default search action
John M. Favaro
Person information
- affiliation: Intecs Sistemi S.p.A., Pisa, Italy
- affiliation: Consulenza Informatica, Pisa, Italy
- affiliation: University of California, Berkeley, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j17]Rafael Capilla, Barbara Gallina, Carlos Cetina, John M. Favaro:
Opportunities for software reuse in an uncertain world: From past to emerging trends. J. Softw. Evol. Process. 31(8) (2019) - 2017
- [j16]Kim Grüttner, Ralph Görgen, Sören Schreiner, Fernando Herrera, Pablo Peñil, Julio L. Medina, Eugenio Villar, Gianluca Palermo, William Fornaciari, Carlo Brandolese, Davide Gadioli, Emanuele Vitali, Davide Zoni, Sara Bocchio, Luca Ceva, Paolo Azzoni, Massimo Poncino, Sara Vinco, Enrico Macii, Salvatore Cusenza, John M. Favaro, Raúl Valencia, Ingo Sander, Kathrin Rosvall, Nima Khalilzad, Davide Quaglia:
CONTREX: Design of embedded mixed-criticality CONTRol systems under consideration of EXtra-functional properties. Microprocess. Microsystems 51: 39-55 (2017) - [j15]Xabier Larrucea, Annie Combelles, John M. Favaro, Kunal Taneja:
Software Engineering for the Internet of Things. IEEE Softw. 34(1): 24-28 (2017) - [j14]Christof Ebert, John M. Favaro:
Automotive Software. IEEE Softw. 34(3): 33-39 (2017) - 2016
- [c30]Ralph Görgen, Kim Grüttner, Fernando Herrera, Pablo Peñil, Julio L. Medina, Eugenio Villar, Gianluca Palermo, William Fornaciari, Carlo Brandolese, Davide Gadioli, Sara Bocchio, Luca Ceva, Paolo Azzoni, Massimo Poncino, Sara Vinco, Enrico Macii, Salvatore Cusenza, John M. Favaro, Raúl Valencia, Ingo Sander, Kathrin Rosvall, Davide Quaglia:
CONTREX: Design of Embedded Mixed-Criticality CONTRol Systems under Consideration of EXtra-Functional Properties. DSD 2016: 286-293 - [c29]Silvia Mazzini, John M. Favaro, Stefano Puri, Laura Baracchi:
CHESS: an Open Source Methodology and Toolset for the Development of Critical Systems. EduSymp/OSS4MDE@MoDELS 2016: 59-66 - 2015
- [c28]John M. Favaro:
Strategic research challenges in the Internet of Things. RCIS 2015: 1 - 2014
- [c27]John M. Favaro:
Knowledge Reuse in Innovation. IC3K (Selected Papers) 2014: 444-456 - [c26]John M. Favaro:
Only the New? Knowledge Reuse in Innovation. SKY 2014: it-3 - [c25]Laurent Rioux, John M. Favaro:
1st International Workshop on the Integration of Safety and Security Engineering (ISSE '14). SAFECOMP Workshops 2014: 267-268 - [p2]John M. Favaro:
Agile. Computing Handbook, 3rd ed. (1) 2014: 84: 1-28 - 2013
- [j13]Xabier Larrucea, Annie Combelles, John M. Favaro:
Safety-Critical Software [Guest editors' introduction]. IEEE Softw. 30(3): 25-27 (2013) - [c24]Silvia Mazzini, John M. Favaro, Tullio Vardanega:
Cross-Domain Reuse: Lessons Learned in a Multi-project Trajectory. ICSR 2013: 113-126 - [c23]Yaping Luo, Mark van den Brand, Luc Engelen, John M. Favaro, Martijn Klabbers, Giovanni Sartori:
Extracting Models from ISO 26262 for Reusable Safety Assurance. ICSR 2013: 192-207 - [e1]John M. Favaro, Maurizio Morisio:
Safe and Secure Software Reuse - 13th International Conference on Software Reuse, ICSR 2013, Pisa, Italy, June 18-20. Proceedings. Lecture Notes in Computer Science 7925, Springer 2013, ISBN 978-3-642-38976-4 [contents] - 2012
- [j12]Giuseppe Prencipe, Cesare Zavattari, Alessandro Tommasi, John M. Favaro:
Guest Editors' Introduction: Algorithms and Today's Practitioner. IEEE Softw. 29(1): 61-63 (2012) - [j11]John M. Favaro:
Excellence in Search: An Interview with David Chaiken. IEEE Softw. 29(1): 84-86 (2012) - 2011
- [j10]John M. Favaro, Shari Lawrence Pfleeger:
Guest Editors' Introduction: Software as a Business. IEEE Softw. 28(4): 22-25 (2011) - [c22]William B. Frakes, John M. Favaro:
The 5th International Workshop on Software Reuse and Safety. ICSR 2011: 242 - [c21]William B. Frakes, John M. Favaro:
Software Reuse and Safety. ICSR 2011: 246 - 2010
- [j9]John M. Favaro:
Guest Editor's Introduction: Renewing the Software Project Management Life Cycle. IEEE Softw. 27(1): 17-19 (2010) - [c20]Marc Born, John M. Favaro, Olaf Kath:
Application of ISO DIS 26262 in practice. EDCC-CARS 2010: 3-6
2000 – 2009
- 2009
- [c19]John M. Favaro, Silvia Mazzini:
Extending FeatuRSEB with Concepts from Systems Engineering. ICSR 2009: 41-50 - 2006
- [c18]Ludger van Elst, Bertin Klein, Heiko Maus, Harald Schöning, Alessandro Tommasi, Cesare Zavattari, John M. Favaro, Vito Giannella:
Business Register Interoperability throughout Europe: The BRITE Project. AAAI Spring Symposium: Semantic Web Meets eGovernment 2006: 70-79 - [c17]Bill Frakes, John M. Favaro:
Metrics and Strategy for Reuse Planning and Management. ICSR 2006: 437 - [p1]Hakan Erdogmus, John M. Favaro, Michael Halling:
Valuation of Software Initiatives Under Uncertainty: Concepts, Issues, and Techniques. Value-Based Software Engineering 2006: 39-66 - 2005
- [c16]John M. Favaro:
That Elusive Business Value: Some Lessons from the Top. XP 2005: 199 - 2004
- [j8]Hakan Erdogmus, John M. Favaro, Wolfgang Strigel:
Guest Editors' Introduction: Return on Investment. IEEE Softw. 21(3): 18-22 (2004) - [c15]John M. Favaro:
Efficient Markets, Efficient Projects, and Predicting the Future. XP 2004: 77-84 - 2003
- [c14]John M. Favaro:
Value Based Management and Agile Methods. XP 2003: 16-25 - 2002
- [j7]John M. Favaro:
Managing Requirements for Business Value. IEEE Softw. 19(2): 15-17 (2002) - [c13]John M. Favaro, M. Hakan Erdogmus, Klaus Schmid:
International Workshop on Reuse Economics. ICSR 2002: 330
1990 – 1999
- 1999
- [c12]Kevin J. Sullivan, David Notkin, Alfonso Fuggetta, John M. Favaro:
First Workshop on Economics-Driven Software Engineering Research. ICSE 1999: 699-700 - [c11]Gilda Pour, Martin L. Griss, John M. Favaro:
Making the Transition to Component-Based Enterprise Software Development: Overcoming the Obstacles 3/4 Patterns for Success. TOOLS (29) 1999: 419 - [c10]Martin L. Griss, Gilda Pour, John M. Favaro:
Making the Transition to Component-Based Enterprise Software Development Overcoming the Obstacles - Patterns for Success. TOOLS (30) 1999: 527-531 - 1998
- [j6]John M. Favaro, Kenneth R. Favaro, Paul F. Favaro:
Value Based Software Reuse Investment. Ann. Softw. Eng. 5: 5-52 (1998) - [j5]John M. Favaro, Shari Lawrence Pfleeger:
Making software development investment decisions. ACM SIGSOFT Softw. Eng. Notes 23(5): 69-74 (1998) - [c9]Marco Battaglia, Giancarlo Savoia, John M. Favaro:
RENAISSANCE: A Method to Migrate from Legacy to Immortal Software Systems. CSMR 1998: 197-200 - [c8]Martin L. Griss, John M. Favaro, Massimo D'Alessandro:
Integrating feature modeling with the RSEB. ICSR 1998: 76-85 - [c7]Alessandro Dionisi Vici, Nicola Argentieri, Azza Mansour, Massimo D'Alessandro, John M. Favaro:
FODAcom: an experience with domain analysis in the Italian telecom industry. ICSR 1998: 166-175 - [c6]John M. Favaro:
The Global Software Engineering Community. ICSR 1998: 360-361 - 1997
- [j4]John M. Favaro:
Standardizing production of domain components. ACM Stand. 5(2): 66-69 (1997) - 1996
- [j3]John M. Favaro:
On the scalability problem in COTS-based programming environments. ACM SIGSOFT Softw. Eng. Notes 21(5): 43-46 (1996) - [j2]John M. Favaro:
When the Pursuit of Quality Destroys Value. IEEE Softw. 13(3): 93-95 (1996) - [c5]John M. Favaro:
A comparison of approaches to reuse investment analysis. ICSR 1996: 136-145 - 1994
- [j1]John M. Favaro, Yves Coene, Marco Casucci:
The European Space Software Development Environment Reference Facility Project: a status report. ACM SIGSOFT Softw. Eng. Notes 19(2): 68-71 (1994) - [c4]John M. Favaro:
Future directions for reuse in Europe. ICSR 1994: 221-222 - 1992
- [c3]John M. Favaro:
Process Modelling at the European Space Agency. EWSPT 1992: 159-162 - 1990
- [c2]John M. Favaro:
What price reusability?: a case study. SETA 1990: 115-124
1970 – 1979
- 1979
- [c1]C. V. Ramamoorthy, Farokh B. Bastani, John M. Favaro, Yu-King R. Mok, C. W. Nam, Keiichi Suzuki:
On A Systematic Approach to the Development and Validation of Critical Software for Nuclear Power Plants. ICSE 1979: 231-240
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint