Angelo Messina

Angelo Messina
Defence & Security Software Engineers Association

Master of Engineering

About

25
Publications
7,722
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
154
Citations
Citations since 2017
16 Research Items
145 Citations
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030
20172018201920202021202220230102030
Introduction
Angelo Messina currently works at Defence & Security Software Engineers Association. One of the current projects is 'migrating to improved agile for mission critical applications (NATO NCIA) '. Currently emeritus professor at Innopolis University (Russian Federation).
Additional affiliations
February 2005 - February 2008
European Defense Agency, Bruxelles, Belgium
Position
  • Managing Director
Description
  • Supervisor and coordinator of a 150 MEuro portfolio R&T projects

Publications

Publications (25)
Chapter
Full-text available
Innopolis is a new IT city incorporating a technopark and a university, aiming at prioritizing the development of IT and software engineering in Tatarstan and in the Russian Federation. Innopolis University (IU) is a young university pioneering several research and pedagogical projects and experiments with innovative teaching methods and curricula....
Chapter
In the modern strategic scenarios, military operations are more and more complex, in particular when compliance with the so called “soft power” (DIME – Diplomatic, Information, Military and Economic) is required. Because of this, military doctrine and, in particular, the support at the Command and Control are obliged to a continuous evolution, tryi...
Chapter
Full-text available
The Theory of Affordances considers the interaction between the people and their environment based on their mental models of the environment. This study analyses a software development process on the theory of affordances. The LC2EVO software has been developed in Italy. There were two onsite team groups located five kilometers apart in separate bu...
Chapter
Full-text available
Terrorism has become one of the most tedious problems to deal with and a prominent threat to mankind. To enhance counter-terrorism, several research works are developing efficient and precise systems, data mining is not an exception. Immense data is floating in our lives, though the scarce availability of authentic terrorist attack data in the publ...
Book
SEDA 2018 was held at the premises of the Italian Defence General Secretariat (Segretariato Generale della Difesa) and the main military body actively supporting the conference was the Land Armament Directorate (Direzione Armamenti Terrestri). This is an important evolution of the Italian SEDA military community, as it shows that the interest for t...
Conference Paper
Full-text available
Terrorism has become one of the most tedious problems to deal with and a prominent threat to mankind. To enhance counter-terrorism, several research works are developing efficient and precise systems, data mining is not an exception. Immense data is floating in our lives, though the scarce availability of authentic terrorist attack data in the publ...
Preprint
Full-text available
Terrorism has become one of the most tedious problems to deal with and a prominent threat to mankind. To enhance counter-terrorism, several research works are developing efficient and precise systems, data mining is not an exception. Immense data is floating in our lives, though the scarce availability of authentic terrorist attack data in the publ...
Preprint
Full-text available
The Theory of Affordances considers the interaction between the people and their environment based on their mental models of the environment. This study analyses a software development process on the theory of affordances. The LC2EVO software has been developed in Italy. There were two onsite team groups located five kilometers apart in separate bu...
Conference Paper
Full-text available
Innopolis is a new IT city incorporating a technopark and a university, aiming at prioritizing the development of IT and software engineering in Tatarstan and in the Russian Federation. Innopolis University (IU) is a young university pioneering several research and peda-gogical projects and experiments with innovative teaching methods and curricula...
Chapter
Full-text available
This chapter explains how a mission critical Knowledge-Based System (KBS) has been designed and implemented within a real case study of a governamental organization. Moreover, the KBS has been developed using a novel agile software development methodology. Due to fast changing operational scenarios and volatile requirements, traditional procedural...
Cover Page
Full-text available
Software Engineering aims at modeling, managing and implementing software development products and processes in a structured and supportable way, these aspects in the Defense & Security compartment assume high level of importance/criticism, where are required high reliability/quality levels, not comparable with commercial standards. DSSEA , The Ita...
Conference Paper
Full-text available
Although Agile is a well established software development paradigm, major concerns arise when it comes to contracting issues between a software consumer and a software producer. How to contractualize the Agile production of software, especially for security & mission critical organizations, which typically outsource software projects, has been a ma...
Chapter
The United States Government has created the Open Government Innovations Gallery (US Government 2009a). President Obama has also launched the SAVE Award (for ideas to save taxpayer dollars and make government more effective and efficient) and has released A Strategy for American Innovation, committing to increasing the innovation capability of the...
Book
This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational...
Chapter
This chapter describes our experience of adopting agile project management in a software development project in the defense context. Adopting an agile approach for both software development and the management of the consequent project is becoming increasingly more relevant in many domains, and the defense domain is no exception. However, this relev...
Article
Full-text available
The Agile paradigm, as intended in the 2001 “Agile Manifesto,” brought a disruptive software development methodology. However, with regard to mission- and security-critical organizations, traditional Agile methodologies are quite ineffective because they do not clearly address issues of (1) quality and (2) security. Within the Italian Army General...
Conference Paper
The continuous evolution of the military “land operations ” generates instability of the Command & Control systems requirements obliging the developers to work with unstable and unconsolidated mission needs. In 2013, the Italian Army General Staff Logistic Department decided to overcome the problem of the “volatile requirement” transitioning to a c...
Conference Paper
Agile methods are now a mainstream production process and their proponents are no longer considered hackers or cowboy coders. Still, in embedded and safety critical domains there is somehow the expectation that the approach be "more" plan-based; at least, many of the current normatives seem to lean toward such approach. A definite change in attitud...
Chapter
Traditional defense acquisition frameworks are often too large, complex, and slow to acquire information technology (IT) capabilities effectively. Defense acquisition organizations for years have been concerned about the lengthy IT development timelines and given the pace of change in operations and technology, it is critical to look for new strate...
Chapter
Capturing the “user requirement” has always been the most critical phase in systems engineering. The problem becomes even more complicated in software engineering where uncertainty of the functions to implement and volatility of the user needs are the rule. In the past, this initial difficulty of the software production phase was tackled by the req...
Chapter
The application of the “Agile” methodology to a Military Application Software production line is not to be taken for granted. The adoption of the new production style has implied the solution of multiple problems and the generation of a custom version of the basic “Scrum” theory. One of the major changes has been imposed by the need to include Mili...
Book
This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational...
Conference Paper
Many software-related technologies, including software development methodologies, quality models, etc. have been developed due to the huge software needs of the Department of Defense (DoD) of the United States. Therefore, it is not surprising that the DoD is promoting open source software and agile approaches into the development processes of the d...

Network

Cited By

Projects

Projects (2)
Project
The objective of the project is to exploit all kinds of large data (Big Data) leveraging data science and machine learning techniques such as sentiment and text analysis, early detection of diseases, counter -terrorism, cross-language machine translation, etc.
Project
Supporting a pilot software development project implementing DSSEA iAgile methodology to define the all the major features of the agile team, the CASE tools and the life-cycle activity needed to support the NATO SW development innovative approach.