Search the dblp DataBase
Andrew Walenstein :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Andrew Walenstein Foundations of Cognitive Support: Toward Abstract Patterns of Usefulness. [Citation Graph (0, 0)][DBLP ] DSV-IS, 2002, pp:133-147 [Conf ] Andrew Walenstein Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories. [Citation Graph (0, 0)][DBLP ] ICSE Workshop on SE-HCI, 2003, pp:92-99 [Conf ] Jens H. Jahnke , Hausi A. Müller , Andrew Walenstein , Nikolai Mansurov , Kenny Wong Fused Data-Centric Visualizations for Software Evolution Environments. [Citation Graph (0, 0)][DBLP ] IWPC, 2002, pp:187-196 [Conf ] Arun Lakhotia , Junwei Li , Andrew Walenstein , Yun Yang Towards a Clone Detection Benchmark Suite and Results Archive. [Citation Graph (0, 0)][DBLP ] IWPC, 2003, pp:285-0 [Conf ] Andrew Walenstein Theory-based Analysis of Cognitive Support in Software Comprehension Tools. [Citation Graph (0, 0)][DBLP ] IWPC, 2002, pp:75-84 [Conf ] Andrew Walenstein Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering. [Citation Graph (0, 0)][DBLP ] IWPC, 2003, pp:185-0 [Conf ] Andrew Walenstein Developing the Designer's Toolkit with Software Comprehension Models. [Citation Graph (0, 0)][DBLP ] ASE, 1998, pp:310-313 [Conf ] Andrew Walenstein , Rachit Mathur , Mohamed R. Chouchane , Arun Lakhotia Normalizing Metamorphic Malware Using Term Rewriting. [Citation Graph (0, 0)][DBLP ] SCAM, 2006, pp:75-84 [Conf ] Jens H. Jahnke , Andrew Walenstein Reverse Engineering Tools as Media for Imperfect Knowledge. [Citation Graph (0, 0)][DBLP ] WCRE, 2000, pp:22-31 [Conf ] Arun Lakhotia , Andrew Walenstein , Rainer Koschke Second International Workshop on Detection of Software Clones. [Citation Graph (0, 0)][DBLP ] WCRE, 2003, pp:368- [Conf ] Arthur Tateishi , Andrew Walenstein Applying Traditional Unix Tools during Maintenance: An Experience Report. [Citation Graph (0, 0)][DBLP ] WCRE, 2000, pp:203-206 [Conf ] Andrew Walenstein , Nitin Jyoti , Junwei Li , Yun Yang , Arun Lakhotia Problems Creating Task-relevant Clone Detection Reference Data. [Citation Graph (0, 0)][DBLP ] WCRE, 2003, pp:285-295 [Conf ] Andrew Walenstein Theory adapters as discipline coordinators. [Citation Graph (0, 0)][DBLP ] WISER, 2004, pp:8-17 [Conf ] Jens H. Jahnke , Andrew Walenstein Evaluating Theories for Managing Imperfect Knowledge in Human-Centric Database Reengineering Environments. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2002, v:12, n:1, pp:77-102 [Journal ] Md. Enamul Karim , Andrew Walenstein , Arun Lakhotia , Laxmi Parida Malware phylogeny generation using permutations of code. [Citation Graph (0, 0)][DBLP ] Journal in Computer Virology, 2005, v:1, n:1-2, pp:13-23 [Journal ] The Software Similarity Problem in Malware Analysis. [Citation Graph (, )][DBLP ] 06301 Summary -- Duplication, Redundancy, and Similarity in Software. [Citation Graph (, )][DBLP ] 06301 Working Session Summary: Presentation and Visualization of Redundant Code. [Citation Graph (, )][DBLP ] 06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software. [Citation Graph (, )][DBLP ] Code Clones: Reconsidering Terminology. [Citation Graph (, )][DBLP ] Similarity in Programs. [Citation Graph (, )][DBLP ] Clone Detector Use Questions: A List of Desirable Empirical Studies. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs