Остановите войну!
for scientists:
default search action
Bruce W. Watson
- > Home > Persons > Bruce W. Watson
Publications
- 2022
- [c84]Tabea Bordis, Loek Cleophas, Alexander Kittelmann, Tobias Runge, Ina Schaefer, Bruce W. Watson:
Re-CorC-ing KeY: Correct-by-Construction Software Development Based on KeY. The Logic of Software. A Tasting Menu of Formal Methods 2022: 80-104 - 2021
- [c81]Tobias Runge, Ina Schaefer, Loek Cleophas, Thomas Thüm, Derrick G. Kourie, Bruce W. Watson:
Tool Support for Correctness-by-Construction. Software Engineering 2021: 93-94 - [c80]Ina Schaefer, Tobias Runge, Loek Cleophas, Bruce W. Watson:
Tutorial: The Correctness-by-Construction Approach to Programming Using CorC. SecDev 2021: 1-2 - 2020
- [c76]Maurice H. ter Beek, Loek Cleophas, Axel Legay, Ina Schaefer, Bruce W. Watson:
X-by-Construction - Correctness Meets Probability. ISoLA (1) 2020: 211-215 - 2019
- [c74]Tobias Runge, Ina Schaefer, Loek Cleophas, Thomas Thüm, Derrick G. Kourie, Bruce W. Watson:
Tool Support for Correctness-by-Construction. FASE 2019: 25-42 - [c73]Tobias Runge, Thomas Thüm, Loek Cleophas, Ina Schaefer, Bruce W. Watson:
Comparing Correctness-by-Construction with Post-Hoc Verification - A Qualitative User Study. FM Workshops (2) 2019: 388-405 - 2018
- [j39]Loek Cleophas, Ina Schaefer, Bruce W. Watson:
Workshop on Advances in Knowledge Extraction and Re-engineering of Software (selected and extended papers from WAKERS 2017). Sci. Comput. Program. 166: 1-2 (2018) - [c70]Derrick G. Kourie, Tinus Strauss, Loek Cleophas, Bruce W. Watson:
Using CSP to Develop Quality Concurrent Software. Principled Software Development 2018: 165-184 - [c69]Maurice H. ter Beek, Loek Cleophas, Ina Schaefer, Bruce W. Watson:
X-by-Construction. ISoLA (1) 2018: 359-364 - [c68]Ina Schaefer, Tobias Runge, Alexander Knüppel, Loek Cleophas, Derrick G. Kourie, Bruce W. Watson:
Towards Confidentiality-by-Construction. ISoLA (1) 2018: 502-515 - 2017
- [j37]Madoda Nxumalo, Derrick G. Kourie, Loek Cleophas, Bruce W. Watson:
An Assessment of Algorithms for Deriving Failure Deterministic Finite Automata. South Afr. Comput. J. 29(1) (2017) - [c66]Tinus Strauss, Bruce W. Watson, Derrick G. Kourie, Loek Cleophas:
CSP for Parallelising Brzozowski's DFA Construction Algorithm. The Role of Theory in Computer Science 2017: 217-244 - [c65]Tobias Runge, Ina Schaefer, Loek Cleophas, Bruce W. Watson:
Many-MADFAct: Concurrently Constructing MADFAs. Stringology 2017: 126-142 - 2016
- [c63]Ina Schaefer, Christoph Seidl, Loek Cleophas, Bruce W. Watson:
Tax-PLEASE - Towards Taxonomy-Based Software Product Line Engineering. ICSR 2016: 63-70 - [c62]Bruce W. Watson, Derrick G. Kourie, Ina Schaefer, Loek Cleophas:
Correctness-by-Construction and Post-hoc Verification: A Marriage of Convenience? ISoLA (1) 2016: 730-748 - [c61]Loek Cleophas, Derrick G. Kourie, Vreda Pieterse, Ina Schaefer, Bruce W. Watson:
Correctness-by-Construction \wedge Taxonomies \Rightarrow Deep Comprehension of Algorithm Families. ISoLA (1) 2016: 766-783 - [c60]Kamil Awid, Loek Cleophas, Bruce W. Watson:
Using Human Computation in Dead-zone based 2D Pattern Matching. Stringology 2016: 22-32 - 2015
- [j36]Bruce W. Watson, Derrick G. Kourie, Loek G. Cleophas:
Experience with correctness-by-construction. Sci. Comput. Program. 97: 55-58 (2015) - [c58]Madoda Nxumalo, Derrick G. Kourie, Loek G. Cleophas, Bruce W. Watson:
An Aho-Corasick Based Assessment of Algorithms Generating Failure Deterministic Finite Automata. CLA 2015: 87-98 - [c57]Ina Schaefer, Christoph Seidl, Loek G. Cleophas, Bruce W. Watson:
SPLicing TABASCO: Custom-Tailored Software Product Line Variants from Taxonomy-Based Toolkits. SAICSIT 2015: 34:1-34:10 - [c56]Bruce W. Watson, Derrick G. Kourie, Loek G. Cleophas:
Quantum Leap Pattern Matching. Stringology 2015: 104-117 - [e4]Richard J. Barnett, Loek G. Cleophas, Derrick G. Kourie, Daniel B. le Roux, Bruce W. Watson:
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, SAICSIT '15, Stellenbosch, South Africa, September 28-30, 2015. ACM 2015, ISBN 978-1-4503-3683-3 [contents] - 2014
- [j34]Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Weak factor automata: the failure of failure factor oracles? South Afr. Comput. J. 53: 1-14 (2014) - [c52]Derrick G. Kourie, Bruce W. Watson, Tinus Strauss, Loek G. Cleophas, Melanie Mauch:
Empirically Assessing Algorithm Performance. SAICSIT 2014: 115 - [c51]Tinus Strauss, Derrick G. Kourie, Bruce W. Watson, Loek G. Cleophas:
A Process-Oriented Implementation of Brzozowski's DFA Construction Algorithm. Stringology 2014: 17-29 - [c50]Bruce W. Watson, Loek G. Cleophas, Derrick G. Kourie:
Using Correctness-by-Construction to Derive Dead-zone Algorithms. Stringology 2014: 84-95 - 2013
- [c47]Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Efficient representation of DNA data for pattern recognition using failure factor oracles. SAICSIT 2013: 369-377 - [c46]Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Weak Factor Automata: Comparing (Failure) Oracles and Storacles. Stringology 2013: 176-190 - 2012
- [c41]Derrick G. Kourie, Bruce W. Watson, Loek G. Cleophas, Fritz Venter:
Failure Deterministic Finite Automata. Stringology 2012: 28-41 - 2011
- [c39]Derrick G. Kourie, Bruce W. Watson, Loek G. Cleophas:
On Compile Time Knuth-Morris-Pratt Precomputation. Stringology 2011: 15-29 - 2010
- [j32]Loek G. Cleophas, Bruce W. Watson, Gerard Zwaan:
A new taxonomy of sublinear right-to-left scanning keyword pattern matching algorithms. Sci. Comput. Program. 75(11): 1095-1112 (2010) - [c36]Vreda Pieterse, Derrick G. Kourie, Loek G. Cleophas, Bruce W. Watson:
Performance of C++ bit-vector implementations. SAICSIT 2010: 242-250 - [c35]Noud de Beijer, Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Improving Automata Efficiency by Stretching and Jamming. Stringology 2010: 9-24 - 2009
- [c32]Loek G. Cleophas, Derrick G. Kourie, Tinus Strauss, Bruce W. Watson:
On Minimizing Deterministic Tree Automata. Stringology 2009: 173-182 - 2008
- [j26]Bruce W. Watson, Derrick G. Kourie, Tinus Strauss, Ernest Ketcha Ngassam, Loek G. Cleophas:
Efficient Automata Constructions and Approximate Automata. Int. J. Found. Comput. Sci. 19(1): 185-193 (2008) - [j25]Loek G. Cleophas, Bruce W. Watson:
A Boyer-Moore-Horspool algorithm derivation. South Afr. Comput. J. 41: 13-20 (2008) - 2006
- [j21]Loek G. Cleophas, Bruce W. Watson, Derrick G. Kourie, Andrew Boake, Sergei A. Obiedkov:
TABASCO: using concept-based taxonomies in domain engineering. South Afr. Comput. J. 37: 30-40 (2006) - [c25]Bruce W. Watson, Derrick G. Kourie, Ernest Ketcha Ngassam, Tinus Strauss, Loek G. Cleophas:
Efficient automata constructions and approximate automata. Stringology 2006: 100-107 - 2005
- [j19]Loek G. Cleophas, Bruce W. Watson:
Taxonomy-based software construction of SPARE Time: a case study. IEE Proc. Softw. 152(1): 29-37 (2005) - [j17]Loek G. Cleophas, Gerard Zwaan, Bruce W. Watson:
Constructing Factor Oracles. J. Autom. Lang. Comb. 10(5/6): 627-640 (2005) - 2004
- [j14]Bruce W. Watson, Loek G. Cleophas:
SPARE Parts: a C++ toolkit for string pattern recognition. Softw. Pract. Exp. 34(7): 697-710 (2004) - [c20]Loek G. Cleophas, Bruce W. Watson, Gerard Zwaan:
Automaton-Based Sublinear Keyword Pattern Matching. SPIRE 2004: 18-29 - [c18]Michiel Frishert, Loek G. Cleophas, Bruce W. Watson:
FIRE Station: An Environment for Manipulating Finite Automata and Regular Expression Views. CIAA 2004: 125-133 - 2003
- [c15]Loek G. Cleophas, Gerard Zwaan, Bruce W. Watson:
Constructing Factor Oracles. Stringology 2003: 37-50 - [c13]Michiel Frishert, Loek G. Cleophas, Bruce W. Watson:
The Effect of Rewriting Regular Expressions on Their Accepting Automata. CIAA 2003: 304-305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint