|
Search the dblp DataBase
Thomas R. Dean:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- James R. Cordy, Thomas R. Dean, Nikita Synytskyy
Practical language-independent detection of near-miss clones. [Citation Graph (0, 0)][DBLP] CASCON, 2004, pp:1-12 [Conf]
- Thomas R. Dean, David Alex Lamb
A theory model core for module interconnection languages. [Citation Graph (0, 0)][DBLP] CASCON, 1994, pp:13- [Conf]
- Sylvain Marquis, Thomas R. Dean, Scott Knight
SCL: a language for security testing of network applications. [Citation Graph (0, 0)][DBLP] CASCON, 2005, pp:155-164 [Conf]
- Nikita Synytskyy, James R. Cordy, Thomas R. Dean
Robust multilingual parsing using island grammars. [Citation Graph (0, 0)][DBLP] CASCON, 2003, pp:266-278 [Conf]
- Songtao Zhang, Thomas R. Dean, Scott Knight
A lightweight approach to state based security testing. [Citation Graph (0, 0)][DBLP] CASCON, 2006, pp:341-344 [Conf]
- Sylvain Marquis, Thomas R. Dean, Scott Knight
Packet decoding using context sensitive parsing. [Citation Graph (0, 0)][DBLP] CASCON, 2006, pp:263-274 [Conf]
- Dean Jin, James R. Cordy, Thomas R. Dean
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter. [Citation Graph (0, 0)][DBLP] CSMR, 2003, pp:399-408 [Conf]
- Thomas R. Dean, James R. Cordy
Software Structure Characterization Using Connectivity. [Citation Graph (0, 0)][DBLP] ICSE Workshop on Studies of Software Design, 1993, pp:33-48 [Conf]
- Thomas R. Dean, James R. Cordy, Kevin A. Schneider, Andrew J. Malton
Using Design Recovery Techniques to Transform Legacy Systems. [Citation Graph (0, 0)][DBLP] ICSM, 2001, pp:622-631 [Conf]
- Thomas R. Dean, Yuling Chen
Design Recovery of a Two Level System. [Citation Graph (0, 0)][DBLP] IWPC, 2003, pp:23-32 [Conf]
- James R. Cordy, Kevin A. Schneider, Thomas R. Dean, Andrew J. Malton
HSML: Design Directed Source Code Hot Spots. [Citation Graph (0, 0)][DBLP] IWPC, 2001, pp:145-156 [Conf]
- Dean Jin, James R. Cordy, Thomas R. Dean
Where's the Schema? A Taxonomy of Patterns for Software Exchange. [Citation Graph (0, 0)][DBLP] IWPC, 2002, pp:65-74 [Conf]
- Andrew J. Malton, Kevin A. Schneider, James R. Cordy, Thomas R. Dean, Darren Cousineau, Jason Reynolds
Processing Software Source Text in Automated Design Recovery and Transformation. [Citation Graph (0, 0)][DBLP] IWPC, 2001, pp:127-134 [Conf]
- James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
Software Engineering by Source Transformation-Experience with TXL. [Citation Graph (0, 0)][DBLP] SCAM, 2001, pp:170-180 [Conf]
- Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider
Grammar Programming in TXL. [Citation Graph (0, 0)][DBLP] SCAM, 2002, pp:93-0 [Conf]
- Xinping Guo, James R. Cordy, Thomas R. Dean
Unique Renaming of Java Using Source Transformation. [Citation Graph (0, 0)][DBLP] SCAM, 2003, pp:151-160 [Conf]
- Shannon Xu, Thomas R. Dean
Transforming Embedded Java Code into Custom Tags. [Citation Graph (0, 0)][DBLP] SCAM, 2005, pp:173-182 [Conf]
- Thomas R. Dean, Andrew J. Malton, Richard C. Holt
Union Schemas as a Basis for a C++ Extractor. [Citation Graph (0, 0)][DBLP] WCRE, 2001, pp:59-0 [Conf]
- Lei Wang, James R. Cordy, Thomas R. Dean
Enhancing Security Using Legality Assertions. [Citation Graph (0, 0)][DBLP] WCRE, 2005, pp:35-44 [Conf]
- Shannon Xu, Thomas R. Dean
Modernizing JavaServer Pages by Transformation. [Citation Graph (0, 0)][DBLP] WSE, 2005, pp:111-118 [Conf]
- Nikita Synytskyy, James R. Cordy, Thomas R. Dean
Resolution of Static Clones in Dynamic Web Pages. [Citation Graph (0, 0)][DBLP] WSE, 2003, pp:49- [Conf]
- Thomas Dean, Mykyta Synytskyy
Agile Parsing to Transform Web Applications. [Citation Graph (0, 0)][DBLP] GTTSE, 2006, pp:312-326 [Conf]
- Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider
Agile Parsing in TXL. [Citation Graph (0, 0)][DBLP] Autom. Softw. Eng., 2003, v:10, n:4, pp:311-336 [Journal]
- Timothy Cassidy, James R. Cordy, Thomas R. Dean, Jürgen Dingel
Source Transformation for Concurrency Analysis. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:141, n:4, pp:57-75 [Journal]
- James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
Source transformation in software engineering using the TXL transformation system. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2002, v:44, n:13, pp:827-837 [Journal]
- Thomas R. Dean, James R. Cordy
A Syntactic Theory of Software Architecture. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1995, v:21, n:4, pp:302-313 [Journal]
- Manar H. Alalfi, James R. Cordy, Thomas R. Dean
A Survey of Analysis Models and Methods in Website Verification and Testing. [Citation Graph (0, 0)][DBLP] ICWE, 2007, pp:306-311 [Conf]
- Chanchal Kumar Roy, Mohammad Gias Uddin, Banani Roy, Thomas R. Dean
Evaluating Aspect Mining Techniques: A Case Study. [Citation Graph (0, 0)][DBLP] ICPC, 2007, pp:167-176 [Conf]
Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection. [Citation Graph (, )][DBLP]
Clone Detector Use Questions: A List of Desirable Empirical Studies. [Citation Graph (, )][DBLP]
Lessons Learned from a Survey of Web Applications Testing. [Citation Graph (, )][DBLP]
Industrial Realities of Program Comprehension (IRPC 2008). [Citation Graph (, )][DBLP]
Automated Migration of List Based JSP Web Pages to AJAX. [Citation Graph (, )][DBLP]
Linguistic Security Testing for Text Communication Protocols. [Citation Graph (, )][DBLP]
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas. [Citation Graph (, )][DBLP]
A verification framework for access control in dynamic web applications. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.007secs
|