The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James R. Cordy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard C. Holt, James R. Cordy, David B. Wortman
    An Introduction to S/SL: Syntax/Semantic Language. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1982, v:4, n:2, pp:149-178 [Journal]
  2. Richard C. Holt, David B. Wortman, James R. Cordy, David R. Crowe
    The Euclid Language: a progress report. [Citation Graph (0, 0)][DBLP]
    ACM Annual Conference (1), 1978, pp:111-115 [Conf]
  3. Rateb Abu-Hamdeh, James R. Cordy, T. Patrick Martin
    Schema translation using structural transformation. [Citation Graph (0, 0)][DBLP]
    CASCON, 1994, pp:1- [Conf]
  4. James R. Cordy, Thomas R. Dean, Nikita Synytskyy
    Practical language-independent detection of near-miss clones. [Citation Graph (0, 0)][DBLP]
    CASCON, 2004, pp:1-12 [Conf]
  5. James R. Cordy, Anatol W. Kark
    Workshops of CASCON 2005/Ateliers de CASCON 20005. [Citation Graph (0, 0)][DBLP]
    CASCON, 2005, pp:283-291 [Conf]
  6. James R. Cordy, Medha Shukla
    Practical metaprogramming. [Citation Graph (0, 0)][DBLP]
    CASCON, 1992, pp:215-224 [Conf]
  7. Nikita Synytskyy, James R. Cordy, Thomas R. Dean
    Robust multilingual parsing using island grammars. [Citation Graph (0, 0)][DBLP]
    CASCON, 2003, pp:266-278 [Conf]
  8. Adrian D. Thurston, James R. Cordy
    A backtracking LR algorithm for parsing ambiguous context-dependent languages. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:39-53 [Conf]
  9. Elizabeth Dancy, James R. Cordy
    STAC: software tuning panels for autonomic control. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:146-160 [Conf]
  10. Dean Jin, James R. Cordy, Thomas R. Dean
    Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter. [Citation Graph (0, 0)][DBLP]
    CSMR, 2003, pp:399-408 [Conf]
  11. James R. Cordy, Ralf Lämmel, Andreas Winter
    05161 Executive Summary - Transformation Techniques in Software Engineering. [Citation Graph (0, 0)][DBLP]
    Transformation Techniques in Software Engineering, 2005, pp:- [Conf]
  12. Jurgen J. Vinju, James R. Cordy
    How to make a bridge between transformation and analysis technologies?. [Citation Graph (0, 0)][DBLP]
    Transformation Techniques in Software Engineering, 2005, pp:- [Conf]
  13. Kevin A. Schneider, James R. Cordy
    Abstract User Interfaces: A Model and Notation to Support Plasticity in Interactive Systems. [Citation Graph (0, 0)][DBLP]
    DSV-IS, 2001, pp:28-48 [Conf]
  14. Kevin A. Schneider, James R. Cordy
    AUI: A Programming Language for Developing Plastic Interactive Software. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:281- [Conf]
  15. Nadzeya Kiyavitskaya, Nicola Zeni, James R. Cordy, Luisa Mich, John Mylopoulos
    Applying Software Analysis Technology to Lightweight Semantic Markup of Document Text. [Citation Graph (0, 0)][DBLP]
    ICAPR (1), 2005, pp:590-600 [Conf]
  16. Richard Zanibbi, Dorothea Blostein, James R. Cordy
    Recognition Tasks Are Imitation Games. [Citation Graph (0, 0)][DBLP]
    ICAPR (1), 2005, pp:209-218 [Conf]
  17. James R. Cordy, T. C. Nicholas Graham
    GVL: A Graphical, Functional Language for the Specification of Output in Programming Languages. [Citation Graph (0, 0)][DBLP]
    ICCL, 1990, pp:11-22 [Conf]
  18. James R. Cordy, Charles D. Halpern-Hamu, Eric Promislow
    TXL: a rapid prototyping system for programming language dialects. [Citation Graph (0, 0)][DBLP]
    ICCL, 1988, pp:280-285 [Conf]
  19. James R. Cordy, Eric Promislow
    Specification and Automatic Prototype Implementation of Polymorphic Objects in TURING Using the TXL Dialect Processor. [Citation Graph (0, 0)][DBLP]
    ICCL, 1990, pp:145-154 [Conf]
  20. Richard Zanibbi, Dorothea Blostein, James R. Cordy
    Baseline Structure Analysis of Handwritten Mathematics Notation. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2001, pp:768-773 [Conf]
  21. Richard Zanibbi, Dorothea Blostein, James R. Cordy
    Historical Recall and Precision: Summarizing Generated Hypotheses. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2005, pp:202-206 [Conf]
  22. Richard Zanibbi, Dorothea Blostein, James R. Cordy
    The Recognition Strategy Language. [Citation Graph (0, 0)][DBLP]
    ICDAR, 2005, pp:565-569 [Conf]
  23. Dorothea Blostein, James R. Cordy, Richard Zanibbi
    Applying Compiler Techniques to Diagram Recognition. [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2002, pp:123-126 [Conf]
  24. Thomas R. Dean, James R. Cordy
    Software Structure Characterization Using Connectivity. [Citation Graph (0, 0)][DBLP]
    ICSE Workshop on Studies of Software Design, 1993, pp:33-48 [Conf]
  25. David B. Wortman, James R. Cordy
    Early Experiences with Euclid. [Citation Graph (0, 0)][DBLP]
    ICSE, 1981, pp:27-33 [Conf]
  26. Thomas R. Dean, James R. Cordy, Kevin A. Schneider, Andrew J. Malton
    Using Design Recovery Techniques to Transform Legacy Systems. [Citation Graph (0, 0)][DBLP]
    ICSM, 2001, pp:622-631 [Conf]
  27. Dean Jin, James R. Cordy
    Ontology-Based Software Analysis and Reengineering Tool Integration: The OASIS Service-Sharing Methodology. [Citation Graph (0, 0)][DBLP]
    ICSM, 2005, pp:613-616 [Conf]
  28. James R. Cordy
    Generalized Selective XML Markup of Source Code Using Agile Parsing. [Citation Graph (0, 0)][DBLP]
    IWPC, 2003, pp:144-153 [Conf]
  29. James R. Cordy
    Comprehending Reality - Practical Barriers to Industrial Adoption of Software Maintenance Automation. [Citation Graph (0, 0)][DBLP]
    IWPC, 2003, pp:196-206 [Conf]
  30. James R. Cordy, Kevin A. Schneider, Thomas R. Dean, Andrew J. Malton
    HSML: Design Directed Source Code Hot Spots. [Citation Graph (0, 0)][DBLP]
    IWPC, 2001, pp:145-156 [Conf]
  31. Dean Jin, James R. Cordy, Thomas R. Dean
    Where's the Schema? A Taxonomy of Patterns for Software Exchange. [Citation Graph (0, 0)][DBLP]
    IWPC, 2002, pp:65-74 [Conf]
  32. Andrew J. Malton, Kevin A. Schneider, James R. Cordy, Thomas R. Dean, Darren Cousineau, Jason Reynolds
    Processing Software Source Text in Automated Design Recovery and Transformation. [Citation Graph (0, 0)][DBLP]
    IWPC, 2001, pp:127-134 [Conf]
  33. Dean Jin, James R. Cordy
    Integrating Reverse Engineering Tools Using a Service-Sharing Methodology. [Citation Graph (0, 0)][DBLP]
    ICPC, 2006, pp:94-99 [Conf]
  34. Hoda Fahmy, Richard C. Holt, James R. Cordy
    Wins and Losses of Algebraic Transformations of Software Architectures. [Citation Graph (0, 0)][DBLP]
    ASE, 2001, pp:51-62 [Conf]
  35. Nadzeya Kiyavitskaya, Nicola Zeni, Luisa Mich, James R. Cordy, John Mylopoulos
    Text Mining Through Semi Automatic Semantic Annotation. [Citation Graph (0, 0)][DBLP]
    PAKM, 2006, pp:143-154 [Conf]
  36. Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel
    An empirical framework for comparing effectiveness of testing and property-based formal analysis. [Citation Graph (0, 0)][DBLP]
    PASTE, 2005, pp:2-5 [Conf]
  37. James R. Cordy
    Source transformation, analysis and generation in TXL. [Citation Graph (0, 0)][DBLP]
    PEPM, 2006, pp:1-11 [Conf]
  38. James R. Cordy, T. C. Nicholas Graham
    Design of an interpretive environment for Turing. [Citation Graph (0, 0)][DBLP]
    PLDI, 1987, pp:199-204 [Conf]
  39. Adrian D. Thurston, James R. Cordy
    Evolving TXL. [Citation Graph (0, 0)][DBLP]
    SCAM, 2006, pp:117-126 [Conf]
  40. James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
    Software Engineering by Source Transformation-Experience with TXL. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:170-180 [Conf]
  41. Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider
    Grammar Programming in TXL. [Citation Graph (0, 0)][DBLP]
    SCAM, 2002, pp:93-0 [Conf]
  42. Xinping Guo, James R. Cordy, Thomas R. Dean
    Unique Renaming of Java Using Source Transformation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:151-160 [Conf]
  43. Hongyu Zhang, Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel
    Implementation and Verification of Implicit-Invocation Systems Using Source Transformation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:87-96 [Conf]
  44. James R. Cordy, Richard C. Holt, David B. Wortman
    Semantic charts: A diagrammatic approach to semantic processing. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Symposium on Compiler Construction, 1979, pp:39-49 [Conf]
  45. Lei Wang, James R. Cordy, Thomas R. Dean
    Enhancing Security Using Legality Assertions. [Citation Graph (0, 0)][DBLP]
    WCRE, 2005, pp:35-44 [Conf]
  46. Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel, Michel Wermelinger
    A survey of self-management in dynamic software architecture specifications. [Citation Graph (0, 0)][DBLP]
    WOSS, 2004, pp:28-33 [Conf]
  47. Nikita Synytskyy, James R. Cordy, Thomas R. Dean
    Resolution of Static Clones in Dynamic Web Pages. [Citation Graph (0, 0)][DBLP]
    WSE, 2003, pp:49- [Conf]
  48. Derek M. Shimozawa, James R. Cordy
    TETE: A Non-Invasive Unit Testing Framework for Source Transformation. [Citation Graph (0, 0)][DBLP]
    STEP, 2005, pp:137-146 [Conf]
  49. Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider
    Agile Parsing in TXL. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2003, v:10, n:4, pp:311-336 [Journal]
  50. Andrea De Lucia, James R. Cordy, John Mylopoulos
    Introduction. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2004, v:11, n:1, pp:5-6 [Journal]
  51. Richard C. Holt, James R. Cordy
    The Turing Programming Language. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1988, v:31, n:12, pp:1410-1423 [Journal]
  52. Richard C. Holt, David B. Wortman, David T. Barnard, James R. Cordy
    SP/k: A System for Teaching Computer Programming. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1977, v:20, n:5, pp:301-309 [Journal]
  53. David T. Barnard, James R. Cordy
    SL Parses The LR Languages. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 1988, v:13, n:2, pp:65-74 [Journal]
  54. David T. Barnard, James R. Cordy
    Automatically Generating SL Parsers From LL(1) Grammars. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 1989, v:14, n:2, pp:93-98 [Journal]
  55. James R. Cordy, Mario Barbacci
    Introduction to the Special Issue on ICCL '92. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 1993, v:19, n:2, pp:63-64 [Journal]
  56. James R. Cordy, Charles D. Halpern-Hamu, Eric Promislow
    TXL: A Rapid Prototyping System for Programming Language Dialects. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 1991, v:16, n:1, pp:97-107 [Journal]
  57. Timothy Cassidy, James R. Cordy, Thomas R. Dean, Jürgen Dingel
    Source Transformation for Concurrency Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:4, pp:57-75 [Journal]
  58. James R. Cordy
    TXL - A Language for Programming Language Tools and Applications . [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:110, n:, pp:3-31 [Journal]
  59. Dean Jin, James R. Cordy
    Factbase Filtering Issues in an Ontology-Based Reverse Engineering Tool Integration System. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:137, n:3, pp:65-75 [Journal]
  60. Richard Zanibbi, Dorothea Blostein, James R. Cordy
    A survey of table recognition. [Citation Graph (0, 0)][DBLP]
    IJDAR, 2004, v:7, n:1, pp:1-16 [Journal]
  61. James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
    Source transformation in software engineering using the TXL transformation system. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:13, pp:827-837 [Journal]
  62. Richard Zanibbi, Dorothea Blostein, James R. Cordy
    Recognizing Mathematical Expressions Using Tree Transformation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2002, v:24, n:11, pp:1455-1467 [Journal]
  63. James R. Cordy
    The TXL source transformation language. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:61, n:3, pp:190-210 [Journal]
  64. Hongyu Zhang, Jeremy S. Bradbury, James R. Cordy, Jürgen Dingel
    Using source transformation to test and model check implicit-invocation systems. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2006, v:62, n:3, pp:209-227 [Journal]
  65. Stephen G. Perelgut, James R. Cordy
    Turing Plus: a comparison with C and Pascal. [Citation Graph (0, 0)][DBLP]
    SIGPLAN Notices, 1988, v:23, n:1, pp:137-143 [Journal]
  66. James R. Cordy
    Compile-Time Detection of Aliasing in Euclid Programs. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1984, v:14, n:8, pp:755-768 [Journal]
  67. James R. Cordy, Richard C. Holt
    Code Generation Using an Orthogonal Model. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1990, v:20, n:3, pp:301-320 [Journal]
  68. James R. Cordy, Nicholas L. Eliot, Michael G. Robertson
    TuringTool: A User Interface to Aid in the Software Maintenance Task. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1990, v:16, n:3, pp:294-301 [Journal]
  69. Thomas R. Dean, James R. Cordy
    A Syntactic Theory of Software Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1995, v:21, n:4, pp:302-313 [Journal]
  70. Dean Jin, James R. Cordy
    A Service-Sharing Methodology for Integrating COTS-Based Software Systems. [Citation Graph (0, 0)][DBLP]
    ICCBSS, 2006, pp:177-186 [Conf]
  71. Manar H. Alalfi, James R. Cordy, Thomas R. Dean
    A Survey of Analysis Models and Methods in Website Verification and Testing. [Citation Graph (0, 0)][DBLP]
    ICWE, 2007, pp:306-311 [Conf]
  72. Nicola Zeni, Nadzeya Kiyavitskaya, Luisa Mich, John Mylopoulos, James R. Cordy
    A Lightweight Approach to Semantic Annotation of Research Papers. [Citation Graph (0, 0)][DBLP]
    NLDB, 2007, pp:61-72 [Conf]
  73. Nadzeya Kiyavitskaya, Nicola Zeni, James R. Cordy, Luisa Mich, John Mylopoulos
    Semi-Automatic Semantic Annotations for Web Documents. [Citation Graph (0, 0)][DBLP]
    SWAP, 2005, pp:- [Conf]
  74. James R. Cordy, Harald Gall, Jonathan I. Maletic
    Guest editorial. [Citation Graph (0, 0)][DBLP]
    Software Quality Journal, 2006, v:14, n:3, pp:185-186 [Journal]

  75. Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. [Citation Graph (, )][DBLP]


  76. Euclid: a language for compiling quality software. [Citation Graph (, )][DBLP]


  77. Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection. [Citation Graph (, )][DBLP]


  78. Third International Workshop on Software Clones (IWSC). [Citation Graph (, )][DBLP]


  79. 06301 Working Session Summary: Presentation and Visualization of Redundant Code. [Citation Graph (, )][DBLP]


  80. Similarity in Programs. [Citation Graph (, )][DBLP]


  81. Automating the Extraction of Rights and Obligations for Regulatory Compliance. [Citation Graph (, )][DBLP]


  82. Towards automatic verification of Erlang programs by pi-calculus translation. [Citation Graph (, )][DBLP]


  83. Eating our own dog food: DSLs for generative and transformational engineering. [Citation Graph (, )][DBLP]


  84. Fourth International Workshop on Software Clones (IWSC). [Citation Graph (, )][DBLP]


  85. White-Box Evaluation of Computer Vision Algorithms through Explicit Decision-Making. [Citation Graph (, )][DBLP]


  86. Scenario-Based Comparison of Clone Detection Techniques. [Citation Graph (, )][DBLP]


  87. NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. [Citation Graph (, )][DBLP]


  88. Vector space analysis of software clones. [Citation Graph (, )][DBLP]


  89. Extracting rights and obligations from regulations: toward a tool-supported process. [Citation Graph (, )][DBLP]


  90. SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas. [Citation Graph (, )][DBLP]


  91. Automated Concept Location Using Independent Component Analysis. [Citation Graph (, )][DBLP]


  92. An Empirical Study of Function Clones in Open Source Software. [Citation Graph (, )][DBLP]


  93. Towards a mutation-based automatic framework for evaluating code clone detection tools. [Citation Graph (, )][DBLP]


  94. A verification framework for access control in dynamic web applications. [Citation Graph (, )][DBLP]


  95. Annotating Accommodation Advertisements Using CERNO. [Citation Graph (, )][DBLP]


  96. Eating Our Own Dog Food: DSLs for Generative and Transformational Engineering. [Citation Graph (, )][DBLP]


  97. Cerno: Light-weight tool support for semantic annotation of textual documents. [Citation Graph (, )][DBLP]


Search in 0.027secs, Finished in 0.030secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002