BibTeX records: Thomas R. Dean

download as .bib file

@article{DBLP:journals/corr/abs-2301-00835,
  author       = {Jian Chen and
                  Manar H. Alalfi and
                  Thomas R. Dean},
  title        = {Timed Model-Based Mutation Operators for Simulink Models},
  journal      = {CoRR},
  volume       = {abs/2301.00835},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.00835},
  doi          = {10.48550/ARXIV.2301.00835},
  eprinttype    = {arXiv},
  eprint       = {2301.00835},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-00835.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14974,
  author       = {Jian Chen and
                  Manar H. Alalfi and
                  Thomas R. Dean and
                  Ramesh S},
  title        = {SimSched: {A} tool for Simulating Autosar Implementaion in Simulink},
  journal      = {CoRR},
  volume       = {abs/2308.14974},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14974},
  doi          = {10.48550/ARXIV.2308.14974},
  eprinttype    = {arXiv},
  eprint       = {2308.14974},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/DeanCGG20,
  author       = {Thomas R. Dean and
                  Mainak Chowdhury and
                  Nicole Grimwood and
                  Andrea J. Goldsmith},
  title        = {Rethinking Modulation and Detection for High Doppler Channels},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {19},
  number       = {6},
  pages        = {3629--3642},
  year         = {2020},
  url          = {https://doi.org/10.1109/TWC.2020.2967039},
  doi          = {10.1109/TWC.2020.2967039},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/DeanCGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/BabarIDF20,
  author       = {Ayesha Babar and
                  Fahim T. Imam and
                  Thomas R. Dean and
                  Jose Fernandez},
  editor       = {Lily Shaddick and
                  Guy{-}Vincent Jourdan and
                  Vio Onut and
                  Tinny Ng},
  title        = {An approach to represent and transform application-specific constraints
                  for an intrusion detection system},
  booktitle    = {{CASCON} '20: Proceedings of the 30th Annual International Conference
                  on Computer Science and Software Engineering, Toronto, Ontario, Canada,
                  November 10 - 13, 2020},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://dl.acm.org/doi/10.5555/3432601.3432609},
  doi          = {10.5555/3432601.3432609},
  timestamp    = {Fri, 29 Jul 2022 15:53:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/BabarIDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DeanWG19,
  author       = {Thomas R. Dean and
                  Mary Wootters and
                  Andrea J. Goldsmith},
  title        = {Blind Joint {MIMO} Channel Estimation and Decoding},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {4},
  pages        = {2507--2524},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2018.2878016},
  doi          = {10.1109/TIT.2018.2878016},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DeanWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/DeanPWG19,
  author       = {Thomas R. Dean and
                  Jonathan Perlstein and
                  Mary Wootters and
                  Andrea J. Goldsmith},
  title        = {Fast Blind {MIMO} Decoding Through Vertex Hopping},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {18},
  number       = {7},
  pages        = {3669--3682},
  year         = {2019},
  url          = {https://doi.org/10.1109/TWC.2019.2917002},
  doi          = {10.1109/TWC.2019.2917002},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/DeanPWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/MahruqiAD19,
  author       = {Rahma S. Al Mahruqi and
                  Manar H. Alalfi and
                  Thomas R. Dean},
  editor       = {Tima Pakfetrat and
                  Guy{-}Vincent Jourdan and
                  Kostas Kontogiannis and
                  Robert F. Enenkel},
  title        = {A semi-automated framework for migrating web applications from {SQL}
                  to document oriented NoSQL database},
  booktitle    = {Proceedings of the 29th Annual International Conference on Computer
                  Science and Software Engineering, {CASCON} 2019, Markham, Ontario,
                  Canada, November 4-6, 2019},
  pages        = {44--53},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://dl.acm.org/doi/10.5555/3370272.3370277},
  doi          = {10.5555/3370272.3370277},
  timestamp    = {Wed, 04 May 2022 13:02:28 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/MahruqiAD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/HarthiAD19,
  author       = {Omar A. Al Harthi and
                  Manar H. Alalfi and
                  Thomas R. Dean},
  editor       = {Tima Pakfetrat and
                  Guy{-}Vincent Jourdan and
                  Kostas Kontogiannis and
                  Robert F. Enenkel},
  title        = {Detection of feature interaction in dynamic scripting languages},
  booktitle    = {Proceedings of the 29th Annual International Conference on Computer
                  Science and Software Engineering, {CASCON} 2019, Markham, Ontario,
                  Canada, November 4-6, 2019},
  pages        = {130--137},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://dl.acm.org/doi/10.5555/3370272.3370286},
  doi          = {10.5555/3370272.3370286},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/HarthiAD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/LavoratoID19,
  author       = {Kyle Lavorato and
                  Fahim T. Imam and
                  Thomas R. Dean},
  editor       = {Tima Pakfetrat and
                  Guy{-}Vincent Jourdan and
                  Kostas Kontogiannis and
                  Robert F. Enenkel},
  title        = {LL(k) optimization of a network protocol parser generator},
  booktitle    = {Proceedings of the 29th Annual International Conference on Computer
                  Science and Software Engineering, {CASCON} 2019, Markham, Ontario,
                  Canada, November 4-6, 2019},
  pages        = {183--192},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://dl.acm.org/doi/10.5555/3370272.3370292},
  doi          = {10.5555/3370272.3370292},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/LavoratoID19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CordyDMS19,
  author       = {James R. Cordy and
                  Thomas R. Dean and
                  Andrew J. Malton and
                  Kevin A. Schneider},
  title        = {Software Engineering by Source Transformation - Experience with {TXL}
                  (Most Influential Paper, {SCAM} 2001)},
  booktitle    = {19th International Working Conference on Source Code Analysis and
                  Manipulation, {SCAM} 2019, Cleveland, OH, USA, September 30 - October
                  1, 2019},
  pages        = {140},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SCAM.2019.00024},
  doi          = {10.1109/SCAM.2019.00024},
  timestamp    = {Tue, 17 Dec 2019 09:49:31 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CordyDMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/AlalfiRSSDC19,
  author       = {Manar H. Alalfi and
                  Eric J. Rapos and
                  Andrew Stevenson and
                  Matthew Stephan and
                  Thomas R. Dean and
                  James R. Cordy},
  editor       = {Yanja Dajsuren and
                  Mark van den Brand},
  title        = {Variability Identification and Representation for Automotive Simulink
                  Models},
  booktitle    = {Automotive Systems and Software Engineering - State of the Art and
                  Future Trends},
  pages        = {109--139},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12157-0\_6},
  doi          = {10.1007/978-3-030-12157-0\_6},
  timestamp    = {Sat, 09 Apr 2022 12:20:04 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/AlalfiRSSDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/PerlsteinDWG18,
  author       = {Jonathan Perlstein and
                  Thomas R. Dean and
                  Mary Wootters and
                  Andrea Goldsmith},
  editor       = {Michael B. Matthews},
  title        = {Fast Blind {MIMO} Decoding through Vertex Hopping},
  booktitle    = {52nd Asilomar Conference on Signals, Systems, and Computers, {ACSSC}
                  2018, Pacific Grove, CA, USA, October 28-31, 2018},
  pages        = {148--154},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACSSC.2018.8645173},
  doi          = {10.1109/ACSSC.2018.8645173},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/PerlsteinDWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecmdafa/ChenADR18,
  author       = {Jian Chen and
                  Manar H. Alalfi and
                  Thomas R. Dean and
                  S. Ramesh},
  editor       = {Alfonso Pierantonio and
                  Salvador Trujillo},
  title        = {Modeling {AUTOSAR} Implementations in Simulink},
  booktitle    = {Modelling Foundations and Applications - 14th European Conference,
                  ECMFA@STAF 2018, Toulouse, France, June 26-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10890},
  pages        = {279--292},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92997-2\_18},
  doi          = {10.1007/978-3-319-92997-2\_18},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecmdafa/ChenADR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MichaudDL18,
  author       = {Michael James Michaud and
                  Thomas R. Dean and
                  Sylvain P. Leblanc},
  title        = {Attacking {OMG} Data Distribution Service {(DDS)} Based Real-Time
                  Mission Critical Distributed Systems},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {68--77},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659368},
  doi          = {10.1109/MALWARE.2018.8659368},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/MichaudDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spawc/DeanCG18,
  author       = {Thomas R. Dean and
                  Mainak Chowdhury and
                  Andrea Goldsmith},
  title        = {Zero-Padded {FDM-FDCP:} Real-Time Signal Processing for Underwater
                  Channels},
  booktitle    = {19th {IEEE} International Workshop on Signal Processing Advances in
                  Wireless Communications, {SPAWC} 2018, Kalamata, Greece, June 25-28,
                  2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SPAWC.2018.8445931},
  doi          = {10.1109/SPAWC.2018.8445931},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/spawc/DeanCG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/RakhaID18,
  author       = {Mohamed Sami Rakha and
                  Fahim T. Imam and
                  Thomas R. Dean},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Generating a Real-Time Constraint Engine for Network Protocols},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_5},
  doi          = {10.1007/978-3-030-20074-9\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/RakhaID18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-01049,
  author       = {Thomas R. Dean and
                  Mary Wootters and
                  Andrea J. Goldsmith},
  title        = {Blind Joint {MIMO} Channel Estimation and Decoding},
  journal      = {CoRR},
  volume       = {abs/1802.01049},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.01049},
  eprinttype    = {arXiv},
  eprint       = {1802.01049},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-01049.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DeanG17,
  author       = {Thomas R. Dean and
                  Andrea J. Goldsmith},
  title        = {Physical-Layer Cryptography Through Massive {MIMO}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {63},
  number       = {8},
  pages        = {5419--5436},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIT.2017.2715187},
  doi          = {10.1109/TIT.2017.2715187},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DeanG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/HasanDIGLZ17,
  author       = {M. D. Siam Hasan and
                  Thomas R. Dean and
                  Fahim T. Imam and
                  Francisco Garcia and
                  Sylvain P. Leblanc and
                  Mohammad Zulkernine},
  editor       = {Ondrej Rysav{\'{y}} and
                  Valentino Vranic and
                  George Angelos Papadopoulos},
  title        = {A Constraint-based intrusion detection system},
  booktitle    = {Proceedings of the Fifth European Conference on the Engineering of
                  Computer-Based Systems, {ECBS} 2017, Larnaca, Cyprus, August 31 -
                  September 01, 2017},
  pages        = {12:1--12:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3123779.3123812},
  doi          = {10.1145/3123779.3123812},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecbs/HasanDIGLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DeanWG17,
  author       = {Thomas R. Dean and
                  Mary Wootters and
                  Andrea Goldsmith},
  title        = {Blind Joint {MIMO} Channel Estimation and Decoding},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254157},
  doi          = {10.1109/GLOCOM.2017.8254157},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/DeanWG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/DeanCG17,
  author       = {Thomas R. Dean and
                  Mainak Chowdhury and
                  Andrea Goldsmith},
  title        = {A new modulation technique for Doppler compensation in frequency-dispersive
                  channels},
  booktitle    = {28th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October
                  8-13, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PIMRC.2017.8292240},
  doi          = {10.1109/PIMRC.2017.8292240},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/DeanCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ElShakankiryD17,
  author       = {Ali ElShakankiry and
                  Thomas R. Dean},
  title        = {Context Sensitive and Secure Parser Generation for Deep Packet Inspection
                  of Binary Protocols},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {77--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00019},
  doi          = {10.1109/PST.2017.00019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ElShakankiryD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sqj/ChenDA16,
  author       = {Jian Chen and
                  Thomas R. Dean and
                  Manar H. Alalfi},
  title        = {Clone detection in {MATLAB} Stateflow models},
  journal      = {Softw. Qual. J.},
  volume       = {24},
  number       = {4},
  pages        = {917--946},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11219-015-9296-0},
  doi          = {10.1007/S11219-015-9296-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sqj/ChenDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fois/ImamD16,
  author       = {Fahim T. Imam and
                  Thomas R. Dean},
  editor       = {Oliver Kutz and
                  Sergio de Cesare and
                  Maria M. Hedblom and
                  Tarek Richard Besold and
                  Tony Veale and
                  Frederik Gailly and
                  Giancarlo Guizzardi and
                  Mark Lycett and
                  Chris Partridge and
                  Oscar Pastor and
                  Michael Gr{\"{u}}ninger and
                  Fabian Neuhaus and
                  Till Mossakowski and
                  Stefano Borgo and
                  Loris Bozzato and
                  Chiara Del Vescovo and
                  Martin Homola and
                  Frank Loebe and
                  Adrien Barton and
                  Jean{-}R{\'{e}}mi Bourguet},
  title        = {Affordances in Representing the Behaviour of Event-Based Systems},
  booktitle    = {Proceedings of the Joint Ontology Workshops 2016 Episode 2: The French
                  Summer of Ontology co-located with the 9th International Conference
                  on Formal Ontology in Information Systems {(FOIS} 2016), Annecy, France,
                  July 6-9, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1660},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1660/caos-paper2.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:26 +0100},
  biburl       = {https://dblp.org/rec/conf/fois/ImamD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/ImamD16,
  author       = {Fahim T. Imam and
                  Thomas R. Dean},
  editor       = {Robert J. Howlett and
                  Lakhmi C. Jain and
                  Bogdan Gabrys and
                  Carlos Toro and
                  Chee Peng Lim},
  title        = {Modelling Functional Behavior of Event-based Systems: {A} Practical
                  Knowledge-based Approach},
  booktitle    = {Knowledge-Based and Intelligent Information {\&} Engineering Systems:
                  Proceedings of the 20th International Conference KES-2016, York, UK,
                  5-7 September 2016},
  series       = {Procedia Computer Science},
  volume       = {96},
  pages        = {617--626},
  publisher    = {Elsevier},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.procs.2016.08.243},
  doi          = {10.1016/J.PROCS.2016.08.243},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/ImamD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HasanEDZ16,
  author       = {Md Siam Hasan and
                  Ali ElShakankiry and
                  Thomas R. Dean and
                  Mohammad Zulkernine},
  title        = {Intrusion detection in a private network by satisfying constraints},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {623--628},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906997},
  doi          = {10.1109/PST.2016.7906997},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/HasanEDZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/ChenADZ15,
  author       = {Jian Chen and
                  Manar H. Alalfi and
                  Thomas R. Dean and
                  Ying Zou},
  title        = {Detecting Android Malware Using Clone Detection},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {30},
  number       = {5},
  pages        = {942--956},
  year         = {2015},
  url          = {https://www.wikidata.org/entity/Q29447372},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/ChenADZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/DeanCA14,
  author       = {Thomas Roy Dean and
                  Jian Chen and
                  Manar H. Alalfi},
  title        = {Clone Detection in Matlab Stateflow Models},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {63},
  year         = {2014},
  url          = {https://doi.org/10.14279/tuj.eceasst.63.920},
  doi          = {10.14279/TUJ.ECEASST.63.920},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/DeanCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/CordyDS14,
  author       = {James R. Cordy and
                  Thomas R. Dean and
                  Nikita Synytskyy},
  editor       = {Joanna Ng and
                  Jin Li and
                  Ken Wong},
  title        = {Practical language-independent detection of near-miss clones},
  booktitle    = {Proceedings of 24th Annual International Conference on Computer Science
                  and Software Engineering, {CASCON} 2014, Markham, Ontario, Canada,
                  3-5 November, 2014},
  pages        = {2},
  publisher    = {{IBM} / {ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2735524},
  timestamp    = {Wed, 27 Jan 2016 19:48:56 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/CordyDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/AlalfiCD14,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Serge Demeyer and
                  Dave W. Binkley and
                  Filippo Ricca},
  title        = {Analysis and clustering of model clones: An automotive industrial
                  experience},
  booktitle    = {2014 Software Evolution Week - {IEEE} Conference on Software Maintenance,
                  Reengineering, and Reverse Engineering, {CSMR-WCRE} 2014, Antwerp,
                  Belgium, February 3-6, 2014},
  pages        = {375--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSMR-WCRE.2014.6747198},
  doi          = {10.1109/CSMR-WCRE.2014.6747198},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/AlalfiCD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/AlalfiRSSDC14,
  author       = {Manar H. Alalfi and
                  Eric J. Rapos and
                  Andrew Stevenson and
                  Matthew Stephan and
                  Thomas R. Dean and
                  James R. Cordy},
  title        = {Semi-automatic Identification and Representation of Subsystem Variability
                  in Simulink Models},
  booktitle    = {30th {IEEE} International Conference on Software Maintenance and Evolution,
                  Victoria, BC, Canada, September 29 - October 3, 2014},
  pages        = {486--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICSME.2014.79},
  doi          = {10.1109/ICSME.2014.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/AlalfiRSSDC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/RiccaDS13,
  author       = {Filippo Ricca and
                  Thomas R. Dean and
                  Susan Elliott Sim},
  title        = {Guest Editorial: Special Section on International Conference on Program
                  Comprehension, 2011},
  journal      = {Inf. Softw. Technol.},
  volume       = {55},
  number       = {4},
  pages        = {719--721},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.infsof.2012.08.011},
  doi          = {10.1016/J.INFSOF.2012.08.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/RiccaDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/KamD13,
  author       = {Ben W. Y. Kam and
                  Thomas R. Dean},
  title        = {Linguistic security testing for text communication protocols},
  journal      = {Softw. Pract. Exp.},
  volume       = {43},
  number       = {9},
  pages        = {1103--1120},
  year         = {2013},
  url          = {https://doi.org/10.1002/spe.2108},
  doi          = {10.1002/SPE.2108},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/KamD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/KarademirDL13,
  author       = {Saruhan Karademir and
                  Thomas R. Dean and
                  Sylvain P. Leblanc},
  editor       = {James R. Cordy and
                  Krzystof Czarnecki and
                  Sang{-}Ah Han},
  title        = {Using clone detection to find malware in acrobat files},
  booktitle    = {Center for Advanced Studies on Collaborative Research, {CASCON} '13,
                  Toronto, ON, Canada, November 18-20, 2013},
  pages        = {70--80},
  publisher    = {{IBM} / {ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2555532},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/KarademirDL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/AlmonaiesACD13,
  author       = {Asil A. Almonaies and
                  Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Florian Daniel and
                  Peter Dolog and
                  Qing Li},
  title        = {A Framework for Migrating Web Applications to Web Services},
  booktitle    = {Web Engineering - 13th International Conference, {ICWE} 2013, Aalborg,
                  Denmark, July 8-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7977},
  pages        = {384--399},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39200-9\_32},
  doi          = {10.1007/978-3-642-39200-9\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/AlmonaiesACD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/DeanG13,
  author       = {Thomas R. Dean and
                  Andrea Goldsmith},
  title        = {Physical-layer cryptography through massive {MIMO}},
  booktitle    = {2013 {IEEE} Information Theory Workshop, {ITW} 2013, Sevilla, Spain,
                  September 9-13, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ITW.2013.6691222},
  doi          = {10.1109/ITW.2013.6691222},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/DeanG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DeanG13,
  author       = {Thomas R. Dean and
                  Andrea Goldsmith},
  title        = {Physical-Layer Cryptography Through Massive {MIMO}},
  journal      = {CoRR},
  volume       = {abs/1310.1861},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.1861},
  eprinttype    = {arXiv},
  eprint       = {1310.1861},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DeanG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/AlalfiCDSS12,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean and
                  Matthew Stephan and
                  Andrew Stevenson},
  title        = {Models are code too: Near-miss clone detection for Simulink models},
  booktitle    = {28th {IEEE} International Conference on Software Maintenance, {ICSM}
                  2012, Trento, Italy, September 23-28, 2012},
  pages        = {295--304},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICSM.2012.6405285},
  doi          = {10.1109/ICSM.2012.6405285},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/AlalfiCDSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/AlalfiCD12,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Marco Brambilla and
                  Takehiro Tokuda and
                  Robert Tolksdorf},
  title        = {Recovering Role-Based Access Control Security Models from Dynamic
                  Web Applications},
  booktitle    = {Web Engineering - 12th International Conference, {ICWE} 2012, Berlin,
                  Germany, July 23-27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7387},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31753-8\_9},
  doi          = {10.1007/978-3-642-31753-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/AlalfiCD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsc/AlalfiCDSS12,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean and
                  Matthew Stephan and
                  Andrew Stevenson},
  editor       = {James R. Cordy and
                  Katsuro Inoue and
                  Rainer Koschke and
                  Jens Krinke and
                  Chanchal K. Roy},
  title        = {Near-miss model clone detection for Simulink models},
  booktitle    = {Proceeding of the 6th International Workshop on Software Clones, {IWSC}
                  2012, Zurich, Switzerland, June 4, 2012},
  pages        = {78--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWSC.2012.6227873},
  doi          = {10.1109/IWSC.2012.6227873},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsc/AlalfiCDSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/AlalfiCD12,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Scott R. Tilley and
                  Damiano Distante and
                  Gustavo Rossi},
  title        = {Automated verification of role-based access control security models
                  recovered from dynamic web applications},
  booktitle    = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}
                  2012, Trento, Italy, September 28, 2012},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WSE.2012.6320525},
  doi          = {10.1109/WSE.2012.6320525},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wse/AlalfiCD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/GamaACD12,
  author       = {Widd Gama and
                  Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Scott R. Tilley and
                  Damiano Distante and
                  Gustavo Rossi},
  title        = {Normalizing object-oriented class styles in JavaScript},
  booktitle    = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}
                  2012, Trento, Italy, September 28, 2012},
  pages        = {79--83},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WSE.2012.6320536},
  doi          = {10.1109/WSE.2012.6320536},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wse/GamaACD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/AlexanderDK11,
  author       = {Jason S. Alexander and
                  Thomas R. Dean and
                  Scott Knight},
  editor       = {Joanna W. Ng and
                  Christian Couturier and
                  Marin Litoiu and
                  Eleni Stroulia},
  title        = {Spy vs. Spy: counter-intelligence methods for backtracking malicious
                  intrusions},
  booktitle    = {Center for Advanced Studies on Collaborative Research, {CASCON} '11,
                  Toronto, ON, Canada, November 7-10, 2011},
  pages        = {1--14},
  publisher    = {{IBM} / {ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2093891},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/AlexanderDK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/AlmonaiesACD11,
  author       = {Asil A. Almonaies and
                  Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Joanna W. Ng and
                  Christian Couturier and
                  Marin Litoiu and
                  Eleni Stroulia},
  title        = {Towards a framework for migrating web applications to web services},
  booktitle    = {Center for Advanced Studies on Collaborative Research, {CASCON} '11,
                  Toronto, ON, Canada, November 7-10, 2011},
  pages        = {229--241},
  publisher    = {{IBM} / {ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2093915},
  timestamp    = {Fri, 12 Apr 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/AlmonaiesACD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/MengKD11,
  author       = {Nicholas Jie Meng and
                  Diane Kelly and
                  Thomas R. Dean},
  editor       = {Joanna W. Ng and
                  Christian Couturier and
                  Marin Litoiu and
                  Eleni Stroulia},
  title        = {Towards the profiling of scientific software for accuracy},
  booktitle    = {Center for Advanced Studies on Collaborative Research, {CASCON} '11,
                  Toronto, ON, Canada, November 7-10, 2011},
  pages        = {257--271},
  publisher    = {{IBM} / {ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2093918},
  timestamp    = {Tue, 08 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/MengKD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/CeccatoDTM10,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella and
                  Davide Marchignoli},
  title        = {Migrating legacy data structures based on variable overlay to Java},
  journal      = {J. Softw. Maintenance Res. Pract.},
  volume       = {22},
  number       = {3},
  pages        = {211--237},
  year         = {2010},
  url          = {https://doi.org/10.1002/smr.418},
  doi          = {10.1002/SMR.418},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/CeccatoDTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/AlalfiCD10,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Rafael Capilla and
                  Rudolf Ferenc and
                  Juan C. Due{\~{n}}as},
  title        = {Automating Coverage Metrics for Dynamic Web Applications},
  booktitle    = {14th European Conference on Software Maintenance and Reengineering,
                  {CSMR} 2010, 15-18 March 2010, Madrid, Spain},
  pages        = {51--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSMR.2010.21},
  doi          = {10.1109/CSMR.2010.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/AlalfiCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/taicpart/KamD10,
  author       = {Ben W. Y. Kam and
                  Thomas R. Dean},
  editor       = {Leonardo Bottaci and
                  Gordon Fraser},
  title        = {Linguistic Security Testing for Text Communication Protocols},
  booktitle    = {Testing - Practice and Research Techniques, 5th International Academic
                  and Industrial Conference, {TAIC} {PART} 2010, Windsor, UK, September
                  3-5, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6303},
  pages        = {104--117},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15585-7\_10},
  doi          = {10.1007/978-3-642-15585-7\_10},
  timestamp    = {Mon, 23 Nov 2020 12:33:09 +0100},
  biburl       = {https://dblp.org/rec/conf/taicpart/KamD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/CeccatoDT09,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella},
  title        = {Recovering structured data types from a legacy data model with overlays},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {10},
  pages        = {1454--1468},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2009.04.017},
  doi          = {10.1016/J.INFSOF.2009.04.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/CeccatoDT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stvr/AlalfiCD09,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Modelling methods for web application verification and testing: state
                  of the art},
  journal      = {Softw. Test. Verification Reliab.},
  volume       = {19},
  number       = {4},
  pages        = {265--296},
  year         = {2009},
  url          = {https://doi.org/10.1002/stvr.401},
  doi          = {10.1002/STVR.401},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/stvr/AlalfiCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c3s2e/AlalfiCD09,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Bipin C. Desai and
                  Carson Kai{-}Sang Leung and
                  Olga Ormandjieva},
  title        = {A verification framework for access control in dynamic web applications},
  booktitle    = {Canadian Conference on Computer Science {\&} Software Engineering,
                  {C3S2E} 2009, Montreal, Quebec, Canada, May 19-21, 2009, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {109--113},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1557626.1557643},
  doi          = {10.1145/1557626.1557643},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c3s2e/AlalfiCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/AlalfiCD09,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Automated Reverse Engineering of {UML} Sequence Diagrams for Dynamic
                  Web Applications},
  booktitle    = {Second International Conference on Software Testing Verification and
                  Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops
                  Proceedings},
  pages        = {287--294},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICSTW.2009.8},
  doi          = {10.1109/ICSTW.2009.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/AlalfiCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/KamD09,
  author       = {Ben W. Y. Kam and
                  Thomas R. Dean},
  editor       = {Shahram Latifi},
  title        = {Lessons Learned from a Survey of Web Applications Testing},
  booktitle    = {Sixth International Conference on Information Technology: New Generations,
                  {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages        = {125--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ITNG.2009.306},
  doi          = {10.1109/ITNG.2009.306},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/KamD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/AlalfiCD09,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Kenny Wong and
                  Ying Zou and
                  Ji Wu},
  title        = {{WAFA:} Fine-grained dynamic analysis of web applications},
  booktitle    = {Proceedings of the 11th {IEEE} International Symposium on Web Systems
                  Evolution, {WSE} 2009, 25-26 September 2009, Edmonton, Alberta, Canada},
  pages        = {141--150},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WSE.2009.5631226},
  doi          = {10.1109/WSE.2009.5631226},
  timestamp    = {Thu, 11 Aug 2022 10:18:25 +0200},
  biburl       = {https://dblp.org/rec/conf/wse/AlalfiCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/DeanV08,
  author       = {Thomas R. Dean and
                  Joost Visser},
  editor       = {Ren{\'{e}} L. Krikhaar and
                  Ralf L{\"{a}}mmel and
                  Chris Verhoef},
  title        = {Industrial Realities of Program Comprehension {(IRPC} 2008)},
  booktitle    = {The 16th {IEEE} International Conference on Program Comprehension,
                  {ICPC} 2008, Amsterdam, The Netherlands, June 10-13, 2008},
  pages        = {283--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICPC.2008.43},
  doi          = {10.1109/ICPC.2008.43},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/DeanV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CeccatoDT08,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella},
  title        = {Using Program Transformations to Add Structure to a Legacy Data Model},
  booktitle    = {Eighth {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation {(SCAM} 2008), 28-29 September 2008, Beijing, China},
  pages        = {197--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SCAM.2008.9},
  doi          = {10.1109/SCAM.2008.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CeccatoDT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/ChuD08,
  author       = {Jason Chu and
                  Thomas R. Dean},
  title        = {Automated Migration of List Based {JSP} Web Pages to {AJAX}},
  booktitle    = {Eighth {IEEE} International Working Conference on Source Code Analysis
                  and Manipulation {(SCAM} 2008), 28-29 September 2008, Beijing, China},
  pages        = {217--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SCAM.2008.29},
  doi          = {10.1109/SCAM.2008.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/ChuD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/CeccatoDTM08,
  author       = {Mariano Ceccato and
                  Thomas Roy Dean and
                  Paolo Tonella and
                  Davide Marchignoli},
  editor       = {Ahmed E. Hassan and
                  Andy Zaidman and
                  Massimiliano Di Penta},
  title        = {Data Model Reverse Engineering in Migrating a Legacy System to Java},
  booktitle    = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse
                  Engineering, Antwerp, Belgium, October 15-18, 2008},
  pages        = {177--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WCRE.2008.27},
  doi          = {10.1109/WCRE.2008.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/CeccatoDTM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/AlalfiCD08,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Ahmed E. Hassan and
                  Andy Zaidman and
                  Massimiliano Di Penta},
  title        = {{SQL2XMI:} Reverse Engineering of {UML-ER} Diagrams from Relational
                  Database Schemas},
  booktitle    = {{WCRE} 2008, Proceedings of the 15th Working Conference on Reverse
                  Engineering, Antwerp, Belgium, October 15-18, 2008},
  pages        = {187--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WCRE.2008.30},
  doi          = {10.1109/WCRE.2008.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/AlalfiCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/BolchiniDDT07,
  author       = {Davide Bolchini and
                  Thomas R. Dean and
                  Damiano Distante and
                  Scott R. Tilley},
  title        = {Special Issue on Web Site Evolution {(WSE} 2006)},
  journal      = {J. Softw. Maintenance Res. Pract.},
  volume       = {19},
  number       = {5},
  pages        = {277--279},
  year         = {2007},
  url          = {https://doi.org/10.1002/smr.358},
  doi          = {10.1002/SMR.358},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/BolchiniDDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/MaoCD07,
  author       = {Andy Y. Mao and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Bruce Spencer and
                  Margaret{-}Anne D. Storey and
                  Darlene A. Stewart},
  title        = {Automated conversion of table-based websites to structured stylesheets
                  using table recognition and clone detection},
  booktitle    = {Proceedings of the 2007 conference of the Centre for Advanced Studies
                  on Collaborative Research, October 22-25, 2007, Richmond Hill, Ontario,
                  Canada},
  pages        = {12--26},
  publisher    = {{IBM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1321211.1321214},
  doi          = {10.1145/1321211.1321214},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/MaoCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/AlalfiCD07,
  author       = {Manar H. Alalfi and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Luciano Baresi and
                  Piero Fraternali and
                  Geert{-}Jan Houben},
  title        = {A Survey of Analysis Models and Methods in Website Verification and
                  Testing},
  booktitle    = {Web Engineering, 7th International Conference, {ICWE} 2007, Como,
                  Italy, July 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4607},
  pages        = {306--311},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73597-7\_25},
  doi          = {10.1007/978-3-540-73597-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/AlalfiCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/RoyURD07,
  author       = {Chanchal Kumar Roy and
                  Mohammad Gias Uddin and
                  Banani Roy and
                  Thomas R. Dean},
  title        = {Evaluating Aspect Mining Techniques: {A} Case Study},
  booktitle    = {15th International Conference on Program Comprehension {(ICPC} 2007),
                  June 26-29, 2007, Banff, Alberta, Canada},
  pages        = {167--176},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICPC.2007.21},
  doi          = {10.1109/ICPC.2007.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/RoyURD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/TramontanaDT07,
  author       = {Porfirio Tramontana and
                  Thomas R. Dean and
                  Scott R. Tilley},
  editor       = {Shihong Huang and
                  Massimiliano Di Penta},
  title        = {Research Directions in Web Site Evolution {II:} Web Application Security},
  booktitle    = {Proceedings of the 9th {IEEE} International Symposium on Web Systems
                  Evolution, {WSE} 2009, 5-6 October 2007, Paris, France},
  pages        = {105--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/WSE.2007.4380251},
  doi          = {10.1109/WSE.2007.4380251},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wse/TramontanaDT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/MarquisDK06,
  author       = {Sylvain Marquis and
                  Thomas R. Dean and
                  Scott Knight},
  editor       = {Hakan Erdogmus and
                  Eleni Stroulia and
                  Darlene A. Stewart},
  title        = {Packet decoding using context sensitive parsing},
  booktitle    = {Proceedings of the 2006 conference of the Centre for Advanced Studies
                  on Collaborative Research, October 16-19, 2006, Toronto, Ontario,
                  Canada},
  pages        = {263--274},
  publisher    = {{IBM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1188966.1188993},
  doi          = {10.1145/1188966.1188993},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/MarquisDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/ZhangDK06,
  author       = {Songtao Zhang and
                  Thomas R. Dean and
                  Scott Knight},
  editor       = {Hakan Erdogmus and
                  Eleni Stroulia and
                  Darlene A. Stewart},
  title        = {A lightweight approach to state based security testing},
  booktitle    = {Proceedings of the 2006 conference of the Centre for Advanced Studies
                  on Collaborative Research, October 16-19, 2006, Toronto, Ontario,
                  Canada},
  pages        = {341--344},
  publisher    = {{IBM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1188966.1189004},
  doi          = {10.1145/1188966.1189004},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/ZhangDK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/DeanPKW06,
  author       = {Thomas R. Dean and
                  Massimiliano Di Penta and
                  Kostas Kontogiannis and
                  Andrew Walenstein},
  editor       = {Rainer Koschke and
                  Ettore Merlo and
                  Andrew Walenstein},
  title        = {Clone Detector Use Questions: {A} List of Desirable Empirical Studies},
  booktitle    = {Duplication, Redundancy, and Similarity in Software, 23.07. - 26.07.2006},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {06301},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2006},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/969},
  timestamp    = {Thu, 10 Jun 2021 13:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/DeanPKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/MarquisDK05,
  author       = {Sylvain Marquis and
                  Thomas R. Dean and
                  Scott Knight},
  editor       = {James R. Cordy and
                  Anatol W. Kark and
                  Darlene A. Stewart},
  title        = {{SCL:} a language for security testing of network applications},
  booktitle    = {Proceedings of the 2005 conference of the Centre for Advanced Studies
                  on Collaborative Research, October 17-20, 2005, Toronto, Ontario,
                  Canada},
  pages        = {155--164},
  publisher    = {{IBM}},
  year         = {2005},
  url          = {https://dl.acm.org/citation.cfm?id=1105646},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/MarquisDK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gttse/DeanS06,
  author       = {Thomas R. Dean and
                  Mykyta Synytskyy},
  editor       = {Ralf L{\"{a}}mmel and
                  Jo{\~{a}}o Saraiva and
                  Joost Visser},
  title        = {Agile Parsing to Transform Web Applications},
  booktitle    = {Generative and Transformational Techniques in Software Engineering,
                  International Summer School, {GTTSE} 2005, Braga, Portugal, July 4-8,
                  2005. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4143},
  pages        = {312--326},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11877028\_11},
  doi          = {10.1007/11877028\_11},
  timestamp    = {Sun, 26 Apr 2020 17:09:18 +0200},
  biburl       = {https://dblp.org/rec/conf/gttse/DeanS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/XuD05,
  author       = {Shannon Xu and
                  Thomas R. Dean},
  title        = {Transforming Embedded Java Code into Custom Tags},
  booktitle    = {5th {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2005), 30 September - 1 October 2005, Budapest, Hungary},
  pages        = {173--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SCAM.2005.27},
  doi          = {10.1109/SCAM.2005.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/XuD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/WangCD05,
  author       = {Lei Wang and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Enhancing Security Using Legality Assertions},
  booktitle    = {12th Working Conference on Reverse Engineering, {WCRE} 2005, Pittsburgh,
                  PA, USA, November 7-11, 2005},
  pages        = {35--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WCRE.2005.36},
  doi          = {10.1109/WCRE.2005.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/WangCD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/XuD05,
  author       = {Shannon Xu and
                  Thomas R. Dean},
  title        = {Modernizing JavaServer Pages by Transformation},
  booktitle    = {Seventh {IEEE} International Workshop on Web Site Evolution {(WSE}
                  2005), 26 September 2005, Budapest, Hungary},
  pages        = {111--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WSE.2005.9},
  doi          = {10.1109/WSE.2005.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wse/XuD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CassidyCDD05,
  author       = {Timothy Cassidy and
                  James R. Cordy and
                  Thomas R. Dean and
                  J{\"{u}}rgen Dingel},
  editor       = {John Boyland and
                  G{\"{o}}rel Hedin},
  title        = {Source Transformation for Concurrency Analysis},
  booktitle    = {Proceedings of the Fifth Workshop on Language Descriptions, Tools,
                  and Applications, LDTA@ETAPS 2005, Edinburgh, UK, April 3, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {141},
  number       = {4},
  pages        = {57--75},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.05.012},
  doi          = {10.1016/J.ENTCS.2005.05.012},
  timestamp    = {Tue, 13 Dec 2022 10:43:45 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CassidyCDD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/CordyDS04,
  author       = {James R. Cordy and
                  Thomas R. Dean and
                  Nikita Synytskyy},
  editor       = {Hanan Lutfiyya and
                  Janice Singer and
                  Darlene A. Stewart},
  title        = {Practical language-independent detection of near-miss clones},
  booktitle    = {Proceedings of the 2004 conference of the Centre for Advanced Studies
                  on Collaborative research, October 5-7, 2004, Markham, Ontario, Canada},
  pages        = {1--12},
  publisher    = {{IBM}},
  year         = {2004},
  url          = {https://dl.acm.org/citation.cfm?id=1034915},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/CordyDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/DeanCMS03,
  author       = {Thomas R. Dean and
                  James R. Cordy and
                  Andrew J. Malton and
                  Kevin A. Schneider},
  title        = {Agile Parsing in {TXL}},
  journal      = {Autom. Softw. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {311--336},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1025801405075},
  doi          = {10.1023/A:1025801405075},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/DeanCMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/SynytskyyCD03,
  author       = {Nikita Synytskyy and
                  James R. Cordy and
                  Thomas R. Dean},
  editor       = {Darlene A. Stewart},
  title        = {Robust multilingual parsing using island grammars},
  booktitle    = {Proceedings of the 2003 conference of the Centre for Advanced Studies
                  on Collaborative Research, October 6-9, 2003, Toronto, Ontario, Canada},
  pages        = {266--278},
  publisher    = {{IBM}},
  year         = {2003},
  url          = {https://dl.acm.org/citation.cfm?id=961364},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/SynytskyyCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csmr/JinCD03,
  author       = {Dean Jin and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Transparent Reverse Engineering Tool Integration Using a Conceptual
                  Transaction Adapter},
  booktitle    = {7th European Conference on Software Maintenance and Reengineering
                  {(CSMR} 2003), 26-28 March 2003, Benevento, Italy, Proceedings},
  pages        = {399--408},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSMR.2003.1192449},
  doi          = {10.1109/CSMR.2003.1192449},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csmr/JinCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/DeanC03,
  author       = {Thomas R. Dean and
                  Yuling Chen},
  title        = {Design Recovery of a Two Level System},
  booktitle    = {11th International Workshop on Program Comprehension {(IWPC} 2003),
                  May 10-11, 2003, Portland, Oregon, {USA}},
  pages        = {23--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/WPC.2003.1199186},
  doi          = {10.1109/WPC.2003.1199186},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/DeanC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/GuoCD03,
  author       = {Xinping Guo and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Unique Renaming of Java Using Source Transformation},
  booktitle    = {3rd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2003), 26-27 September 2003, Amsterdam, The Netherlands},
  pages        = {151--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SCAM.2003.1238041},
  doi          = {10.1109/SCAM.2003.1238041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/GuoCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wse/SynytskyyCD03,
  author       = {Nikita Synytskyy and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Resolution of Static Clones in Dynamic Web Pages},
  booktitle    = {5th International Workshop on Web Site Evolution {(WSE} 2003) - Architecture,
                  22 September 2003, Amsterdam, The Netherlands},
  pages        = {49},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/WSE.2003.1234008},
  doi          = {10.1109/WSE.2003.1234008},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wse/SynytskyyCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/CordyDMS02,
  author       = {James R. Cordy and
                  Thomas R. Dean and
                  Andrew J. Malton and
                  Kevin A. Schneider},
  title        = {Source transformation in software engineering using the {TXL} transformation
                  system},
  journal      = {Inf. Softw. Technol.},
  volume       = {44},
  number       = {13},
  pages        = {827--837},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0950-5849(02)00104-0},
  doi          = {10.1016/S0950-5849(02)00104-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/CordyDMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/JinCD02,
  author       = {Dean Jin and
                  James R. Cordy and
                  Thomas R. Dean},
  title        = {Where's the Schema? {A} Taxonomy of Patterns for Software Exchange},
  booktitle    = {10th International Workshop on Program Comprehension {(IWPC} 2002),
                  27-29 June 2002, Paris, France},
  pages        = {65--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/WPC.2002.1021320},
  doi          = {10.1109/WPC.2002.1021320},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/JinCD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/DeanCMS02,
  author       = {Thomas R. Dean and
                  James R. Cordy and
                  Andrew J. Malton and
                  Kevin A. Schneider},
  title        = {Grammar Programming in {TXL}},
  booktitle    = {2nd {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2002), 1 October 2002, Montreal, Canada},
  pages        = {93},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SCAM.2002.1134109},
  doi          = {10.1109/SCAM.2002.1134109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/DeanCMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/DeanCSM01,
  author       = {Thomas R. Dean and
                  James R. Cordy and
                  Kevin A. Schneider and
                  Andrew J. Malton},
  title        = {Using Design Recovery Techniques to Transform Legacy Systems},
  booktitle    = {2001 International Conference on Software Maintenance, {ICSM} 2001,
                  Florence, Italy, November 6-10, 2001},
  pages        = {622--631},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICSM.2001.972779},
  doi          = {10.1109/ICSM.2001.972779},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/DeanCSM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/MaltonSCDCR01,
  author       = {Andrew J. Malton and
                  Kevin A. Schneider and
                  James R. Cordy and
                  Thomas R. Dean and
                  Darren Cousineau and
                  Jason Reynolds},
  title        = {Processing Software Source Text in Automated Design Recovery and Transformation},
  booktitle    = {9th International Workshop on Program Comprehension {(IWPC} 2001),
                  12-13 May 2001, Toronto, Canada},
  pages        = {127--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/WPC.2001.921724},
  doi          = {10.1109/WPC.2001.921724},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/MaltonSCDCR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/CordySDM01,
  author       = {James R. Cordy and
                  Kevin A. Schneider and
                  Thomas R. Dean and
                  Andrew J. Malton},
  title        = {{HSML:} Design Directed Source Code Hot Spots},
  booktitle    = {9th International Workshop on Program Comprehension {(IWPC} 2001),
                  12-13 May 2001, Toronto, Canada},
  pages        = {145--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/WPC.2001.921726},
  doi          = {10.1109/WPC.2001.921726},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwpc/CordySDM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/CordyDMS01,
  author       = {James R. Cordy and
                  Thomas R. Dean and
                  Andrew J. Malton and
                  Kevin A. Schneider},
  title        = {Software Engineering by Source Transformation-Experience with {TXL}},
  booktitle    = {1st {IEEE} International Workshop on Source Code Analysis and Manipulation
                  {(SCAM} 2001), 10 November 2001, Florence, Italy},
  pages        = {170--180},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SCAM.2001.972678},
  doi          = {10.1109/SCAM.2001.972678},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scam/CordyDMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/DeanMH01,
  author       = {Thomas R. Dean and
                  Andrew J. Malton and
                  Richard C. Holt},
  editor       = {Elizabeth Burd and
                  Peter Aiken and
                  Rainer Koschke},
  title        = {Union Schemas as a Basis for a {C++} Extractor},
  booktitle    = {Proceedings of the Eighth Working Conference on Reverse Engineering,
                  WCRE'01, Stuttgart, Germany, October 2-5, 2001},
  pages        = {59},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/WCRE.2001.957810},
  doi          = {10.1109/WCRE.2001.957810},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/DeanMH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/DeanC95,
  author       = {Thomas R. Dean and
                  James R. Cordy},
  title        = {A Syntactic Theory of Software Architecture},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {21},
  number       = {4},
  pages        = {302--313},
  year         = {1995},
  url          = {https://doi.org/10.1109/32.385969},
  doi          = {10.1109/32.385969},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/DeanC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/DeanL94,
  author       = {Thomas R. Dean and
                  David Alex Lamb},
  editor       = {John E. Botsford and
                  Ann Gawman and
                  W. Morven Gentleman and
                  Evelyn Kidd and
                  Kelly A. Lyons and
                  Jacob Slonim and
                  J. Howard Johnson},
  title        = {A theory model core for module interconnection languages},
  booktitle    = {Proceedings of the 1994 Conference of the Centre for Advanced Studies
                  on Collaborative Research, October 31 - November 3, 1994, Toronto,
                  Ontario, Canada},
  pages        = {13},
  publisher    = {{IBM}},
  year         = {1994},
  url          = {https://dl.acm.org/citation.cfm?id=782198},
  timestamp    = {Fri, 30 Nov 2018 02:24:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cascon/DeanL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/DeanC93,
  author       = {Thomas R. Dean and
                  James R. Cordy},
  editor       = {David Alex Lamb},
  title        = {Software Structure Characterization Using Connectivity},
  booktitle    = {Studies of Software Design, ICSE'93 Workshop, Baltimore, Maryland,
                  USA, May 17-18, 1993, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1078},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/BFb0030518},
  doi          = {10.1007/BFB0030518},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/DeanC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics