Antonio Vetro'

Antonio Vetro'
Politecnico di Torino | polito · DAUIN - Department of Control and Computer Engineering

PhD
You can get my publications at https://avetro.polito.it/publications.html . I am not active anymore on RG.

About

82
Publications
48,376
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,222
Citations
Introduction
I am an empiricist, studying the use and impact of technology on our lifes. My fields of applications are mainly two: software engineering and internet science, with a recent shift towards the second one. Concerning software engineering, my main focus has been on software quality improvement and on how to successfully transfer technological innovations into industrial settings. Regarding internet science, I've worked so far on Open (Linked) Data.
Additional affiliations
April 2013 - June 2013
Turin Polytechnic University in Tashkent
Position
  • Professor (Associate)
Description
  • Database Object Oriented Programming
April 2011 - December 2011
Fraunhofer Center for Experimental Software Engineering
Fraunhofer Center for Experimental Software Engineering
Position
  • Junior scientist
Description
  • Identification and management of Technical Debt
January 2010 - December 2012
Politecnico di Torino
Position
  • PhD Student
Description
  • Empirical assessment of the impact of static analysis on software quality

Publications

Publications (82)
Article
Data has become a fundamental element of the management and productive infrastructures of our society, fuelling digitization of organizational and decision-making processes at an impressive speed. This transition shows lights and shadows, and the “bias in-bias out” problem is one of the most relevant issues, which encompasses technical, ethical, an...
Article
Full-text available
Knowledge Graphs (KGs) have emerged as a core technology for incorporating human knowledge because of their capability to capture the relational dimension of information and of its semantic properties. The nature of KGs meets one of the vocational pursuits of academic institutions, which is sharing their intellectual output, especially publications...
Article
Automated decision-making (ADM) systems may affect multiple aspects of our lives. In particular, they can result in systematic discrimination of specific population groups, in violation of the EU Charter of Fundamental Rights. One of the potential causes of discriminative behavior, i.e., unfairness, lies in the quality of the data used to train suc...
Article
Payment-channel networks are one of the most promising solution to the well-known issue of blockchain scalability. In this work we present CLoTH, a simulator of the Lightning Network — the mainstream payment-channel network, used in Bitcoin. CLoTH simulates the execution of payments in a payment-channel network and produces performance measures suc...
Chapter
In this work, we define a Fair-Distributive ranking system based on Equality of Opportunity theory and fair division models. The aim is to determine the ranking order of a set of candidates maximizing utility bound to a fairness constraint. Our model extends the notion of protected attributes to a pool of individual’s circumstances, which determine...
Preprint
Thanks to the increasing growth of computational power and data availability, the research in machine learning has advanced with tremendous rapidity. Nowadays, the majority of automatic decision making systems are based on data. However, it is well known that machine learning systems can present problematic results if they are built on partial or i...
Chapter
Our daily life is profoundly affected by the adoption of automated decision making (ADM) systems due to the ongoing tendency of humans to delegate machines to take decisions. The unleashed usage of ADM systems was facilitated by the availability of large-scale data, alongside with the deployment of devices and equipment. This trend resulted in an i...
Article
Full-text available
SeMi (SEmantic Modeling machIne) is a tool to semi-automatically build large-scale Knowledge Graphs from structured sources such as CSV, JSON, and XML files. To achieve such a goal, SeMi builds the semantic models of the data sources, in terms of concepts and relations within a domain ontology. Most of the research contributions on automatic semant...
Article
Full-text available
Deep learning models contributed to reaching unprecedented results in prediction and classification tasks of Artificial Intelligence (AI) systems. However, alongside this notable progress, they do not provide human-understandable insights on how a specific result was achieved. In contexts where the impact of AI on human life is relevant (e.g., recr...
Article
Full-text available
Payment channel networks are the most developed proposal to address the well-known issue of blockchain scalability. Currently, the Lightning Network (LN) is the mainstream and most used payment channel network. In a previous work we introduced CLoTH, a payment channel network simulator we developed to analyze capabilities and limitations of such ne...
Article
Full-text available
The technical debt (TD) concept inspires the development of useful methods and tools that support TD identification and management. However, there is a lack of evidence on how different TD identification tools could be complementary and, also, how human-based identification compares with them. To understand how to effectively elicit TD from humans,...
Article
Background: Effort estimations are critical tasks greatly influencing the accomplishment of software projects. Despite their recognized relevance, little is yet known what indicators for inaccurate estimations exist, and which are the reasons of inaccurate estimations. Aims: In this manuscript, we aim at contributing to this existing gap. To this e...
Chapter
Full-text available
Many machine learning systems make extensive use of large amounts of data regarding human behaviors. Several researchers have found various discriminatory practices related to the use of human-related machine learning systems, for example in the field of criminal justice, credit scoring and advertising. Fair machine learning is therefore emerging a...
Preprint
Full-text available
Many machine learning systems make extensive use of large amounts of data regarding human behaviors. Several researchers have found various discriminatory practices related to the use of human-related machine learning systems, for example in the field of criminal justice, credit scoring and advertising. Fair machine learning is therefore emerging a...
Article
Full-text available
Purpose This paper aims to analyze the limitations of the mainstream definition of artificial intelligence (AI) as a rational agent, which currently drives the development of most AI systems. The authors advocate the need of a wider range of driving ethical principles for designing more socially responsible AI agents. Design/methodology/approach...
Article
Full-text available
Context: Requirements Engineering (RE) has established itself as a software engineering discipline over the past decades. While researchers have been investigating the RE discipline with a plethora of empirical studies, attempts to systematically derive an empirical theory in context of the RE discipline have just recently been started. However, su...
Chapter
Full-text available
Many software systems today make use of large amount of personal data to make recommendations or decisions that affect our daily lives. These software systems generally operate without guarantees of non-discriminatory practices, as instead often required to human decision-makers, and therefore are attracting increasing scrutiny. Our research is foc...
Preprint
Full-text available
The Lightning Network (LN) is one of the most promising off-chain scaling solutions for Bitcoin, as it enables off-chain payments which are not subject to the well-known blockchain scalability limit. In this work, we introduce CLoTH, a simulator for HTLC payment networks, of which LN is the best working example. It simulates input-defined payments...
Article
Full-text available
We apply a mixed research method to improve the user stories estimation process in a German company following agile software development. We combine software project data analytics with elicitation of teams’ feedback, identify root causes for wrong estimates and propose an improved version of the estimation process. Three major changes are adopted...
Article
Full-text available
The Lightning Network (LN) is one of the most promising off-chain scaling solutions for Bitcoin, as it enables off-chain payments which are not subject to the well-known blockchain scalability limit. In this work, we introduce CLoTH, a simulator for HTLC payment networks (of which LN is the best working example). It simulates input-defined payments...
Preprint
Full-text available
Requirements Engineering (RE) has established itself as a software engineering discipline during the past decades. While researchers have been investigating the RE discipline with a plethora of empirical studies, attempts to systematically derive an empirically-based theory in context of the RE discipline have just recently been started. However, s...
Article
Full-text available
Knowledge graphs are labeled and directed multi-graphs that encode information in the form of entities and relationships. They are gaining attention in different areas of computer science: from the improvement of search engines to the development of virtual personal assistants. Currently, an open challenge in building large-scale knowledge graphs f...
Research
Full-text available
The course “Open Education: fundamentals and approaches”, produced within the OpenMed Project, aims to build capacity on Open Education and Open Educational Resources (OER) among universities in the South Mediterranean region, with a particular focus on higher education in Egypt, Jordan, Morocco and Palestine. The training course targets primarily...
Conference Paper
Full-text available
Public Procurement (PP) information, made available as Open Government Data (OGD), leads to tangible benefits to identify government spending for goods and services. Nevertheless, making data freely available is a necessary, but not sufficient condition for improving transparency. Fragmentation of OGD due to diverse processes adopted by different a...
Article
Full-text available
A Systematic Literature Review (SLR) identifies, evaluates, and synthesizes the literature available for a given topic. This generally requires a significant human workload and has subjectivity bias that could affect the results of such a review. Automated document classification can be a valuable tool for recommending the selection of studies. In...
Chapter
In software engineering, transferring innovative concepts, techniques and methods into the practice of existing organizations is an expensive and complex task. This chapter gives an overview on the transfer of the SPES XT modeling framework to different organization.
Book
Full-text available
This compendium was created by partners on the OpenMed project and edited by staff at the Disruptive Media Learning Lab at Coventry University, UK, with significant contributions made by expert interviewees in international open education. It is aimed at: (a) Higher education practitioners with involvement or interest in open educational resources...
Conference Paper
Full-text available
In the Internet of Things (IoT) scenario, the block-chain and, in general, Peer-to-Peer approaches could play an important role in the development of decentralized and data-intensive applications running on billion of devices, preserving the privacy of the users. Our research goal is to understand whether the blockchain and Peer-to-Peer approaches...
Article
Full-text available
Requirements Engineering (RE) has received much attention in research and practice due to its importance to software project success. Its inter-disciplinary nature, the dependency to the customer, and its inherent uncertainty still render the discipline dicult to investigate. This results in a lack of empirical data. These are necessary, however, t...
Article
Objective: Adherence to tyrosine kinase inhibitor treatment is a significant factor in the achievement of a good clinical response in chronic myeloid leukemia (CML). The aim of this retrospective study is to investigate 1- and 2-year medication adherence to imatinib treatment, linking adherence rates with the clinical outcome, in accordance with E...
Article
Context Reuse can improve productivity and maintainability in software development. Research has proposed a wide range of methods and techniques. Are these successfully adopted in practice? Objective We propose a preliminary answer by integrating two in-depth empirical studies on software reuse at two large software-producing companies. Method We c...
Article
Full-text available
The diffusion of Open Government Data (OGD) in recent years kept a very fast pace. However, evidence from practitioners shows that disclosing data without proper quality control may jeopardize dataset reuse and negatively affect civic participation. Current approaches to the problem in literature lack a comprehensive theoretical framework. Moreover...
Conference Paper
Full-text available
Background: Successful transfer of the results of research projects into practice is of great interest to all project participants. It can be assumed that different transfer mediums fulfill technology transfer (TT) with different levels of success and that they are impaired by different kinds of barriers. Objective: The goal of this study is to gai...
Conference Paper
Full-text available
Context: Applying model driven techniques can lead to several benefits, but their adoption entails also numerous issues. Goal: We aim at understanding the benefits and barriers on the adoption of the modelling techniques for embedded systems developed in a large German research project. Method: We replicate a survey conducted in the Italian industr...
Conference Paper
Full-text available
Background: Technology transfer is one key to the success of research projects, especially in Software Engineering, where the (practical) impact of the outcome may depend not only on the reliability and feasibility of technologies, but also on their applicability to industrial settings. However, there is limited knowledge on the current state of pr...
Conference Paper
Full-text available
Background/Context: Gathering empirical knowledge is a time consuming task and the results from empirical studies often are soon outdated by new technological solutions. As a result, the impact of empirical results on software engineering practice is often not guaranteed. Objective/Aim: In this paper, we summarize the ongoing discussion on "Empiric...
Conference Paper
Full-text available
Abstract---Software energy efficiency is a research topic where experimentation is widely adopted. Nevertheless, current studies and research approaches struggle to find generalizable findings that can be used to build a consistent knowledge base for energyefficient software. To this end, we will discuss how to combine the traditional hypothesis-dr...
Article
Full-text available
The energy efficiency of IT has become one of the hottest topics in the last few years. The problem has been typically addressed by hardware manufacturers and designers, but recently the attention of industry and academia has shifted to the role of software for IT sustainability. Writing energy-efficient software is one of the most challenging issu...
Conference Paper
Full-text available
Context: The requirements specification is a central arte-fact in the software engineering (SE) process, and its quality (might) influence downstream activities like implementation or testing. One quality defect that is often mentioned in standards is the use of passive voice. However, the con-sequences of this defect are still unclear. Goal: We ne...
Conference Paper
Full-text available
Background: Particularly during and after research projects, technology transfer into practice plays an important role for academia to get technologies into use and for industry to improve their development. Objective: Our goal was to gain more and current knowledge about how technology transfer from software engineering (SE) research into industri...
Data
We publish our taxonomy of technology transfer mediums, associated to the paper "Bridging the Gap: SE Technology Transfer into Practice - Study Design and Preliminary Results" , Philipp Diebold and Antonio Vetro'. Please see readme inside the zip file and related article for details . A description of the way the classification was done is availabl...
Data
This data is about the open source project Hadoop. Data was used for the study "Comparing Four Different Approaches for Technical Debt Identification", that can be downloaded at http://porto.polito.it/2506360/ . We collected, for each file, FindBugs issues, code smells, modularity violations and grime data over 13 versions of Hadoop, and correlate...
Conference Paper
Full-text available
Context OpenCoesione is the first portal about the fulfilment of investments and projects planned by the Italian central government and by the Italian Regions using the 2007­2013 European Cohesion funds. Together with Monithon, it is a “transparency tool” whose aim is to foster participation of the citizens and efficiency of the public sector b...
Conference Paper
Full-text available
Context: For many years, researchers and practitioners have been proposing various methods and approaches to Requirements Engineering (RE). Those contributions remain, however, too often on the level of apodictic discussions without having proper knowledge about the practical problems they propagate to address, or how to measure the success of the...
Book
Automatic static analysis (ASA) tools analyze the source or compiled code of a software system looking for violations of recommended programming practices (called issues) that might either cause failures or degrade some dimensions of software quality. Dr. Antonio Vetrò, under the supervision of Prof. Dr. Maurizio Morisio and Prof. Dr. Marco Torchia...
Article
Full-text available
Predicting residual defects (i.e. remaining defects or failures) in Open Source Software (OSS) may help in decision making about their adoption. Several methods exist for predicting residual defects in software. A widely used method is Software reliability growth models (SRGMs). SRGMs have underlying assumptions, which are often violated in practic...
Article
Full-text available
Context The diffusion of Linked Data and Open Data in recent years kept a very fast pace. However evidence from practitioners shows that disclosing data without proper quality control may jeopardize datasets reuse in terms of apps, linking, and other transformations. Objective Our goals are to understand practical problems experienced by open data...
Conference Paper
Full-text available
Context: the presence of several languages interacting each other within the same project is an almost universal feature in software development. Earlier work shows that this interaction might be source of problems. Objective: we aim at identifying and characterizing the cross-language interactions at semantic level. Method: we took the commits of...
Article
Full-text available
Background: Software systems accumulate technical debt (TD) when short-term goals in software development are traded for long term goals (e.g., quick-and-dirty implementation to reach a release date vs. a well-refactored implementation that supports the long term health of the project). Some forms of TD accumulate over time in the form of source co...
Conference Paper
Full-text available
We identified and organized a number of statements about technical debt (TD Folklore list) expressed by practitioners in online websites, blogs and published papers. We chose 14 statements and we evaluated them through two surveys (37 practitioners answered the questionnaires), ranking them by agreement and consensus. The statements most agreed wit...
Conference Paper
Full-text available
The interactions of several languages within a software system pose a number of problems. There is several anecdotal and empirical evidence supporting such concerns. This paper presents a solution to achieve proper language integration in the context of language workbenches and with limited effort. A simple example is presented to show how cross-la...
Conference Paper
Full-text available
Context: The technical debt (TD) concept describes a tradeoff between short-term and long-term goals in software development. While it is highly useful as a metaphor, it has utility beyond the facilitation of discussion, to inspire a useful set of methods and tools that support the identification, measurement, monitoring, management, and payment of...
Conference Paper
Full-text available
Optimizing software in terms of energy efficiency is one of the challenges that both research and industry will have to face in the next few years.We consider energy efficiency as a software product quality characteristic, to be improved through the refactoring of appropriate code pattern: the aim of this work is identifying those code patterns, he...
Conference Paper
Full-text available
Energy Efficiency is becoming a key factor in software development, given the sharp growth of IT systems and their impact on worldwide energy consumption. We do believe that a quality process infrastructure should be able to consider the Energy Efficiency of a system since its early development: for this reason we propose to introduce Energy Effici...
Conference Paper
Full-text available
The purpose of this study is to compare the fitting (goodness of fit) and prediction capability of eight Software Reliability Growth Models (SRGM) using fifty different failure Data sets. These data sets contain defect data collected from system test phase, operational phase (field defects) and Open Source Software (OSS) projects. The failure data...
Article
Full-text available
We analyzed the software testing approach Exploratory Testing (ET) through a systematic review of literature to understand the consequences of ET as Technical debt. The evidence shows that ET is used as an alternative to any structured software testing approach to speed up the testing tasks and proved to be cost effective at the time of testing. Ne...
Conference Paper
Full-text available
Background: Automatic static analysis (ASA) tools examine source code to discover "issues", i.e. code patterns that are symptoms of bad programming practices and that can lead to defective behavior. Studies in the literature have shown that these tools find defects earlier than other verification activities, but they produce a substantial number of...