scispace - formally typeset
M

Marta Cimitile

Researcher at Sapienza University of Rome

Publications -  118
Citations -  1167

Marta Cimitile is an academic researcher from Sapienza University of Rome. The author has contributed to research in topics: Computer science & Process mining. The author has an hindex of 15, co-authored 97 publications receiving 745 citations. Previous affiliations of Marta Cimitile include University of Bari & University of Sannio.

Papers
More filters
Journal ArticleDOI

Online Discovery of Declarative Process Models from Event Streams

TL;DR: This paper presents a novel framework for the discovery of LTL-based declarative process models from streaming event data in settings where it is impossible to store all events over an extended period of time or where processes evolve while being analyzed.
Journal ArticleDOI

How changes affect software entropy: an empirical study

TL;DR: The results indicate that the nature of changes (in particular changes related to refactorings), the software design, and the number of active developers are factors related to change entropy.
Book ChapterDOI

Online Process Discovery to Detect Concept Drifts in LTL-Based Declarative Process Models

TL;DR: This paper presents a novel framework for the discovery of LTL-based declarative process models from streaming event data in settings where it is impossible to store all events over an extended period or where processes evolve while being analyzed.
Proceedings ArticleDOI

Social interactions around cross-system bug fixings: the case of FreeBSD and OpenBSD

TL;DR: The study shows that the phenomenon of cross-system bug fixing between these two projects occurs often, despite the limited overlap of contributors, and shows that cross- system bug fixings mainly involve contributors with the highest degree, betweenness and brokerage level, as well as contributors that change the source code more than others.
Journal ArticleDOI

A systematic review on Deep Learning approaches for IoT security

TL;DR: This work aims at systematically reviewing and analyzing the research landscape about DL approaches applied to different IoT security scenarios and characterized these studies according to three main research questions, namely, the involved security aspects, the used DL network architectures, and the engaged datasets.