Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Thomas R. Dean
@article{DBLP:journals/corr/abs-2301-00835, author = {Jian Chen and Manar H. Alalfi and Thomas R. Dean}, title = {Timed Model-Based Mutation Operators for Simulink Models}, journal = {CoRR}, volume = {abs/2301.00835}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.00835}, doi = {10.48550/ARXIV.2301.00835}, eprinttype = {arXiv}, eprint = {2301.00835}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-00835.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14974, author = {Jian Chen and Manar H. Alalfi and Thomas R. Dean and Ramesh S}, title = {SimSched: {A} tool for Simulating Autosar Implementaion in Simulink}, journal = {CoRR}, volume = {abs/2308.14974}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14974}, doi = {10.48550/ARXIV.2308.14974}, eprinttype = {arXiv}, eprint = {2308.14974}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/DeanCGG20, author = {Thomas R. Dean and Mainak Chowdhury and Nicole Grimwood and Andrea J. Goldsmith}, title = {Rethinking Modulation and Detection for High Doppler Channels}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {19}, number = {6}, pages = {3629--3642}, year = {2020}, url = {https://doi.org/10.1109/TWC.2020.2967039}, doi = {10.1109/TWC.2020.2967039}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/DeanCGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/BabarIDF20, author = {Ayesha Babar and Fahim T. Imam and Thomas R. Dean and Jose Fernandez}, editor = {Lily Shaddick and Guy{-}Vincent Jourdan and Vio Onut and Tinny Ng}, title = {An approach to represent and transform application-specific constraints for an intrusion detection system}, booktitle = {{CASCON} '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 10 - 13, 2020}, pages = {53--62}, publisher = {{ACM}}, year = {2020}, url = {https://dl.acm.org/doi/10.5555/3432601.3432609}, doi = {10.5555/3432601.3432609}, timestamp = {Fri, 29 Jul 2022 15:53:07 +0200}, biburl = {https://dblp.org/rec/conf/cascon/BabarIDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DeanWG19, author = {Thomas R. Dean and Mary Wootters and Andrea J. Goldsmith}, title = {Blind Joint {MIMO} Channel Estimation and Decoding}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {4}, pages = {2507--2524}, year = {2019}, url = {https://doi.org/10.1109/TIT.2018.2878016}, doi = {10.1109/TIT.2018.2878016}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DeanWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/DeanPWG19, author = {Thomas R. Dean and Jonathan Perlstein and Mary Wootters and Andrea J. Goldsmith}, title = {Fast Blind {MIMO} Decoding Through Vertex Hopping}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {18}, number = {7}, pages = {3669--3682}, year = {2019}, url = {https://doi.org/10.1109/TWC.2019.2917002}, doi = {10.1109/TWC.2019.2917002}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/DeanPWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/MahruqiAD19, author = {Rahma S. Al Mahruqi and Manar H. Alalfi and Thomas R. Dean}, editor = {Tima Pakfetrat and Guy{-}Vincent Jourdan and Kostas Kontogiannis and Robert F. Enenkel}, title = {A semi-automated framework for migrating web applications from {SQL} to document oriented NoSQL database}, booktitle = {Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, {CASCON} 2019, Markham, Ontario, Canada, November 4-6, 2019}, pages = {44--53}, publisher = {{ACM}}, year = {2019}, url = {https://dl.acm.org/doi/10.5555/3370272.3370277}, doi = {10.5555/3370272.3370277}, timestamp = {Wed, 04 May 2022 13:02:28 +0200}, biburl = {https://dblp.org/rec/conf/cascon/MahruqiAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/HarthiAD19, author = {Omar A. Al Harthi and Manar H. Alalfi and Thomas R. Dean}, editor = {Tima Pakfetrat and Guy{-}Vincent Jourdan and Kostas Kontogiannis and Robert F. Enenkel}, title = {Detection of feature interaction in dynamic scripting languages}, booktitle = {Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, {CASCON} 2019, Markham, Ontario, Canada, November 4-6, 2019}, pages = {130--137}, publisher = {{ACM}}, year = {2019}, url = {https://dl.acm.org/doi/10.5555/3370272.3370286}, doi = {10.5555/3370272.3370286}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cascon/HarthiAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/LavoratoID19, author = {Kyle Lavorato and Fahim T. Imam and Thomas R. Dean}, editor = {Tima Pakfetrat and Guy{-}Vincent Jourdan and Kostas Kontogiannis and Robert F. Enenkel}, title = {LL(k) optimization of a network protocol parser generator}, booktitle = {Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, {CASCON} 2019, Markham, Ontario, Canada, November 4-6, 2019}, pages = {183--192}, publisher = {{ACM}}, year = {2019}, url = {https://dl.acm.org/doi/10.5555/3370272.3370292}, doi = {10.5555/3370272.3370292}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cascon/LavoratoID19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CordyDMS19, author = {James R. Cordy and Thomas R. Dean and Andrew J. Malton and Kevin A. Schneider}, title = {Software Engineering by Source Transformation - Experience with {TXL} (Most Influential Paper, {SCAM} 2001)}, booktitle = {19th International Working Conference on Source Code Analysis and Manipulation, {SCAM} 2019, Cleveland, OH, USA, September 30 - October 1, 2019}, pages = {140}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SCAM.2019.00024}, doi = {10.1109/SCAM.2019.00024}, timestamp = {Tue, 17 Dec 2019 09:49:31 +0100}, biburl = {https://dblp.org/rec/conf/scam/CordyDMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/AlalfiRSSDC19, author = {Manar H. Alalfi and Eric J. Rapos and Andrew Stevenson and Matthew Stephan and Thomas R. Dean and James R. Cordy}, editor = {Yanja Dajsuren and Mark van den Brand}, title = {Variability Identification and Representation for Automotive Simulink Models}, booktitle = {Automotive Systems and Software Engineering - State of the Art and Future Trends}, pages = {109--139}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12157-0\_6}, doi = {10.1007/978-3-030-12157-0\_6}, timestamp = {Sat, 09 Apr 2022 12:20:04 +0200}, biburl = {https://dblp.org/rec/books/sp/19/AlalfiRSSDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/PerlsteinDWG18, author = {Jonathan Perlstein and Thomas R. Dean and Mary Wootters and Andrea Goldsmith}, editor = {Michael B. Matthews}, title = {Fast Blind {MIMO} Decoding through Vertex Hopping}, booktitle = {52nd Asilomar Conference on Signals, Systems, and Computers, {ACSSC} 2018, Pacific Grove, CA, USA, October 28-31, 2018}, pages = {148--154}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ACSSC.2018.8645173}, doi = {10.1109/ACSSC.2018.8645173}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/acssc/PerlsteinDWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecmdafa/ChenADR18, author = {Jian Chen and Manar H. Alalfi and Thomas R. Dean and S. Ramesh}, editor = {Alfonso Pierantonio and Salvador Trujillo}, title = {Modeling {AUTOSAR} Implementations in Simulink}, booktitle = {Modelling Foundations and Applications - 14th European Conference, ECMFA@STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10890}, pages = {279--292}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92997-2\_18}, doi = {10.1007/978-3-319-92997-2\_18}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecmdafa/ChenADR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MichaudDL18, author = {Michael James Michaud and Thomas R. Dean and Sylvain P. Leblanc}, title = {Attacking {OMG} Data Distribution Service {(DDS)} Based Real-Time Mission Critical Distributed Systems}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {68--77}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659368}, doi = {10.1109/MALWARE.2018.8659368}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/MichaudDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spawc/DeanCG18, author = {Thomas R. Dean and Mainak Chowdhury and Andrea Goldsmith}, title = {Zero-Padded {FDM-FDCP:} Real-Time Signal Processing for Underwater Channels}, booktitle = {19th {IEEE} International Workshop on Signal Processing Advances in Wireless Communications, {SPAWC} 2018, Kalamata, Greece, June 25-28, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SPAWC.2018.8445931}, doi = {10.1109/SPAWC.2018.8445931}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/spawc/DeanCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/RakhaID18, author = {Mohamed Sami Rakha and Fahim T. Imam and Thomas R. Dean}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Generating a Real-Time Constraint Engine for Network Protocols}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {44--60}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_5}, doi = {10.1007/978-3-030-20074-9\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/RakhaID18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-01049, author = {Thomas R. Dean and Mary Wootters and Andrea J. Goldsmith}, title = {Blind Joint {MIMO} Channel Estimation and Decoding}, journal = {CoRR}, volume = {abs/1802.01049}, year = {2018}, url = {http://arxiv.org/abs/1802.01049}, eprinttype = {arXiv}, eprint = {1802.01049}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-01049.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DeanG17, author = {Thomas R. Dean and Andrea J. Goldsmith}, title = {Physical-Layer Cryptography Through Massive {MIMO}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {63}, number = {8}, pages = {5419--5436}, year = {2017}, url = {https://doi.org/10.1109/TIT.2017.2715187}, doi = {10.1109/TIT.2017.2715187}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DeanG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/HasanDIGLZ17, author = {M. D. Siam Hasan and Thomas R. Dean and Fahim T. Imam and Francisco Garcia and Sylvain P. Leblanc and Mohammad Zulkernine}, editor = {Ondrej Rysav{\'{y}} and Valentino Vranic and George Angelos Papadopoulos}, title = {A Constraint-based intrusion detection system}, booktitle = {Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, {ECBS} 2017, Larnaca, Cyprus, August 31 - September 01, 2017}, pages = {12:1--12:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3123779.3123812}, doi = {10.1145/3123779.3123812}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecbs/HasanDIGLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DeanWG17, author = {Thomas R. Dean and Mary Wootters and Andrea Goldsmith}, title = {Blind Joint {MIMO} Channel Estimation and Decoding}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254157}, doi = {10.1109/GLOCOM.2017.8254157}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/DeanWG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/DeanCG17, author = {Thomas R. Dean and Mainak Chowdhury and Andrea Goldsmith}, title = {A new modulation technique for Doppler compensation in frequency-dispersive channels}, booktitle = {28th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October 8-13, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PIMRC.2017.8292240}, doi = {10.1109/PIMRC.2017.8292240}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/DeanCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/ElShakankiryD17, author = {Ali ElShakankiry and Thomas R. Dean}, title = {Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {77--86}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00019}, doi = {10.1109/PST.2017.00019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/ElShakankiryD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sqj/ChenDA16, author = {Jian Chen and Thomas R. Dean and Manar H. Alalfi}, title = {Clone detection in {MATLAB} Stateflow models}, journal = {Softw. Qual. J.}, volume = {24}, number = {4}, pages = {917--946}, year = {2016}, url = {https://doi.org/10.1007/s11219-015-9296-0}, doi = {10.1007/S11219-015-9296-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sqj/ChenDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fois/ImamD16, author = {Fahim T. Imam and Thomas R. Dean}, editor = {Oliver Kutz and Sergio de Cesare and Maria M. Hedblom and Tarek Richard Besold and Tony Veale and Frederik Gailly and Giancarlo Guizzardi and Mark Lycett and Chris Partridge and Oscar Pastor and Michael Gr{\"{u}}ninger and Fabian Neuhaus and Till Mossakowski and Stefano Borgo and Loris Bozzato and Chiara Del Vescovo and Martin Homola and Frank Loebe and Adrien Barton and Jean{-}R{\'{e}}mi Bourguet}, title = {Affordances in Representing the Behaviour of Event-Based Systems}, booktitle = {Proceedings of the Joint Ontology Workshops 2016 Episode 2: The French Summer of Ontology co-located with the 9th International Conference on Formal Ontology in Information Systems {(FOIS} 2016), Annecy, France, July 6-9, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1660}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1660/caos-paper2.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:26 +0100}, biburl = {https://dblp.org/rec/conf/fois/ImamD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/ImamD16, author = {Fahim T. Imam and Thomas R. Dean}, editor = {Robert J. Howlett and Lakhmi C. Jain and Bogdan Gabrys and Carlos Toro and Chee Peng Lim}, title = {Modelling Functional Behavior of Event-based Systems: {A} Practical Knowledge-based Approach}, booktitle = {Knowledge-Based and Intelligent Information {\&} Engineering Systems: Proceedings of the 20th International Conference KES-2016, York, UK, 5-7 September 2016}, series = {Procedia Computer Science}, volume = {96}, pages = {617--626}, publisher = {Elsevier}, year = {2016}, url = {https://doi.org/10.1016/j.procs.2016.08.243}, doi = {10.1016/J.PROCS.2016.08.243}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kes/ImamD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HasanEDZ16, author = {Md Siam Hasan and Ali ElShakankiry and Thomas R. Dean and Mohammad Zulkernine}, title = {Intrusion detection in a private network by satisfying constraints}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {623--628}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906997}, doi = {10.1109/PST.2016.7906997}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/HasanEDZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/ChenADZ15, author = {Jian Chen and Manar H. Alalfi and Thomas R. Dean and Ying Zou}, title = {Detecting Android Malware Using Clone Detection}, journal = {J. Comput. Sci. Technol.}, volume = {30}, number = {5}, pages = {942--956}, year = {2015}, url = {https://www.wikidata.org/entity/Q29447372}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/ChenADZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/DeanCA14, author = {Thomas Roy Dean and Jian Chen and Manar H. Alalfi}, title = {Clone Detection in Matlab Stateflow Models}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {63}, year = {2014}, url = {https://doi.org/10.14279/tuj.eceasst.63.920}, doi = {10.14279/TUJ.ECEASST.63.920}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/DeanCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/CordyDS14, author = {James R. Cordy and Thomas R. Dean and Nikita Synytskyy}, editor = {Joanna Ng and Jin Li and Ken Wong}, title = {Practical language-independent detection of near-miss clones}, booktitle = {Proceedings of 24th Annual International Conference on Computer Science and Software Engineering, {CASCON} 2014, Markham, Ontario, Canada, 3-5 November, 2014}, pages = {2}, publisher = {{IBM} / {ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2735524}, timestamp = {Wed, 27 Jan 2016 19:48:56 +0100}, biburl = {https://dblp.org/rec/conf/cascon/CordyDS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/AlalfiCD14, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Serge Demeyer and Dave W. Binkley and Filippo Ricca}, title = {Analysis and clustering of model clones: An automotive industrial experience}, booktitle = {2014 Software Evolution Week - {IEEE} Conference on Software Maintenance, Reengineering, and Reverse Engineering, {CSMR-WCRE} 2014, Antwerp, Belgium, February 3-6, 2014}, pages = {375--378}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSMR-WCRE.2014.6747198}, doi = {10.1109/CSMR-WCRE.2014.6747198}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/AlalfiCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/AlalfiRSSDC14, author = {Manar H. Alalfi and Eric J. Rapos and Andrew Stevenson and Matthew Stephan and Thomas R. Dean and James R. Cordy}, title = {Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models}, booktitle = {30th {IEEE} International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29 - October 3, 2014}, pages = {486--490}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICSME.2014.79}, doi = {10.1109/ICSME.2014.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/AlalfiRSSDC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/RiccaDS13, author = {Filippo Ricca and Thomas R. Dean and Susan Elliott Sim}, title = {Guest Editorial: Special Section on International Conference on Program Comprehension, 2011}, journal = {Inf. Softw. Technol.}, volume = {55}, number = {4}, pages = {719--721}, year = {2013}, url = {https://doi.org/10.1016/j.infsof.2012.08.011}, doi = {10.1016/J.INFSOF.2012.08.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/RiccaDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/KamD13, author = {Ben W. Y. Kam and Thomas R. Dean}, title = {Linguistic security testing for text communication protocols}, journal = {Softw. Pract. Exp.}, volume = {43}, number = {9}, pages = {1103--1120}, year = {2013}, url = {https://doi.org/10.1002/spe.2108}, doi = {10.1002/SPE.2108}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/KamD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/KarademirDL13, author = {Saruhan Karademir and Thomas R. Dean and Sylvain P. Leblanc}, editor = {James R. Cordy and Krzystof Czarnecki and Sang{-}Ah Han}, title = {Using clone detection to find malware in acrobat files}, booktitle = {Center for Advanced Studies on Collaborative Research, {CASCON} '13, Toronto, ON, Canada, November 18-20, 2013}, pages = {70--80}, publisher = {{IBM} / {ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2555532}, timestamp = {Wed, 13 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cascon/KarademirDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/AlmonaiesACD13, author = {Asil A. Almonaies and Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Florian Daniel and Peter Dolog and Qing Li}, title = {A Framework for Migrating Web Applications to Web Services}, booktitle = {Web Engineering - 13th International Conference, {ICWE} 2013, Aalborg, Denmark, July 8-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7977}, pages = {384--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39200-9\_32}, doi = {10.1007/978-3-642-39200-9\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icwe/AlmonaiesACD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/DeanG13, author = {Thomas R. Dean and Andrea Goldsmith}, title = {Physical-layer cryptography through massive {MIMO}}, booktitle = {2013 {IEEE} Information Theory Workshop, {ITW} 2013, Sevilla, Spain, September 9-13, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ITW.2013.6691222}, doi = {10.1109/ITW.2013.6691222}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/DeanG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DeanG13, author = {Thomas R. Dean and Andrea Goldsmith}, title = {Physical-Layer Cryptography Through Massive {MIMO}}, journal = {CoRR}, volume = {abs/1310.1861}, year = {2013}, url = {http://arxiv.org/abs/1310.1861}, eprinttype = {arXiv}, eprint = {1310.1861}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DeanG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/AlalfiCDSS12, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean and Matthew Stephan and Andrew Stevenson}, title = {Models are code too: Near-miss clone detection for Simulink models}, booktitle = {28th {IEEE} International Conference on Software Maintenance, {ICSM} 2012, Trento, Italy, September 23-28, 2012}, pages = {295--304}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICSM.2012.6405285}, doi = {10.1109/ICSM.2012.6405285}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/AlalfiCDSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/AlalfiCD12, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Marco Brambilla and Takehiro Tokuda and Robert Tolksdorf}, title = {Recovering Role-Based Access Control Security Models from Dynamic Web Applications}, booktitle = {Web Engineering - 12th International Conference, {ICWE} 2012, Berlin, Germany, July 23-27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7387}, pages = {121--136}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31753-8\_9}, doi = {10.1007/978-3-642-31753-8\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icwe/AlalfiCD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsc/AlalfiCDSS12, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean and Matthew Stephan and Andrew Stevenson}, editor = {James R. Cordy and Katsuro Inoue and Rainer Koschke and Jens Krinke and Chanchal K. Roy}, title = {Near-miss model clone detection for Simulink models}, booktitle = {Proceeding of the 6th International Workshop on Software Clones, {IWSC} 2012, Zurich, Switzerland, June 4, 2012}, pages = {78--79}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IWSC.2012.6227873}, doi = {10.1109/IWSC.2012.6227873}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsc/AlalfiCDSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wse/AlalfiCD12, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Scott R. Tilley and Damiano Distante and Gustavo Rossi}, title = {Automated verification of role-based access control security models recovered from dynamic web applications}, booktitle = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE} 2012, Trento, Italy, September 28, 2012}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WSE.2012.6320525}, doi = {10.1109/WSE.2012.6320525}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wse/AlalfiCD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wse/GamaACD12, author = {Widd Gama and Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Scott R. Tilley and Damiano Distante and Gustavo Rossi}, title = {Normalizing object-oriented class styles in JavaScript}, booktitle = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE} 2012, Trento, Italy, September 28, 2012}, pages = {79--83}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WSE.2012.6320536}, doi = {10.1109/WSE.2012.6320536}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wse/GamaACD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/AlexanderDK11, author = {Jason S. Alexander and Thomas R. Dean and Scott Knight}, editor = {Joanna W. Ng and Christian Couturier and Marin Litoiu and Eleni Stroulia}, title = {Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions}, booktitle = {Center for Advanced Studies on Collaborative Research, {CASCON} '11, Toronto, ON, Canada, November 7-10, 2011}, pages = {1--14}, publisher = {{IBM} / {ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2093891}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/AlexanderDK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/AlmonaiesACD11, author = {Asil A. Almonaies and Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Joanna W. Ng and Christian Couturier and Marin Litoiu and Eleni Stroulia}, title = {Towards a framework for migrating web applications to web services}, booktitle = {Center for Advanced Studies on Collaborative Research, {CASCON} '11, Toronto, ON, Canada, November 7-10, 2011}, pages = {229--241}, publisher = {{IBM} / {ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2093915}, timestamp = {Fri, 12 Apr 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cascon/AlmonaiesACD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/MengKD11, author = {Nicholas Jie Meng and Diane Kelly and Thomas R. Dean}, editor = {Joanna W. Ng and Christian Couturier and Marin Litoiu and Eleni Stroulia}, title = {Towards the profiling of scientific software for accuracy}, booktitle = {Center for Advanced Studies on Collaborative Research, {CASCON} '11, Toronto, ON, Canada, November 7-10, 2011}, pages = {257--271}, publisher = {{IBM} / {ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2093918}, timestamp = {Tue, 08 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cascon/MengKD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/CeccatoDTM10, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella and Davide Marchignoli}, title = {Migrating legacy data structures based on variable overlay to Java}, journal = {J. Softw. Maintenance Res. Pract.}, volume = {22}, number = {3}, pages = {211--237}, year = {2010}, url = {https://doi.org/10.1002/smr.418}, doi = {10.1002/SMR.418}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/CeccatoDTM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/AlalfiCD10, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Rafael Capilla and Rudolf Ferenc and Juan C. Due{\~{n}}as}, title = {Automating Coverage Metrics for Dynamic Web Applications}, booktitle = {14th European Conference on Software Maintenance and Reengineering, {CSMR} 2010, 15-18 March 2010, Madrid, Spain}, pages = {51--60}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSMR.2010.21}, doi = {10.1109/CSMR.2010.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/AlalfiCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/taicpart/KamD10, author = {Ben W. Y. Kam and Thomas R. Dean}, editor = {Leonardo Bottaci and Gordon Fraser}, title = {Linguistic Security Testing for Text Communication Protocols}, booktitle = {Testing - Practice and Research Techniques, 5th International Academic and Industrial Conference, {TAIC} {PART} 2010, Windsor, UK, September 3-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6303}, pages = {104--117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15585-7\_10}, doi = {10.1007/978-3-642-15585-7\_10}, timestamp = {Mon, 23 Nov 2020 12:33:09 +0100}, biburl = {https://dblp.org/rec/conf/taicpart/KamD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/CeccatoDT09, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella}, title = {Recovering structured data types from a legacy data model with overlays}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {10}, pages = {1454--1468}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2009.04.017}, doi = {10.1016/J.INFSOF.2009.04.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/CeccatoDT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/AlalfiCD09, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, title = {Modelling methods for web application verification and testing: state of the art}, journal = {Softw. Test. Verification Reliab.}, volume = {19}, number = {4}, pages = {265--296}, year = {2009}, url = {https://doi.org/10.1002/stvr.401}, doi = {10.1002/STVR.401}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/AlalfiCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c3s2e/AlalfiCD09, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Bipin C. Desai and Carson Kai{-}Sang Leung and Olga Ormandjieva}, title = {A verification framework for access control in dynamic web applications}, booktitle = {Canadian Conference on Computer Science {\&} Software Engineering, {C3S2E} 2009, Montreal, Quebec, Canada, May 19-21, 2009, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {109--113}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1557626.1557643}, doi = {10.1145/1557626.1557643}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/c3s2e/AlalfiCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/AlalfiCD09, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, title = {Automated Reverse Engineering of {UML} Sequence Diagrams for Dynamic Web Applications}, booktitle = {Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops Proceedings}, pages = {287--294}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICSTW.2009.8}, doi = {10.1109/ICSTW.2009.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/AlalfiCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/KamD09, author = {Ben W. Y. Kam and Thomas R. Dean}, editor = {Shahram Latifi}, title = {Lessons Learned from a Survey of Web Applications Testing}, booktitle = {Sixth International Conference on Information Technology: New Generations, {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009}, pages = {125--130}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ITNG.2009.306}, doi = {10.1109/ITNG.2009.306}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/KamD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wse/AlalfiCD09, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Kenny Wong and Ying Zou and Ji Wu}, title = {{WAFA:} Fine-grained dynamic analysis of web applications}, booktitle = {Proceedings of the 11th {IEEE} International Symposium on Web Systems Evolution, {WSE} 2009, 25-26 September 2009, Edmonton, Alberta, Canada}, pages = {141--150}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WSE.2009.5631226}, doi = {10.1109/WSE.2009.5631226}, timestamp = {Thu, 11 Aug 2022 10:18:25 +0200}, biburl = {https://dblp.org/rec/conf/wse/AlalfiCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/DeanV08, author = {Thomas R. Dean and Joost Visser}, editor = {Ren{\'{e}} L. Krikhaar and Ralf L{\"{a}}mmel and Chris Verhoef}, title = {Industrial Realities of Program Comprehension {(IRPC} 2008)}, booktitle = {The 16th {IEEE} International Conference on Program Comprehension, {ICPC} 2008, Amsterdam, The Netherlands, June 10-13, 2008}, pages = {283--284}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICPC.2008.43}, doi = {10.1109/ICPC.2008.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/DeanV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CeccatoDT08, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella}, title = {Using Program Transformations to Add Structure to a Legacy Data Model}, booktitle = {Eighth {IEEE} International Working Conference on Source Code Analysis and Manipulation {(SCAM} 2008), 28-29 September 2008, Beijing, China}, pages = {197--206}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SCAM.2008.9}, doi = {10.1109/SCAM.2008.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/CeccatoDT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/ChuD08, author = {Jason Chu and Thomas R. Dean}, title = {Automated Migration of List Based {JSP} Web Pages to {AJAX}}, booktitle = {Eighth {IEEE} International Working Conference on Source Code Analysis and Manipulation {(SCAM} 2008), 28-29 September 2008, Beijing, China}, pages = {217--226}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SCAM.2008.29}, doi = {10.1109/SCAM.2008.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/ChuD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/CeccatoDTM08, author = {Mariano Ceccato and Thomas Roy Dean and Paolo Tonella and Davide Marchignoli}, editor = {Ahmed E. Hassan and Andy Zaidman and Massimiliano Di Penta}, title = {Data Model Reverse Engineering in Migrating a Legacy System to Java}, booktitle = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 15-18, 2008}, pages = {177--186}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WCRE.2008.27}, doi = {10.1109/WCRE.2008.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/CeccatoDTM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/AlalfiCD08, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Ahmed E. Hassan and Andy Zaidman and Massimiliano Di Penta}, title = {{SQL2XMI:} Reverse Engineering of {UML-ER} Diagrams from Relational Database Schemas}, booktitle = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse Engineering, Antwerp, Belgium, October 15-18, 2008}, pages = {187--191}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WCRE.2008.30}, doi = {10.1109/WCRE.2008.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/AlalfiCD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/BolchiniDDT07, author = {Davide Bolchini and Thomas R. Dean and Damiano Distante and Scott R. Tilley}, title = {Special Issue on Web Site Evolution {(WSE} 2006)}, journal = {J. Softw. Maintenance Res. Pract.}, volume = {19}, number = {5}, pages = {277--279}, year = {2007}, url = {https://doi.org/10.1002/smr.358}, doi = {10.1002/SMR.358}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/BolchiniDDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/MaoCD07, author = {Andy Y. Mao and James R. Cordy and Thomas R. Dean}, editor = {Bruce Spencer and Margaret{-}Anne D. Storey and Darlene A. Stewart}, title = {Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection}, booktitle = {Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario, Canada}, pages = {12--26}, publisher = {{IBM}}, year = {2007}, url = {https://doi.org/10.1145/1321211.1321214}, doi = {10.1145/1321211.1321214}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/MaoCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/AlalfiCD07, author = {Manar H. Alalfi and James R. Cordy and Thomas R. Dean}, editor = {Luciano Baresi and Piero Fraternali and Geert{-}Jan Houben}, title = {A Survey of Analysis Models and Methods in Website Verification and Testing}, booktitle = {Web Engineering, 7th International Conference, {ICWE} 2007, Como, Italy, July 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4607}, pages = {306--311}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73597-7\_25}, doi = {10.1007/978-3-540-73597-7\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icwe/AlalfiCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/RoyURD07, author = {Chanchal Kumar Roy and Mohammad Gias Uddin and Banani Roy and Thomas R. Dean}, title = {Evaluating Aspect Mining Techniques: {A} Case Study}, booktitle = {15th International Conference on Program Comprehension {(ICPC} 2007), June 26-29, 2007, Banff, Alberta, Canada}, pages = {167--176}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICPC.2007.21}, doi = {10.1109/ICPC.2007.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/RoyURD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wse/TramontanaDT07, author = {Porfirio Tramontana and Thomas R. Dean and Scott R. Tilley}, editor = {Shihong Huang and Massimiliano Di Penta}, title = {Research Directions in Web Site Evolution {II:} Web Application Security}, booktitle = {Proceedings of the 9th {IEEE} International Symposium on Web Systems Evolution, {WSE} 2009, 5-6 October 2007, Paris, France}, pages = {105--106}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/WSE.2007.4380251}, doi = {10.1109/WSE.2007.4380251}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wse/TramontanaDT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/MarquisDK06, author = {Sylvain Marquis and Thomas R. Dean and Scott Knight}, editor = {Hakan Erdogmus and Eleni Stroulia and Darlene A. Stewart}, title = {Packet decoding using context sensitive parsing}, booktitle = {Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, October 16-19, 2006, Toronto, Ontario, Canada}, pages = {263--274}, publisher = {{IBM}}, year = {2006}, url = {https://doi.org/10.1145/1188966.1188993}, doi = {10.1145/1188966.1188993}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/MarquisDK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/ZhangDK06, author = {Songtao Zhang and Thomas R. Dean and Scott Knight}, editor = {Hakan Erdogmus and Eleni Stroulia and Darlene A. Stewart}, title = {A lightweight approach to state based security testing}, booktitle = {Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, October 16-19, 2006, Toronto, Ontario, Canada}, pages = {341--344}, publisher = {{IBM}}, year = {2006}, url = {https://doi.org/10.1145/1188966.1189004}, doi = {10.1145/1188966.1189004}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cascon/ZhangDK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/DeanPKW06, author = {Thomas R. Dean and Massimiliano Di Penta and Kostas Kontogiannis and Andrew Walenstein}, editor = {Rainer Koschke and Ettore Merlo and Andrew Walenstein}, title = {Clone Detector Use Questions: {A} List of Desirable Empirical Studies}, booktitle = {Duplication, Redundancy, and Similarity in Software, 23.07. - 26.07.2006}, series = {Dagstuhl Seminar Proceedings}, volume = {06301}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2006}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/969}, timestamp = {Thu, 10 Jun 2021 13:02:09 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/DeanPKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/MarquisDK05, author = {Sylvain Marquis and Thomas R. Dean and Scott Knight}, editor = {James R. Cordy and Anatol W. Kark and Darlene A. Stewart}, title = {{SCL:} a language for security testing of network applications}, booktitle = {Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, October 17-20, 2005, Toronto, Ontario, Canada}, pages = {155--164}, publisher = {{IBM}}, year = {2005}, url = {https://dl.acm.org/citation.cfm?id=1105646}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/MarquisDK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gttse/DeanS06, author = {Thomas R. Dean and Mykyta Synytskyy}, editor = {Ralf L{\"{a}}mmel and Jo{\~{a}}o Saraiva and Joost Visser}, title = {Agile Parsing to Transform Web Applications}, booktitle = {Generative and Transformational Techniques in Software Engineering, International Summer School, {GTTSE} 2005, Braga, Portugal, July 4-8, 2005. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4143}, pages = {312--326}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11877028\_11}, doi = {10.1007/11877028\_11}, timestamp = {Sun, 26 Apr 2020 17:09:18 +0200}, biburl = {https://dblp.org/rec/conf/gttse/DeanS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/XuD05, author = {Shannon Xu and Thomas R. Dean}, title = {Transforming Embedded Java Code into Custom Tags}, booktitle = {5th {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2005), 30 September - 1 October 2005, Budapest, Hungary}, pages = {173--182}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SCAM.2005.27}, doi = {10.1109/SCAM.2005.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/XuD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/WangCD05, author = {Lei Wang and James R. Cordy and Thomas R. Dean}, title = {Enhancing Security Using Legality Assertions}, booktitle = {12th Working Conference on Reverse Engineering, {WCRE} 2005, Pittsburgh, PA, USA, November 7-11, 2005}, pages = {35--44}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WCRE.2005.36}, doi = {10.1109/WCRE.2005.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/WangCD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wse/XuD05, author = {Shannon Xu and Thomas R. Dean}, title = {Modernizing JavaServer Pages by Transformation}, booktitle = {Seventh {IEEE} International Workshop on Web Site Evolution {(WSE} 2005), 26 September 2005, Budapest, Hungary}, pages = {111--118}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WSE.2005.9}, doi = {10.1109/WSE.2005.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wse/XuD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CassidyCDD05, author = {Timothy Cassidy and James R. Cordy and Thomas R. Dean and J{\"{u}}rgen Dingel}, editor = {John Boyland and G{\"{o}}rel Hedin}, title = {Source Transformation for Concurrency Analysis}, booktitle = {Proceedings of the Fifth Workshop on Language Descriptions, Tools, and Applications, LDTA@ETAPS 2005, Edinburgh, UK, April 3, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {141}, number = {4}, pages = {57--75}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.05.012}, doi = {10.1016/J.ENTCS.2005.05.012}, timestamp = {Tue, 13 Dec 2022 10:43:45 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CassidyCDD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/CordyDS04, author = {James R. Cordy and Thomas R. Dean and Nikita Synytskyy}, editor = {Hanan Lutfiyya and Janice Singer and Darlene A. Stewart}, title = {Practical language-independent detection of near-miss clones}, booktitle = {Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, October 5-7, 2004, Markham, Ontario, Canada}, pages = {1--12}, publisher = {{IBM}}, year = {2004}, url = {https://dl.acm.org/citation.cfm?id=1034915}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/CordyDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/DeanCMS03, author = {Thomas R. Dean and James R. Cordy and Andrew J. Malton and Kevin A. Schneider}, title = {Agile Parsing in {TXL}}, journal = {Autom. Softw. Eng.}, volume = {10}, number = {4}, pages = {311--336}, year = {2003}, url = {https://doi.org/10.1023/A:1025801405075}, doi = {10.1023/A:1025801405075}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/DeanCMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/SynytskyyCD03, author = {Nikita Synytskyy and James R. Cordy and Thomas R. Dean}, editor = {Darlene A. Stewart}, title = {Robust multilingual parsing using island grammars}, booktitle = {Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative Research, October 6-9, 2003, Toronto, Ontario, Canada}, pages = {266--278}, publisher = {{IBM}}, year = {2003}, url = {https://dl.acm.org/citation.cfm?id=961364}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/SynytskyyCD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csmr/JinCD03, author = {Dean Jin and James R. Cordy and Thomas R. Dean}, title = {Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter}, booktitle = {7th European Conference on Software Maintenance and Reengineering {(CSMR} 2003), 26-28 March 2003, Benevento, Italy, Proceedings}, pages = {399--408}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSMR.2003.1192449}, doi = {10.1109/CSMR.2003.1192449}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csmr/JinCD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/DeanC03, author = {Thomas R. Dean and Yuling Chen}, title = {Design Recovery of a Two Level System}, booktitle = {11th International Workshop on Program Comprehension {(IWPC} 2003), May 10-11, 2003, Portland, Oregon, {USA}}, pages = {23--32}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/WPC.2003.1199186}, doi = {10.1109/WPC.2003.1199186}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/DeanC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/GuoCD03, author = {Xinping Guo and James R. Cordy and Thomas R. Dean}, title = {Unique Renaming of Java Using Source Transformation}, booktitle = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands}, pages = {151--160}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SCAM.2003.1238041}, doi = {10.1109/SCAM.2003.1238041}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/GuoCD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wse/SynytskyyCD03, author = {Nikita Synytskyy and James R. Cordy and Thomas R. Dean}, title = {Resolution of Static Clones in Dynamic Web Pages}, booktitle = {5th International Workshop on Web Site Evolution {(WSE} 2003) - Architecture, 22 September 2003, Amsterdam, The Netherlands}, pages = {49}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/WSE.2003.1234008}, doi = {10.1109/WSE.2003.1234008}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wse/SynytskyyCD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/CordyDMS02, author = {James R. Cordy and Thomas R. Dean and Andrew J. Malton and Kevin A. Schneider}, title = {Source transformation in software engineering using the {TXL} transformation system}, journal = {Inf. Softw. Technol.}, volume = {44}, number = {13}, pages = {827--837}, year = {2002}, url = {https://doi.org/10.1016/S0950-5849(02)00104-0}, doi = {10.1016/S0950-5849(02)00104-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/CordyDMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/JinCD02, author = {Dean Jin and James R. Cordy and Thomas R. Dean}, title = {Where's the Schema? {A} Taxonomy of Patterns for Software Exchange}, booktitle = {10th International Workshop on Program Comprehension {(IWPC} 2002), 27-29 June 2002, Paris, France}, pages = {65--74}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/WPC.2002.1021320}, doi = {10.1109/WPC.2002.1021320}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/JinCD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/DeanCMS02, author = {Thomas R. Dean and James R. Cordy and Andrew J. Malton and Kevin A. Schneider}, title = {Grammar Programming in {TXL}}, booktitle = {2nd {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2002), 1 October 2002, Montreal, Canada}, pages = {93}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SCAM.2002.1134109}, doi = {10.1109/SCAM.2002.1134109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/DeanCMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/DeanCSM01, author = {Thomas R. Dean and James R. Cordy and Kevin A. Schneider and Andrew J. Malton}, title = {Using Design Recovery Techniques to Transform Legacy Systems}, booktitle = {2001 International Conference on Software Maintenance, {ICSM} 2001, Florence, Italy, November 6-10, 2001}, pages = {622--631}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICSM.2001.972779}, doi = {10.1109/ICSM.2001.972779}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/DeanCSM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/MaltonSCDCR01, author = {Andrew J. Malton and Kevin A. Schneider and James R. Cordy and Thomas R. Dean and Darren Cousineau and Jason Reynolds}, title = {Processing Software Source Text in Automated Design Recovery and Transformation}, booktitle = {9th International Workshop on Program Comprehension {(IWPC} 2001), 12-13 May 2001, Toronto, Canada}, pages = {127--134}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/WPC.2001.921724}, doi = {10.1109/WPC.2001.921724}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/MaltonSCDCR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/CordySDM01, author = {James R. Cordy and Kevin A. Schneider and Thomas R. Dean and Andrew J. Malton}, title = {{HSML:} Design Directed Source Code Hot Spots}, booktitle = {9th International Workshop on Program Comprehension {(IWPC} 2001), 12-13 May 2001, Toronto, Canada}, pages = {145--154}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/WPC.2001.921726}, doi = {10.1109/WPC.2001.921726}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwpc/CordySDM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scam/CordyDMS01, author = {James R. Cordy and Thomas R. Dean and Andrew J. Malton and Kevin A. Schneider}, title = {Software Engineering by Source Transformation-Experience with {TXL}}, booktitle = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation {(SCAM} 2001), 10 November 2001, Florence, Italy}, pages = {170--180}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SCAM.2001.972678}, doi = {10.1109/SCAM.2001.972678}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scam/CordyDMS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/DeanMH01, author = {Thomas R. Dean and Andrew J. Malton and Richard C. Holt}, editor = {Elizabeth Burd and Peter Aiken and Rainer Koschke}, title = {Union Schemas as a Basis for a {C++} Extractor}, booktitle = {Proceedings of the Eighth Working Conference on Reverse Engineering, WCRE'01, Stuttgart, Germany, October 2-5, 2001}, pages = {59}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/WCRE.2001.957810}, doi = {10.1109/WCRE.2001.957810}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/DeanMH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/DeanC95, author = {Thomas R. Dean and James R. Cordy}, title = {A Syntactic Theory of Software Architecture}, journal = {{IEEE} Trans. Software Eng.}, volume = {21}, number = {4}, pages = {302--313}, year = {1995}, url = {https://doi.org/10.1109/32.385969}, doi = {10.1109/32.385969}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/DeanC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/DeanL94, author = {Thomas R. Dean and David Alex Lamb}, editor = {John E. Botsford and Ann Gawman and W. Morven Gentleman and Evelyn Kidd and Kelly A. Lyons and Jacob Slonim and J. Howard Johnson}, title = {A theory model core for module interconnection languages}, booktitle = {Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31 - November 3, 1994, Toronto, Ontario, Canada}, pages = {13}, publisher = {{IBM}}, year = {1994}, url = {https://dl.acm.org/citation.cfm?id=782198}, timestamp = {Fri, 30 Nov 2018 02:24:54 +0100}, biburl = {https://dblp.org/rec/conf/cascon/DeanL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/DeanC93, author = {Thomas R. Dean and James R. Cordy}, editor = {David Alex Lamb}, title = {Software Structure Characterization Using Connectivity}, booktitle = {Studies of Software Design, ICSE'93 Workshop, Baltimore, Maryland, USA, May 17-18, 1993, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {1078}, pages = {33--48}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/BFb0030518}, doi = {10.1007/BFB0030518}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icse/DeanC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.