This paper proposes a cloud computing multi-tenancy architecture to support cross-organisational process executions and to improve resource management distribution. Moreover, the approach supports the systematic extraction/composition of distributed data from the system event logs that are assumed to carry information of each process variant. To this aim, the approach also integrates an online process mining technique for the runtime extraction of business rules from event logs. Declarative processes are used to represent process variants running on the analysed infrastructure as they are particularly suited to represent the business process in a context characterised by low predictability and high variability. In this work, we also present a case study where the proposed architecture is implemented and applied to the execution of a real-life process of online products selling.
Mario Luca Bernardi, Marta Cimitile, Francesco Mercaldo
In Journal of Information & Knowledge Management, World Scientific.,
2018
In this work, a set of behavioral features extracted by a car monitoring system is proposed to realize driver identification and path kind identification and to evaluate driver’s familiarity with a given vehicle. The proposed feature model is exploited using a time-series classification approach based on a multilayer perceptron (MLP) network. The validation has been performed on a real dataset composed of totally 292 driving sessions and shows that the proposed features have a very good driver and path identification and profiling ability.
Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, Francesco Mercaldo
In Journal of Advanced Transportation, Wiley-Hindawi.,
2018
This paper aims at investigating the relation between the bug inducing and fixing phenomenon and the lack of written communication between committers in open source projects.We performed an empirical study that involved four open source projects, namely Apache httpd, GNU GCC, Mozilla Firefox, and Xorg Xserver. For each project change history data, issue tracker comments, mailing list messages, and chat logs were analyzed in order to answer four research questions about the relation between the social importance and communication level of committers and their proneness to induce bug fixes. Results indicate that the majority of bugs are fixed by committers who did not induce them, a smaller but substantial percentage of bugs is fixed by committers that induced them, and very few bugs are fixed by committers that were not directly involved in previous changes on the same files of the fix.
Bernardi, M.L., Canfora, G., Di Lucca, G.A., Di Penta, M., Distante, D.
In Journal of Systems and Software,
2018
This paper investigates how the existing techniques for the discovery of declarative process models can be adapted when the business process under analysis contains non-atomic activities. In particular, we base our proposed approach on the use of discriminative rule mining to determine how the characteristics of the activity lifecycles in a business process influence the validity of a business rule in that process. The approach has been implemented as a plug-in of the process mining tool ProM and validated on synthetic logs and on a real-life log recorded by an incident and problem management system called VINST in use at Volvo IT Belgium.
Mario Luca Bernardi, Marta Cimitile, Chiara Di Francescomarino, Fabrizio Maria Maggi
In Information Systems, Elsevier.,
2016
This paper proposes an approach to identify and analyse the components implementing the static and dynamic crosscutting in OO systems. The approach defines a meta‐model representing the structure of an OO system in terms of its components. A static analysis of an OO software system is performed to create an instance of this meta‐model. Such meta‐model is finally analysed to find static and dynamic crosscutting among concerns. The effectiveness and efficiency of the proposed approach have been validated in an empirical assessment where it was applied to some OO java systems. The obtained results show a good level of effectiveness for the crosscutting analysis.
Bernardi, M.L., Cimitile, M., Di Lucca, G.
In Journal of Software: Evolution and Process,
2016
In the proposed approach, DPs are modeled based on their high-level structural properties (e.g., inheritance, dependency, invocation, delegation, type nesting, and membership relationships) that are checked, by source code parsing, against the system structure and components. Moreover, the approach can also detect pattern variants, defined by overriding the pattern properties. This paper presents a description of the approach, provides a brief description of the supporting tool, and discusses the results from the experiments carried out to validate it. The approach was validated on seven systems of an open benchmark that contains systems of increasing sizes. For five additional systems, the results have been compared with the ones from a similar approach existing in the literature. The obtained results, the identified DP variants, and the effectiveness of the approach are thoroughly presented and discussed.
Bernardi, M.L., Cimitile, M., Di Lucca, G.
In Journal of Software Evolution and Process, Wiley,
2014
A mobile visual clothing search system is presented whereby a smart phone user can either choose a social networking image or capture a new photo of a person wearing clothing of interest and search for similar clothing in a large cloud-based ecommerce database. The phone’s GPS location is used to re-rank results by retail store location, to inform the user of local stores where similar clothing items can be tried on.
Mario Luca Bernardi, Marta Cimitile, Damiano Distante
In Journal of Software Evolution and Process, Wiley.,
2012
An Aspect-Oriented Programming-based approach to the development of software components for fault detection in automatic measurement systems is proposed. Faults are handled by means of specific software units, the “aspects”, in order to better modularize issues transversal to several components.
Pasquale Arpaia, Mario Luca Bernardi, Giuseppe Di Lucca, Vitaliano Inglese, Giovanni Spiezia
In Computer Standards & Interfaces, Elsevier.,
2009
This paper presents a reverse engineering approach for Web Applications enabling the semi-automatic recovery of user-centered conceptual models describing, from a user perspective, key aspects, such as the delivered contents and navigational paths. The abstracted models are formalized according to the Ubiquitous Web Applications (UWA) design methodology, but any other design method for Web Applications could be used instead. The paper describes the recovery process, a tool developed to support the process, and the results from a case study conducted to validate the approach on a set of real world Web Applications.
Mario Luca Bernardi, Giuseppe Antonio Di Lucca, Damiano Distante
In International Journal on Software Tools for Technology Transfer, Springer.,
2009