera in Service Level Agreements for Cloud Computi… (2011)

  4. No Access

    Chapter

    Adaptation Goals for Adaptive Service-Oriented Architectures

    Service-oriented architecture supports the definition and execution of complex business processes in a flexible way. A service-based application assembles the functionality provided by disparate, remote servic...

    Luciano Baresi, Liliana Pasquale in Relating Software Requirements and Architectures (2011)

  5. No Access

    Chapter and Conference Paper

    A Generic Platform for Conducting SLA Negotiations

    In service-oriented systems, negotiating service level agreements (SLAs) occupies a central role in the service usage cycle. It is during negotiations that parties are brought together in an interactive mechan...

    Edwin Yaqub, Philipp Wieder in Service Level Agreements for Cloud Computi… (2011)

  6. No Access

    Chapter and Conference Paper

    Requirements Engineering Meets Physiotherapy: An Experience with Motion-Based Games

    [Context and motivation] In the last years motion-based games have achieved an increasing success. These games have great potential to support physiotherapeutic programs, as they can guide the pa...

    Liliana Pasquale, Paola Spoletini in Requirements Engineering: Foundation for S… (2013)

  7. No Access

    Chapter

    Living with Uncertainty in the Age of Runtime Models

    Uncertainty can be defined as the difference between information that is represented in an executing system and the information that is both measurable and available about the system at a certain point in its ...

    Holger Giese, Nelly Bencomo, Liliana Pasquale, Andres J. Ramirez in Models@run.time (2014)

  8. No Access

    Article

    Automating trade-off analysis of security requirements

    A key aspect of engineering secure systems is identifying adequate security requirements to protect critical assets from harm. However, security requirements may compete with other requirements such as cost an...

    Liliana Pasquale, Paola Spoletini, Mazeiar Salehie in Requirements Engineering (2016)

  9. No Access

    Book and Conference Proceedings

    Requirements Engineering: Foundation for Software Quality

    26th International Working Conference, REFSQ 2020, Pisa, Italy, March 24–27, 2020, Proceedings

    Nazim Madhavji, Liliana Pasquale in Lecture Notes in Computer Science (2020)

  10. Chapter and Conference Paper

    Correction to: Requirements Engineering: Foundation for Software Quality

    The book was inadvertently published with only two volume editors “Nazim Madhavji and Liliana Pasquale” whereas there should have been four “Nazim Madhavji, Liliana Pasquale, Alessio Ferrari and Stefania Gnesi...

    Nazim Madhavji, Liliana Pasquale in Requirements Engineering: Foundation for S… (2020)

  11. No Access

    Chapter and Conference Paper

    Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction

    Ransomware is a critical security concern, and develo** applications for ransomware detection is paramount. Machine learning models are helpful in detecting and classifying ransomware. However, the high dime...

    Faithful Chiagoziem Onwuegbuche in Cyber Security, Cryptology, and Machine Le… (2023)