BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Belgium
1 × Canada
1 × China
1 × Greece
1 × Hungary
1 × Romania
1 × Switzerland
1 × The Netherlands
2 × France
2 × Germany
7 × USA
Collaborated with:
P.Tonella A.Avancini F.Ricca J.Nagra C.Basile T.R.Dean M.D.Penta M.Torchiano C.D.Nguyen M.D.Preda C.Matteotti P.Falcarin A.Majumdar D.Marchignoli D.Appelt L.C.Briand A.Marchetto L.Mariani C.S.Collberg D.Binkley M.Harman C.A.Visaggio M.Marin K.Mens L.Moonen T.Tourwé B.D.Sutter Brecht Wyseur Jérôme d'Annoville Michael Zunke
Talks about:
aspect (7) migrat (6) softwar (5) orient (4) legaci (4) applic (4) test (4) code (4) protect (3) program (3)

♂ Person: Mariano Ceccato

DBLP DBLP: Ceccato:Mariano

Facilitated 3 volumes:

CSMR-WCRE 2014PrCo
WCRE 2013PrCo
SCAM 2012PrCh

Contributed to:

ICPC 20132013
WCRE 20132013
ICSE 20122012
SCAM 20112011
ICSM 20102010
ICPC 20092009
SAC 20092009
CSMR 20082008
ICSE 20082008
PDP 20082008
SCAM 20082008
WCRE 20082008
ICSE 20072007
ICSM 20072007
SCAM 20072007
ICSM 20052005
IWPC 20052005
ICSM 20042004
SCAM 20042004
WCRE 20042004
ASE 20162016
WICSA 20162016

Wrote 23 papers:

ICPC-2013-BasileC #towards
Towards a unified software attack model to assess software protections (CB, MC), pp. 219–222.
WCRE-2013-AvanciniC #grammarware #named #testing #web
Circe: A grammar-based oracle for testing Cross-site scripting in web applications (AA, MC), pp. 262–271.
ICSE-2012-CeccatoMMNT #debugging #effectiveness #empirical #random testing #testing
An empirical study about the effectiveness of debugging when random test cases are used (MC, AM, LM, CDN, PT), pp. 452–462.
SCAM-2011-AvanciniC #approach #search-based #security #testing #web
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
ICSM-2010-CeccatoT #consistency #legacy #migration #static analysis #thread
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system (MC, PT), pp. 1–9.
ICPC-2009-CeccatoPNFRTT #assessment #effectiveness #obfuscation #source code
The effectiveness of source code obfuscation: An experimental assessment (MC, MDP, JN, PF, FR, MT, PT), pp. 178–187.
SAC-2009-CeccatoTPM #orthogonal
Remote software protection by orthogonal client replacement (MC, PT, MDP, AM), pp. 448–455.
CSMR-2008-Ceccato #aspect-oriented #automation #migration #towards
Automatic Support for the Migration Towards Aspects (MC), pp. 298–301.
CSMR-2008-CeccatoTM #goto #java #legacy #migration
Goto Elimination Strategies in the Migration of Legacy Code to Java (MC, PT, CM), pp. 53–62.
ICSE-2008-RiccaPTTCV #evolution
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks (FR, MDP, MT, PT, MC, CAV), pp. 361–370.
PDP-2008-CeccatoNT #performance #trust #verification
Distributing Trust Verification to Increase Application Performance (MC, JN, PT), pp. 604–610.
SCAM-2008-CeccatoDT #legacy #program transformation #using
Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
WCRE-2008-CeccatoDTM #java #legacy #migration #reverse engineering
Data Model Reverse Engineering in Migrating a Legacy System to Java (MC, TRD, PT, DM), pp. 177–186.
ICSE-2007-RiccaPTTC #comprehension #experience #uml
The Role of Experience and Ability in Comprehension Tasks Supported by UML Stereotypes (FR, MDP, MT, PT, MC), pp. 375–384.
ICSM-2007-Ceccato #aspect-oriented #migration #object-oriented #programming
Migrating Object Oriented code to Aspect Oriented Programming (MC), pp. 497–498.
SCAM-2007-CeccatoPNCT #slicing
Barrier Slicing for Remote Software Trusting (MC, MDP, JN, CSC, PT), pp. 27–36.
ICSM-2005-BinkleyCHRT #aspect-oriented #automation #object-oriented #refactoring
Automated Refactoring of Object Oriented Code into Aspects (DB, MC, MH, FR, PT), pp. 27–36.
IWPC-2005-CeccatoMMMTT #comparison #mining
A Qualitative Comparison of Three Aspect Mining Techniques (MC, MM, KM, LM, PT, TT), pp. 13–22.
ICSM-2004-TonellaC #aspect-oriented #implementation #interface #migration
Migrating Interface Implementation to Aspects (PT, MC), pp. 220–229.
SCAM-2004-CeccatoT #aspect-oriented #programming
Adding Distribution to Existing Applications by Means of Aspect Oriented Programming (MC, PT), pp. 107–116.
WCRE-2004-TonellaC #concept analysis #execution #mining
Aspect Mining through the Formal Concept Analysis of Execution Traces (PT, MC), pp. 112–121.
ASE-2016-CeccatoNAB #automation #black box #injection #named #security #testing
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities (MC, CDN, DA, LCB), pp. 167–177.
WICSA-2016-SutterFWBCDZ #architecture
A Reference Architecture for Software Protection (BDS, PF, BW, CB, MC, Jd, MZ), pp. 291–294.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.