Mauricio Finavaro Aniche
113 records found
1
Authored
Renaming for Everyone
Language-parametric Renaming in Spoofax
A refactoring is a program transformation that improves the design of the source code, while preserving its behavior. Most modern IDEs offer a number of automated refactorings as editor services. The Rename refactoring is the most-commonly applied refactoring and is used to chang
...
Covert DNS Storage Channel Detection
Uncovering surreptitious data exchange using the phonebook of the internet
The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly capable cyber actors breach secure networks at a worrying scale. While network monitoring and analysis should identify blatant data exfiltration attempts, covert channels bypass thes
...
Perspective Discovery in Controversial Debates
An exploration of unsupervised topic models
Since the introduction of the Web, online platforms have become a place to share opinions across various domains (e.g., social media platforms, discussion fora or webshops). Consequently, many researchers have seen a need to classify, summarise or categorise these large sets of u
...
Customer Verification Engine
Automated Customer Verification for a Peer-to-Peer Lending Platform
There is a lot involved in providing a loan as a company, mostly in terms of legalities and risk management. As a lender it is important to have a clear record of the customers applying for a loan, as this helps assessing the risk that comes with providing a loan. Furthermore, it
...
Gamification of a Static Analysis Tool
A brief look into developer motivation
Software development is more than only implementing the functional code. A developer is also responsible for writing code measuring up to certain standards and conventions. These conventions make sure that the code is of a particular quality that improves readability and eases ma
...
Schaapi
Early detection of breaking changes based on API usage
Library developers are often unaware of how their library is used exactly in practice. When a library developer changes the internals of a library, this may unintentionally affect or even break the working of the library users' code. While it is possible to detect when a syntacti
...
Log Analysis from A to Z
A Literature Survey
Using logs to detect and diagnose problems in software systems is no longer a feasible human process. The ever increasing amount of logs produced by present-day systems calls for more advanced techniques to enable log analysis. A great deal of log research has since then been foc
...
Contributed
Renaming for Everyone
Language-parametric Renaming in Spoofax
A refactoring is a program transformation that improves the design of the source code, while preserving its behavior. Most modern IDEs offer a number of automated refactorings as editor services. The Rename refactoring is the most-commonly applied refactoring and is used to chang
...
Renaming for Everyone
Language-parametric Renaming in Spoofax
A refactoring is a program transformation that improves the design of the source code, while preserving its behavior. Most modern IDEs offer a number of automated refactorings as editor services. The Rename refactoring is the most-commonly applied refactoring and is used to chang
...
Covert DNS Storage Channel Detection
Uncovering surreptitious data exchange using the phonebook of the internet
The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly capable cyber actors breach secure networks at a worrying scale. While network monitoring and analysis should identify blatant data exfiltration attempts, covert channels bypass thes
...
Covert DNS Storage Channel Detection
Uncovering surreptitious data exchange using the phonebook of the internet
The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly capable cyber actors breach secure networks at a worrying scale. While network monitoring and analysis should identify blatant data exfiltration attempts, covert channels bypass thes
...
Perspective Discovery in Controversial Debates
An exploration of unsupervised topic models
Since the introduction of the Web, online platforms have become a place to share opinions across various domains (e.g., social media platforms, discussion fora or webshops). Consequently, many researchers have seen a need to classify, summarise or categorise these large sets of u
...
Perspective Discovery in Controversial Debates
An exploration of unsupervised topic models
Since the introduction of the Web, online platforms have become a place to share opinions across various domains (e.g., social media platforms, discussion fora or webshops). Consequently, many researchers have seen a need to classify, summarise or categorise these large sets of u
...
Customer Verification Engine
Automated Customer Verification for a Peer-to-Peer Lending Platform
There is a lot involved in providing a loan as a company, mostly in terms of legalities and risk management. As a lender it is important to have a clear record of the customers applying for a loan, as this helps assessing the risk that comes with providing a loan. Furthermore, it
...
Customer Verification Engine
Automated Customer Verification for a Peer-to-Peer Lending Platform
There is a lot involved in providing a loan as a company, mostly in terms of legalities and risk management. As a lender it is important to have a clear record of the customers applying for a loan, as this helps assessing the risk that comes with providing a loan. Furthermore, it
...
Gamification of a Static Analysis Tool
A brief look into developer motivation
Software development is more than only implementing the functional code. A developer is also responsible for writing code measuring up to certain standards and conventions. These conventions make sure that the code is of a particular quality that improves readability and eases ma
...
Gamification of a Static Analysis Tool
A brief look into developer motivation
Software development is more than only implementing the functional code. A developer is also responsible for writing code measuring up to certain standards and conventions. These conventions make sure that the code is of a particular quality that improves readability and eases ma
...
Schaapi
Early detection of breaking changes based on API usage
Library developers are often unaware of how their library is used exactly in practice. When a library developer changes the internals of a library, this may unintentionally affect or even break the working of the library users' code. While it is possible to detect when a syntacti
...
Schaapi
Early detection of breaking changes based on API usage
Library developers are often unaware of how their library is used exactly in practice. When a library developer changes the internals of a library, this may unintentionally affect or even break the working of the library users' code. While it is possible to detect when a syntacti
...
Log Analysis from A to Z
A Literature Survey
Using logs to detect and diagnose problems in software systems is no longer a feasible human process. The ever increasing amount of logs produced by present-day systems calls for more advanced techniques to enable log analysis. A great deal of log research has since then been foc
...