Search the dblp DataBase
Victor L. Winter :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Adriaan de Groot , Jozef Hooman , Fabrice Kordon , Emmanuel Paviot-Adet , Isabelle Vernier-Mounier , Michel Lemoine , Gervais Gaudiere , Victor L. Winter , Deepak Kapur A Survey: Applying Formal Methods to a Software Intensive System. [Citation Graph (0, 0)][DBLP ] HASE, 2001, pp:55-64 [Conf ] James M. Boyle , R. Daniel Resler , Victor L. Winter Do You Trust Your Compiler? Applying Formal Methods to Constructing High-Assurance Compilers. [Citation Graph (0, 0)][DBLP ] HASE, 1997, pp:14-0 [Conf ] Allen P. Nikora , Raphael R. Some , Jeffrey M. Voas , Victor L. Winter , Jie Xu Software Dependability in Distributed and Mobile Computing Environments. [Citation Graph (0, 0)][DBLP ] HASE, 2001, pp:7-10 [Conf ] Gregory L. Wickstrom , Jared Davis , Steven E. Morrison , Steve Roach , Victor L. Winter The SSP: An Example of High-Assurance Systems Engineering. [Citation Graph (0, 0)][DBLP ] HASE, 2004, pp:167-177 [Conf ] Victor L. Winter Software on the edge. [Citation Graph (0, 0)][DBLP ] HASE, 1996, pp:57-0 [Conf ] Victor L. Winter A Synchronous Paradigm for Modeling Stable Reactive Systems. [Citation Graph (0, 0)][DBLP ] HASE, 1999, pp:257-0 [Conf ] Victor L. Winter , James M. Boyle Proving refinement transformations for deriving high-assurance software. [Citation Graph (0, 0)][DBLP ] HASE, 1996, pp:68-77 [Conf ] Victor L. Winter , Raymond Berg Software Systems: Consequence versus Functionality. [Citation Graph (0, 0)][DBLP ] HASE, 1999, pp:269-270 [Conf ] Raymond Berg , Victor L. Winter Risk Assessment and Integrity in System Design. [Citation Graph (0, 0)][DBLP ] ICECCS, 1998, pp:115-120 [Conf ] Victor Winter , Dejan Desovski , Bojan Cukic Virtual Environment Modeling for Requirements Validation of High Consequence Systems. [Citation Graph (0, 0)][DBLP ] RE, 2001, pp:23-30 [Conf ] Victor L. Winter , Jason Beranek , Azamatbek Mametjanov , Fares Fraij , Steve Roach A Transformational Overview of the Core Functionality of an Abstract Class Loader for the SSP. [Citation Graph (0, 0)][DBLP ] WORDS, 2005, pp:301-311 [Conf ] Victor L. Winter , Jason Beranek Program Transformation Using HATS 1.84. [Citation Graph (0, 0)][DBLP ] GTTSE, 2006, pp:378-396 [Conf ] Victor L. Winter , Steve Roach , Gregory L. Wickstrom Transformation-oriented programming: A development methodology for high assurance software. [Citation Graph (0, 0)][DBLP ] Advances in Computers, 2003, v:58, n:, pp:49-117 [Journal ] James M. Boyle , R. Daniel Resler , Victor L. Winter Do You Trust Your Compiler? [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1999, v:32, n:5, pp:65-73 [Journal ] I-Ling Yen , Raymond A. Paul , Victor L. Winter , John M. Covan , Larry J. Dalton , Leon Alkalai , Ann T. Tai , Rick Harper , Barry Flahive , Wei-Tek Tsai , Ramin Mojdehbakhsh , Sanjai Rayadurgam , Kinji Mori , Michael R. Lowry Key Applications for High-Assurance Systems. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:4, pp:35-45 [Journal ] Deepak Kapur , Victor L. Winter , Raymond Berg Designing a Controller for a Multi-Train Multi-Track System. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:50, n:1, pp:- [Journal ] Victor L. Winter Strategy Construction in the Higher-Order Framework of TL. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:124, n:1, pp:149-170 [Journal ] Victor L. Winter Model-driven Transformation-based Generation of Java Stress Tests. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:174, n:1, pp:99-114 [Journal ] Victor L. Winter , Mahadevan Subramaniam The transient combinator, higher-order strategies, and the distributed data problem. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:52, n:, pp:165-212 [Journal ] Victor L. Winter , Jason Beranek , Fares Fraij , Steve Roach , Gregory L. Wickstrom A transformational perspective into the core of an abstract class loader for the SSP. [Citation Graph (0, 0)][DBLP ] ACM Trans. Embedded Comput. Syst., 2006, v:5, n:4, pp:773-818 [Journal ] Yan Wu , Harvey P. Siy , Mansour Zand , Victor Winter Construction of Ontology-Based Software Repositories by Text Mining. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (3), 2007, pp:790-797 [Conf ] Victor L. Winter , Steve Roach , Fares Fraij Higher-order strategic programming: A road to software assurance. [Citation Graph (0, 0)][DBLP ] IASTED Conf. on Software Engineering and Applications, 2004, pp:350-355 [Conf ] Generative programming techniques for Java library migration. [Citation Graph (, )][DBLP ] Transformation-Based Library Adaptation for Embedded Systems. [Citation Graph (, )][DBLP ] A higher-order strategy for eliminating common subexpressions. [Citation Graph (, )][DBLP ] Preface. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.281secs