The SCEAS System
Navigation Menu

Search the dblp DataBase


David Lo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pierre G. Paulin, Chuck Pilkington, Michel Langevin, Essaid Bensoudane, Olivier Benny, Damien Lyonnard, Bruno Lavigueur, David Lo
    Distributed object models for multi-processor SoC's, with application to low-power multimedia wireless systems. [Citation Graph (0, 0)][DBLP]
    DATE, 2006, pp:482-487 [Conf]
  2. David Lo, Siau-Cheng Khoo
    SMArTIC: towards building an accurate, robust and scalable specification miner. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 2006, pp:265-275 [Conf]
  3. David Lo, Siau-Cheng Khoo
    QUARK: Empirical Assessment of Automaton-based Specification Miners. [Citation Graph (0, 0)][DBLP]
    WCRE, 2006, pp:51-60 [Conf]
  4. Pierre G. Paulin, Chuck Pilkington, Michel Langevin, Essaid Bensoudane, Damien Lyonnard, Olivier Benny, Bruno Lavigueur, David Lo, Giovanni Beltrame, V. Gagne, Gabriela Nicolescu
    Parallel programming models for a multiprocessor SoC platform applied to networking and multimedia. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. VLSI Syst., 2006, v:14, n:7, pp:667-680 [Journal]
  5. David Lo, Siau-Cheng Khoo, Chao Liu
    Efficient mining of iterative patterns for software specification discovery. [Citation Graph (0, 0)][DBLP]
    KDD, 2007, pp:460-469 [Conf]
  6. David Lo, Shahar Maoz, Siau-Cheng Khoo
    Mining modal scenarios from execution traces. [Citation Graph (0, 0)][DBLP]
    OOPSLA Companion, 2007, pp:777-778 [Conf]

  7. Efficient Mining of Recurrent Rules from a Sequence Database. [Citation Graph (, )][DBLP]

  8. Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database. [Citation Graph (, )][DBLP]

  9. A discriminative model approach for accurate duplicate bug report retrieval. [Citation Graph (, )][DBLP]

  10. LM: a miner for scenario-based specifications. [Citation Graph (, )][DBLP]

  11. Mining specifications in diversified formats from execution traces. [Citation Graph (, )][DBLP]

  12. Identifying bug signatures using discriminative graph mining. [Citation Graph (, )][DBLP]

  13. Mining past-time temporal rules from execution traces. [Citation Graph (, )][DBLP]

  14. Mining Scenario-Based Triggers and Effects. [Citation Graph (, )][DBLP]

  15. Mining modal scenario-based specifications from execution traces of reactive systems. [Citation Graph (, )][DBLP]

  16. Mining Hierarchical Scenario-Based Specifications. [Citation Graph (, )][DBLP]

  17. Scenario-based and value-based specification mining: better together. [Citation Graph (, )][DBLP]

  18. An automated approach for finding variable-constant pairing bugs. [Citation Graph (, )][DBLP]

  19. Matching dependence-related queries in the system dependence graph. [Citation Graph (, )][DBLP]

  20. Classification of software behaviors for failure detection: a discriminative pattern mining approach. [Citation Graph (, )][DBLP]

  21. Hierarchical inter-object traces for specification mining. [Citation Graph (, )][DBLP]

  22. Mining scenario-based specifications with value-based invariants. [Citation Graph (, )][DBLP]

  23. Mining Antagonistic Communities from Social Networks. [Citation Graph (, )][DBLP]

  24. Specification mining of symbolic scenario-based models. [Citation Graph (, )][DBLP]

  25. Mining and Ranking Generators of Sequential Patterns. [Citation Graph (, )][DBLP]

  26. Automatic steering of behavioral model inference. [Citation Graph (, )][DBLP]

  27. Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation. [Citation Graph (, )][DBLP]

  28. Data Mining for Software Engineering. [Citation Graph (, )][DBLP]

Search in 0.027secs, Finished in 0.028secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002