The SCEAS System
Navigation Menu

Search the dblp DataBase


Andrew Walenstein: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Walenstein
    Foundations of Cognitive Support: Toward Abstract Patterns of Usefulness. [Citation Graph (0, 0)][DBLP]
    DSV-IS, 2002, pp:133-147 [Conf]
  2. Andrew Walenstein
    Finding Boundary Objects in SE and HCI: An Approach Through Engineering-oriented Design Theories. [Citation Graph (0, 0)][DBLP]
    ICSE Workshop on SE-HCI, 2003, pp:92-99 [Conf]
  3. Jens H. Jahnke, Hausi A. Müller, Andrew Walenstein, Nikolai Mansurov, Kenny Wong
    Fused Data-Centric Visualizations for Software Evolution Environments. [Citation Graph (0, 0)][DBLP]
    IWPC, 2002, pp:187-196 [Conf]
  4. Arun Lakhotia, Junwei Li, Andrew Walenstein, Yun Yang
    Towards a Clone Detection Benchmark Suite and Results Archive. [Citation Graph (0, 0)][DBLP]
    IWPC, 2003, pp:285-0 [Conf]
  5. Andrew Walenstein
    Theory-based Analysis of Cognitive Support in Software Comprehension Tools. [Citation Graph (0, 0)][DBLP]
    IWPC, 2002, pp:75-84 [Conf]
  6. Andrew Walenstein
    Observing and Measuring Cognitive Support: Steps Toward Systematic Tool Evaluation and Engineering. [Citation Graph (0, 0)][DBLP]
    IWPC, 2003, pp:185-0 [Conf]
  7. Andrew Walenstein
    Developing the Designer's Toolkit with Software Comprehension Models. [Citation Graph (0, 0)][DBLP]
    ASE, 1998, pp:310-313 [Conf]
  8. Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia
    Normalizing Metamorphic Malware Using Term Rewriting. [Citation Graph (0, 0)][DBLP]
    SCAM, 2006, pp:75-84 [Conf]
  9. Jens H. Jahnke, Andrew Walenstein
    Reverse Engineering Tools as Media for Imperfect Knowledge. [Citation Graph (0, 0)][DBLP]
    WCRE, 2000, pp:22-31 [Conf]
  10. Arun Lakhotia, Andrew Walenstein, Rainer Koschke
    Second International Workshop on Detection of Software Clones. [Citation Graph (0, 0)][DBLP]
    WCRE, 2003, pp:368- [Conf]
  11. Arthur Tateishi, Andrew Walenstein
    Applying Traditional Unix Tools during Maintenance: An Experience Report. [Citation Graph (0, 0)][DBLP]
    WCRE, 2000, pp:203-206 [Conf]
  12. Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yang, Arun Lakhotia
    Problems Creating Task-relevant Clone Detection Reference Data. [Citation Graph (0, 0)][DBLP]
    WCRE, 2003, pp:285-295 [Conf]
  13. Andrew Walenstein
    Theory adapters as discipline coordinators. [Citation Graph (0, 0)][DBLP]
    WISER, 2004, pp:8-17 [Conf]
  14. Jens H. Jahnke, Andrew Walenstein
    Evaluating Theories for Managing Imperfect Knowledge in Human-Centric Database Reengineering Environments. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2002, v:12, n:1, pp:77-102 [Journal]
  15. Md. Enamul Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida
    Malware phylogeny generation using permutations of code. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2005, v:1, n:1-2, pp:13-23 [Journal]

  16. The Software Similarity Problem in Malware Analysis. [Citation Graph (, )][DBLP]

  17. 06301 Summary -- Duplication, Redundancy, and Similarity in Software. [Citation Graph (, )][DBLP]

  18. 06301 Working Session Summary: Presentation and Visualization of Redundant Code. [Citation Graph (, )][DBLP]

  19. 06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software. [Citation Graph (, )][DBLP]

  20. Code Clones: Reconsidering Terminology. [Citation Graph (, )][DBLP]

  21. Similarity in Programs. [Citation Graph (, )][DBLP]

  22. Clone Detector Use Questions: A List of Desirable Empirical Studies. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002