Research Highlights

This paper proposes a cloud computing multi-tenancy architecture to support cross-organisational process executions and to improve resource management distribution. Moreover, the approach supports the systematic extraction/composition of distributed data from the system event logs that are assumed to carry information of each process variant. To this aim, the approach also integrates an online process mining technique for the runtime extraction of business rules from event logs. Declarative processes are used to represent process variants running on the analysed infrastructure as they are particularly suited to represent the business process in a context characterised by low predictability and high variability. In this work, we also present a case study where the proposed architecture is implemented and applied to the execution of a real-life process of online products selling.
In Journal of Information & Knowledge Management, World Scientific., 2018

In this work, a set of behavioral features extracted by a car monitoring system is proposed to realize driver identification and path kind identification and to evaluate driver’s familiarity with a given vehicle. The proposed feature model is exploited using a time-series classification approach based on a multilayer perceptron (MLP) network. The validation has been performed on a real dataset composed of totally 292 driving sessions and shows that the proposed features have a very good driver and path identification and profiling ability.
In Journal of Advanced Transportation, Wiley-Hindawi., 2018

This paper aims at investigating the relation between the bug inducing and fixing phenomenon and the lack of written communication between committers in open source projects.We performed an empirical study that involved four open source projects, namely Apache httpd, GNU GCC, Mozilla Firefox, and Xorg Xserver. For each project change history data, issue tracker comments, mailing list messages, and chat logs were analyzed in order to answer four research questions about the relation between the social importance and communication level of committers and their proneness to induce bug fixes. Results indicate that the majority of bugs are fixed by committers who did not induce them, a smaller but substantial percentage of bugs is fixed by committers that induced them, and very few bugs are fixed by committers that were not directly involved in previous changes on the same files of the fix.
In Journal of Systems and Software, 2018

This paper investigates how the existing techniques for the discovery of declarative process models can be adapted when the business process under analysis contains non-atomic activities. In particular, we base our proposed approach on the use of discriminative rule mining to determine how the characteristics of the activity lifecycles in a business process influence the validity of a business rule in that process. The approach has been implemented as a plug-in of the process mining tool ProM and validated on synthetic logs and on a real-life log recorded by an incident and problem management system called VINST in use at Volvo IT Belgium.
In Information Systems, Elsevier., 2016

This paper proposes an approach to identify and analyse the components implementing the static and dynamic crosscutting in OO systems. The approach defines a meta‐model representing the structure of an OO system in terms of its components. A static analysis of an OO software system is performed to create an instance of this meta‐model. Such meta‐model is finally analysed to find static and dynamic crosscutting among concerns. The effectiveness and efficiency of the proposed approach have been validated in an empirical assessment where it was applied to some OO java systems. The obtained results show a good level of effectiveness for the crosscutting analysis.
In Journal of Software: Evolution and Process, 2016

In the proposed approach, DPs are modeled based on their high-level structural properties (e.g., inheritance, dependency, invocation, delegation, type nesting, and membership relationships) that are checked, by source code parsing, against the system structure and components. Moreover, the approach can also detect pattern variants, defined by overriding the pattern properties. This paper presents a description of the approach, provides a brief description of the supporting tool, and discusses the results from the experiments carried out to validate it. The approach was validated on seven systems of an open benchmark that contains systems of increasing sizes. For five additional systems, the results have been compared with the ones from a similar approach existing in the literature. The obtained results, the identified DP variants, and the effectiveness of the approach are thoroughly presented and discussed.
In Journal of Software Evolution and Process, Wiley, 2014

A mobile visual clothing search system is presented whereby a smart phone user can either choose a social networking image or capture a new photo of a person wearing clothing of interest and search for similar clothing in a large cloud-based ecommerce database. The phone’s GPS location is used to re-rank results by retail store location, to inform the user of local stores where similar clothing items can be tried on.
In Journal of Software Evolution and Process, Wiley., 2012

An Aspect-Oriented Programming-based approach to the development of software components for fault detection in automatic measurement systems is proposed. Faults are handled by means of specific software units, the “aspects”, in order to better modularize issues transversal to several components.
In Computer Standards & Interfaces, Elsevier., 2009

This paper presents a reverse engineering approach for Web Applications enabling the semi-automatic recovery of user-centered conceptual models describing, from a user perspective, key aspects, such as the delivered contents and navigational paths. The abstracted models are formalized according to the Ubiquitous Web Applications (UWA) design methodology, but any other design method for Web Applications could be used instead. The paper describes the recovery process, a tool developed to support the process, and the results from a case study conducted to validate the approach on a set of real world Web Applications.
In International Journal on Software Tools for Technology Transfer, Springer., 2009



Editorial Board member for the following journals:

  • Journal of Distance Education Technologies (JDET)
  • PeerJ CS

Reviewer for the following journals:

  • Journal of Systems and Software (JSS)
  • Journal of Software Evolution and Process (JSME)
  • Empirical Software Engineering (EMSE)
  • Information and Software Technology (IST)
  • PeerJ Computer Science
  • Advances in Software Engineering
  • The Scientific World Journal

PC member in the following conferences:

  • 2018 - World Congress on Computational Intelligence - FUZZ-IEEE (FUZZ 2018)
  • 2018 - International Conference on Software Technologies (ICSOFT 2018)
  • 2017 - World Congress on Computational Intelligence - FUZZ-IEEE (FUZZ 2017)
  • 2017 - ACM Simposium on Applied Computing (SAC 2017) - Collective Adaptive Systems and Middleware (CASM)
  • 2017 - International Conference on Software Technologies (ICSOFT 2017)
  • 2016 - International Conference on Software Technologies (ICSOFT 2016)
  • 2015 - Special Session on Process Mining in IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2015)
  • 2015 - International Conference on Software Technologies (ICSOFT 2015)
  • 2014 - ACM Symposium on Applied Computing (SAC 2014) - Programming for Separation of Concerns (PST)
  • 2014 - IEEE Symposium Series on Computational Intelligence (SSCI 2014)
  • 2014 - IEEE Enterprise Computing Conference (EDOC 2014) - as external reviewer
  • 2013 - IEEE Symposium Series on Computational Intelligence (SSCI 2013)
  • 2013 - ACM SIGPLAN Conference on Systems, Programming, Languages and Applications (OOPSLA 2013) as reviewer
  • 2009 - 16th Working Conference on Software Engineering (WCRE 2013), 13-16 Ottobre, Lille, France
  • 2008 - 12th European Conference on Software Maintenance and Reengineering (CMSR 2008)
  • 2006 - 7th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006) as Web Chair


I have been teaching instructor for the following courses at Dept of Engineering at University of Sannio (Benevento,Italy):

  • Software Systems Management and Software Engineering for labs, seminars, teaching and assignments from 2004 to 2014 supervising more then 20 theses (BS,MS)
  • Introduction to Computer Science (CS1) recovery course in 2014

I am professor for the following courses at Giustino Fortunato University (Benevento,Italy):

  • Introduction to Computer Science (CS1) in 2015,2016,2017,2018
  • Software systems and services in 2016,2017,2018