The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Josh Dehlinger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Josh Dehlinger, Robyn R. Lutz
    Software Fault Tree Analysis for Product Lines. [Citation Graph (0, 0)][DBLP]
    HASE, 2004, pp:12-21 [Conf]
  2. Jing Liu, Josh Dehlinger, Robyn R. Lutz
    Safety Analysis of Software Product Lines Using State-Based Modeling. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2005, pp:21-30 [Conf]
  3. Josh Dehlinger, Robyn R. Lutz
    A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    SELMAS, 2005, pp:161-178 [Conf]
  4. Josh Dehlinger, Robyn R. Lutz
    PLFaultCAT: A Product-Line Software Fault Tree Analysis Tool. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2006, v:13, n:1, pp:169-193 [Journal]
  5. Josh Dehlinger, Meredith Humphrey, Lada Suvorov, Prasanna Padmanabhan, Robyn R. Lutz
    DECIMAL and PLFaultCAT: From Product-Line Requirements to Product-Line Member Software Fault Trees. [Citation Graph (0, 0)][DBLP]
    ICSE Companion, 2007, pp:49-50 [Conf]
  6. Jing Liu, Josh Dehlinger, Robyn R. Lutz
    Safety analysis of software product lines using state-based modeling. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:11, pp:1879-1892 [Journal]

  7. State-Based Modeling to Support the Evolution and Maintenance of Safety-Critical Software Product Lines. [Citation Graph (, )][DBLP]


  8. Supporting requirements reuse in multi-agent system product line design and evolution. [Citation Graph (, )][DBLP]


  9. Evaluating the Reusability of Product-Line Software Fault Tree Analysis Assets for a Safety-Critical System. [Citation Graph (, )][DBLP]


  10. Dynamic Event/Fault Tree Analysis of Multi-agent Systems Using Galileo. [Citation Graph (, )][DBLP]


  11. Applying the Grounded Theory Method to Derive Enterprise System Requirements. [Citation Graph (, )][DBLP]


  12. SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002