IoT systems complexity and susceptibility to failures pose significant
c...
One of the main problems in applying deep learning techniques to recogni...
Runtime enforcers can be used to ensure that running applications satisf...
The Android framework provides a rich set of APIs that can be exploited ...
Several techniques have been proposed to address the problem of recogniz...
Automated Program Repair (APR) techniques typically exploit spectrum-bas...
Mobile operating systems evolve quickly, frequently updating the APIs th...
Android apps must work correctly even if their execution is interrupted ...
Software enforcers can be used to modify the runtime behavior of softwar...
In the recent years there has been a growing interest in techniques able...
Collecting traces from software running in the field is both useful and
...
Collecting data about the sequences of function calls executed by an
app...
Dealing with the evolution of operating systems is challenging for devel...
Android applications are executed on smartphones equipped with a variety...
Human activity recognition (HAR) is a very active research field. Recent...
Android apps must be able to deal with both stop events, which require
i...
Runtime enforcement can be effectively used to improve the reliability o...
The rise in life expectancy is one of the great achievements of the twen...
Field data is an invaluable source of information for testers and develo...
Source Code Management (SCM) systems support software evolution by provi...
Policy enforcers are sophisticated runtime components that can prevent
f...
Smartphones, smartwatches, fitness trackers, and ad-hoc wearable devices...