default search action
Derrick G. Kourie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c59]Tobias Runge, Ina Schaefer, Loek Cleophas, Thomas Thüm, Derrick G. Kourie, Bruce W. Watson:
Tool Support for Correctness-by-Construction. Software Engineering 2021: 93-94
2010 – 2019
- 2019
- [c58]Tobias Runge, Ina Schaefer, Loek Cleophas, Thomas Thüm, Derrick G. Kourie, Bruce W. Watson:
Tool Support for Correctness-by-Construction. FASE 2019: 25-42 - 2018
- [c57]Derrick G. Kourie, Tinus Strauss, Loek Cleophas, Bruce W. Watson:
Using CSP to Develop Quality Concurrent Software. Principled Software Development 2018: 165-184 - [c56]Ina Schaefer, Tobias Runge, Alexander Knüppel, Loek Cleophas, Derrick G. Kourie, Bruce W. Watson:
Towards Confidentiality-by-Construction. ISoLA (1) 2018: 502-515 - 2017
- [j39]Madoda Nxumalo, Derrick G. Kourie, Loek Cleophas, Bruce W. Watson:
An Assessment of Algorithms for Deriving Failure Deterministic Finite Automata. South Afr. Comput. J. 29(1) (2017) - [c55]Tinus Strauss, Bruce W. Watson, Derrick G. Kourie, Loek Cleophas:
CSP for Parallelising Brzozowski's DFA Construction Algorithm. The Role of Theory in Computer Science 2017: 217-244 - 2016
- [c54]Bruce W. Watson, Derrick G. Kourie, Ina Schaefer, Loek Cleophas:
Correctness-by-Construction and Post-hoc Verification: A Marriage of Convenience? ISoLA (1) 2016: 730-748 - [c53]Loek Cleophas, Derrick G. Kourie, Vreda Pieterse, Ina Schaefer, Bruce W. Watson:
Correctness-by-Construction \wedge Taxonomies \Rightarrow Deep Comprehension of Algorithm Families. ISoLA (1) 2016: 766-783 - 2015
- [j38]Bruce W. Watson, Derrick G. Kourie, Loek G. Cleophas:
Experience with correctness-by-construction. Sci. Comput. Program. 97: 55-58 (2015) - [c52]Madoda Nxumalo, Derrick G. Kourie, Loek G. Cleophas, Bruce W. Watson:
An Aho-Corasick Based Assessment of Algorithms Generating Failure Deterministic Finite Automata. CLA 2015: 87-98 - [c51]Bruce W. Watson, Derrick G. Kourie, Loek G. Cleophas:
Quantum Leap Pattern Matching. Stringology 2015: 104-117 - [e1]Richard J. Barnett, Loek G. Cleophas, Derrick G. Kourie, Daniel B. le Roux, Bruce W. Watson:
Proceedings of the 2015 Annual Research Conference on South African Institute of Computer Scientists and Information Technologists, SAICSIT '15, Stellenbosch, South Africa, September 28-30, 2015. ACM 2015, ISBN 978-1-4503-3683-3 [contents] - 2014
- [j37]Daniel Acton, Derrick G. Kourie, Bruce W. Watson:
Quality in software development: a pragmatic approach using metrics. South Afr. Comput. J. 52: 1-12 (2014) - [j36]Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Weak factor automata: the failure of failure factor oracles? South Afr. Comput. J. 53: 1-14 (2014) - [c50]Derrick G. Kourie, Bruce W. Watson, Tinus Strauss, Loek G. Cleophas, Melanie Mauch:
Empirically Assessing Algorithm Performance. SAICSIT 2014: 115 - [c49]Bernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie:
Light Beam Tracing for Multi-Bounce Specular and Glossy Transport Paths. SAICSIT 2014: 199 - [c48]Tinus Strauss, Derrick G. Kourie, Bruce W. Watson, Loek G. Cleophas:
A Process-Oriented Implementation of Brzozowski's DFA Construction Algorithm. Stringology 2014: 17-29 - [c47]Bruce W. Watson, Loek G. Cleophas, Derrick G. Kourie:
Using Correctness-by-Construction to Derive Dead-zone Algorithms. Stringology 2014: 84-95 - 2013
- [j35]Emmad Saadeh, Derrick G. Kourie:
Refactoring with Ordered Collections of Fine-Grain Transformations. Int. J. Softw. Eng. Knowl. Eng. 23(3): 309-340 (2013) - [j34]Corné de Ridder, Derrick G. Kourie, Bruce W. Watson, T. R. Fourie, P. V. Reyneke:
Fine-tuning the search for microsatellites. J. Discrete Algorithms 20: 21-37 (2013) - [c46]Bernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie:
Numerical verification of bidirectional reflectance distribution functions for physical plausibility. SAICSIT 2013: 200-208 - [c45]Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Efficient representation of DNA data for pattern recognition using failure factor oracles. SAICSIT 2013: 369-377 - [c44]Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Weak Factor Automata: Comparing (Failure) Oracles and Storacles. Stringology 2013: 176-190 - 2012
- [b1]Derrick G. Kourie, Bruce W. Watson:
The Correctness-by-Construction Approach to Programming. Springer 2012, ISBN 978-3-642-27918-8, pp. I-XIII, 1-264 - [j33]Costas S. Iliopoulos, Derrick G. Kourie, Laurent Mouchard, Themba K. Musombuka, Solon P. Pissis, Corné de Ridder:
An algorithm for mapping short reads to a dynamically changing genomic sequence. J. Discrete Algorithms 10: 15-22 (2012) - [c43]Fritz Venter, Bruce W. Watson, Derrick G. Kourie:
Multiple Keyword Pattern Matching using Position Encoded Pattern Lattices. CLA 2012: 281-292 - [c42]Bruce W. Watson, Derrick G. Kourie, Tinus Strauss:
A Sequential Recursive Implementation of Dead-Zone Single Keyword Pattern Matching. IWOCA 2012: 236-248 - [c41]Melanie Mauch, Derrick G. Kourie, Bruce W. Watson, Tinus Strauss:
Performance assessment of dead-zone single keyword pattern matching. SAICSIT 2012: 59-68 - [c40]Derrick G. Kourie, Bruce W. Watson, Loek G. Cleophas, Fritz Venter:
Failure Deterministic Finite Automata. Stringology 2012: 28-41 - 2011
- [j32]Bernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie:
Extending Backward Polygon Beam Tracing to Glossy Scattering Surfaces. Comput. Graph. Forum 30(6): 1825-1836 (2011) - [c39]Derrick G. Kourie, Bruce W. Watson, Loek G. Cleophas:
On Compile Time Knuth-Morris-Pratt Precomputation. Stringology 2011: 15-29 - 2010
- [j31]A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff, Derrick G. Kourie:
A security privacy aware architecture and protocol for a single smart card used for multiple services. Comput. Secur. 29(4): 393-409 (2010) - [c38]Bernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie:
Exploring the use of glossy light volumes for interactive global illumination. Afrigraph 2010: 139-148 - [c37]Antony K. Cooper, Derrick G. Kourie, Serena Coetzee:
Thoughts on Exploiting Instability in Lattices for Assessing the Discrimination Adequacy of a Taxonomy. CLA 2010: 338-343 - [c36]Derrick G. Kourie, Bruce W. Watson:
Software engineering in South Africa. ICSE (2) 2010: 323-324 - [c35]Linda Marshall, Derrick G. Kourie:
Deriving a digraph isomorphism for digraph compliance measurement. SAICSIT 2010: 160-169 - [c34]Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson:
A framework for benchmarking FA-based string recognizers. SAICSIT 2010: 220-230 - [c33]Vreda Pieterse, Derrick G. Kourie, Loek G. Cleophas, Bruce W. Watson:
Performance of C++ bit-vector implementations. SAICSIT 2010: 242-250 - [c32]Noud de Beijer, Loek G. Cleophas, Derrick G. Kourie, Bruce W. Watson:
Improving Automata Efficiency by Stretching and Jamming. Stringology 2010: 9-24 - [c31]Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie:
Formal Characterizations of FA-based String Processors. Stringology 2010: 183-185
2000 – 2009
- 2009
- [j30]Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff:
Building access control models with attribute exploration. Comput. Secur. 28(1-2): 2-7 (2009) - [j29]Derrick G. Kourie, D. Fick, Bruce W. Watson:
Virtual machine framework for constructing domain-specific languages. IET Softw. 3(1): 1-13 (2009) - [j28]Wikus Coetser, Derrick G. Kourie, Bruce W. Watson:
On Regular Expression Hashing to Reduce FA Size. Int. J. Found. Comput. Sci. 20(6): 1069-1086 (2009) - [j27]Gareth Nicholls, Derrick G. Kourie, Tinus Strauss:
Sensitivity analysis of Voronoi-based sensor deployment and reconfiguration algorithms. South Afr. Comput. J. 43: 35-43 (2009) - [j26]Derrick G. Kourie, Sergei A. Obiedkov, Bruce W. Watson, Dean van der Merwe:
An incremental algorithm to construct a lattice of set intersections. Sci. Comput. Program. 74(3): 128-142 (2009) - [c30]Fritz Venter, Derrick G. Kourie, Bruce W. Watson:
FCA-Based Two Dimensional Pattern Matching. ICFCA 2009: 299-313 - [c29]Emmad Saadeh, Derrick G. Kourie:
Composite refactoring using fine-grained transformations. SAICSIT 2009: 22-29 - [c28]Pieter van Zyl, Derrick G. Kourie, Louis Coetzee, Andrew Boake:
The influence of optimisations on the performance of an object relational mapping tool. SAICSIT 2009: 150-159 - [c27]Loek G. Cleophas, Derrick G. Kourie, Tinus Strauss, Bruce W. Watson:
On Minimizing Deterministic Tree Automata. Stringology 2009: 173-182 - 2008
- [j25]Tinus Strauss, Derrick G. Kourie, Martin S. Olivier:
A comparison of simulated traffic conditioner performance. Comput. Commun. 31(17): 3933-3940 (2008) - [j24]Iwan Vosloo, Derrick G. Kourie:
Server-centric Web frameworks: An overview. ACM Comput. Surv. 40(2): 4:1-4:33 (2008) - [j23]Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson:
On Implementation and Performance of Table-Driven DFA-Based String Processors. Int. J. Found. Comput. Sci. 19(1): 53-70 (2008) - [j22]Tinus Strauss, Derrick G. Kourie, Bruce W. Watson:
A Concurrent Specification of Brzozowski's DFA Construction Algorithm. Int. J. Found. Comput. Sci. 19(1): 125-135 (2008) - [j21]Bruce W. Watson, Derrick G. Kourie, Tinus Strauss, Ernest Ketcha Ngassam, Loek G. Cleophas:
Efficient Automata Constructions and Approximate Automata. Int. J. Found. Comput. Sci. 19(1): 185-193 (2008) - [j20]Camille Roth, Sergei A. Obiedkov, Derrick G. Kourie:
On Succinct Representation of Knowledge Community Taxonomies with Formal Concept Analysis. Int. J. Found. Comput. Sci. 19(2): 383-404 (2008) - [c26]Eckhard B. Kohlmeyer, Gerhard P. Hancke, Derrick G. Kourie:
A Cross-Layer Approach Towards Efficiency Optimization of Wireless Sensor and Actor Networks. BroadCom 2008: 329-334 - [c25]Stefan Gruner, Derrick G. Kourie, Markus Roggenbach, Tinus Strauss, Bruce W. Watson:
A New CSP Operator for Optional Parallelism. CSSE (2) 2008: 788-791 - [c24]Emmad Saadeh, Derrick G. Kourie, Andrew Boake:
An Algorithm for Ordering Refactorings Based on Fine-Grained Model Transformations. SoMeT 2008: 225-243 - [c23]Tinus Strauss, Derrick G. Kourie, Bruce W. Watson:
A Concurrent Specification of an Incremental DFA Minimisation Algorithm. Stringology 2008: 218-226 - [c22]Wikus Coetser, Derrick G. Kourie, Bruce W. Watson:
On Regular Expression Hashing to Reduce FA Size. Stringology 2008: 227-241 - 2007
- [j19]T. Botha, Derrick G. Kourie, Bruce W. Watson:
A Word Game Support Tool Case Study. ARIMA J. 6: 7 (2007) - [j18]Derrick G. Kourie:
Editorial. South Afr. Comput. J. 38: 1 (2007) - [c21]Morkel Theunissen, Derrick G. Kourie, Andrew Boake:
Corporate-, Agile- and Open Source Software Development: A Witch's Brew or An Elixir of Life?. CEE-SET 2007: 84-95 - [c20]Riaan Klopper, Stefan Gruner, Derrick G. Kourie:
Assessment of a framework to compare software development methodologies. SAICSIT 2007: 56-65 - [c19]Mandy Northover, Alan Northover, Stefan Gruner, Derrick G. Kourie, Andrew Boake:
Agile software development: a contemporary philosophical perspective. SAICSIT 2007: 106-115 - [c18]Bernardt Duvenhage, Derrick G. Kourie:
Migrating to a real-time distributed parallel simulator architecture. SCSC 2007: 575-582 - 2006
- [j17]Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff:
Uncovering identities: A study into VPN tunnel fingerprinting. Comput. Secur. 25(2): 97-105 (2006) - [j16]Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie:
Dynamic Allocation of Finite Automata States for Fast String Recognition. Int. J. Found. Comput. Sci. 17(6): 1307-1324 (2006) - [j15]Sadok Ben Yahia, Derrick G. Kourie, Engelbert Mephu Nguifo:
Editorial introduction to special ARIMA / SACJ joint issue on advances in end-user data mining techniques. South Afr. Comput. J. 36: 1-3 (2006) - [j14]T. Botha, Derrick G. Kourie, Bruce W. Watson:
A word game support tool case study. South Afr. Comput. J. 36: 86-94 (2006) - [j13]Loek G. Cleophas, Bruce W. Watson, Derrick G. Kourie, Andrew Boake, Sergei A. Obiedkov:
TABASCO: using concept-based taxonomies in domain engineering. South Afr. Comput. J. 37: 30-40 (2006) - [j12]Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson:
Performance of hardcoded finite automata. Softw. Pract. Exp. 36(5): 525-538 (2006) - [c17]Martin Drozdz, Derrick G. Kourie, Bruce W. Watson, Andrew Boake:
Refactoring Tools and Complementary Techniques. AICCSA 2006: 685-688 - [c16]Camille Roth, Sergei A. Obiedkov, Derrick G. Kourie:
Towards Concise Representation for Taxonomies of Epistemic Communities. CLA 2006: 240-255 - [c15]Mandy Northover, Andrew Boake, Derrick G. Kourie:
Karl Popper's Critical Rationalism in Agile Software Development. ICCS 2006: 360-373 - [c14]Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff:
On Lattices in Access Control Models. ICCS 2006: 374-387 - [c13]Tinus Strauss, Martin S. Olivier, Derrick G. Kourie:
Logical Traffic Isolation Using Differentiated Services. IFIP Int. Conf. Digital Forensics 2006: 229-237 - [c12]Tinus Strauss, Derrick G. Kourie, Bruce W. Watson:
A concurrent specification of Brzozowski's DFA construction algorithm. Stringology 2006: 90-99 - [c11]Bruce W. Watson, Derrick G. Kourie, Ernest Ketcha Ngassam, Tinus Strauss, Loek G. Cleophas:
Efficient automata constructions and approximate automata. Stringology 2006: 100-107 - [c10]Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson:
On implementation and performance of table-driven DFA-based string processors. Stringology 2006: 108-122 - [c9]Corné de Ridder, Derrick G. Kourie, Bruce W. Watson:
FireµSat: An algorithm to detect microsatellites in DNA. Stringology 2006: 137-150 - 2005
- [j11]Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie:
A framework for the dynamic implementation of finite automata for performance enhancement. Int. J. Found. Comput. Sci. 16(6): 1193-1206 (2005) - [j10]Derrick G. Kourie:
Editorial. South Afr. Comput. J. 34: 1 (2005) - [j9]Derrick G. Kourie:
Editorial. South Afr. Comput. J. 35: 1 (2005) - [c8]Vafa D. Izadinia, Jan H. P. Eloff, Derrick G. Kourie:
Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. ISSA 2005: 1-14 - [c7]Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson:
Reordering finite automata states for fast string recognition. Stringology 2005: 69-80 - 2004
- [j8]Gabor Barla-Szabo, Bruce W. Watson, Derrick G. Kourie:
Taxonomy of directed graph representations. IEE Proc. Softw. 151(6): 257-264 (2004) - [c6]Dean van der Merwe, Sergei A. Obiedkov, Derrick G. Kourie:
AddIntent: A New Incremental Algorithm for Constructing Concept Lattices. ICFCA 2004: 372-385 - [c5]Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie:
A Framework for the Dynamic Implementation of Finite Automata for Performance Enhancement. Stringology 2004: 155-167 - [c4]Vreda Pieterse, Derrick G. Kourie, Andrew Boake:
Literate Programming to Enhance Agile Methods. XP 2004: 250-253 - 2003
- [j7]R. L. Engelbrecht, Derrick G. Kourie:
Translating smalltalk blocks into Java. IEE Proc. Softw. 150(3): 203-211 (2003) - [j6]Derrick G. Kourie:
Editorial. South Afr. Comput. J. 31: 1-1 (2003) - [c3]Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie:
Preliminary Experiments in Hardcoding Finite Automata. CIAA 2003: 299-300 - 2002
- [j5]F. J. Van Der Merwe, Derrick G. Kourie:
Compressed pseudo-lattices. J. Exp. Theor. Artif. Intell. 14(2-3): 229-254 (2002) - [j4]Derrick G. Kourie:
Editorial notes. South Afr. Comput. J. 28: 1-2 (2002) - 2001
- [j3]L. I. Manolache, Derrick G. Kourie:
Software testing using model programs. Softw. Pract. Exp. 31(13): 1211-1236 (2001)
1990 – 1999
- 1998
- [j2]Derrick G. Kourie, G. Deon Oosthuizen:
Lattices in Machine Learning: Complexity Issues. Acta Informatica 35(4): 269-292 (1998) - [c2]Lebelo Serutla, Derrick G. Kourie:
Sentence Analysis Using a Concept Lattice. AMTA 1998: 225-235 - [c1]R. L. Engelbrecht, Derrick G. Kourie:
Issues in Translating Smalltalk into Java. CC 1998: 249-263
1980 – 1989
- 1987
- [j1]Derrick G. Kourie:
The Design and Use of a Prolog Trace Generator for CSP. Softw. Pract. Exp. 17(7): 423-438 (1987)
Coauthor Index
aka: Loek G. Cleophas
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint