M
Marta Cimitile
Researcher at Sapienza University of Rome
Publications - 118
Citations - 1167
Marta Cimitile is an academic researcher from Sapienza University of Rome. The author has contributed to research in topics: Computer science & Process mining. The author has an hindex of 15, co-authored 97 publications receiving 745 citations. Previous affiliations of Marta Cimitile include University of Bari & University of Sannio.
Papers
More filters
Journal ArticleDOI
Online Discovery of Declarative Process Models from Event Streams
TL;DR: This paper presents a novel framework for the discovery of LTL-based declarative process models from streaming event data in settings where it is impossible to store all events over an extended period of time or where processes evolve while being analyzed.
Journal ArticleDOI
How changes affect software entropy: an empirical study
TL;DR: The results indicate that the nature of changes (in particular changes related to refactorings), the software design, and the number of active developers are factors related to change entropy.
Book ChapterDOI
Online Process Discovery to Detect Concept Drifts in LTL-Based Declarative Process Models
TL;DR: This paper presents a novel framework for the discovery of LTL-based declarative process models from streaming event data in settings where it is impossible to store all events over an extended period or where processes evolve while being analyzed.
Proceedings ArticleDOI
Social interactions around cross-system bug fixings: the case of FreeBSD and OpenBSD
TL;DR: The study shows that the phenomenon of cross-system bug fixing between these two projects occurs often, despite the limited overlap of contributors, and shows that cross- system bug fixings mainly involve contributors with the highest degree, betweenness and brokerage level, as well as contributors that change the source code more than others.
Journal ArticleDOI
A systematic review on Deep Learning approaches for IoT security
TL;DR: This work aims at systematically reviewing and analyzing the research landscape about DL approaches applied to different IoT security scenarios and characterized these studies according to three main research questions, namely, the involved security aspects, the used DL network architectures, and the engaged datasets.