Search the dblp DataBase
Malcolm Munro :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Gerardo Canfora , Aniello Cimitile , Malcolm Munro A Reverse Engineering Method for Identifying Reusable Abstract Data Types. [Citation Graph (1, 0)][DBLP ] WCRE, 1993, pp:73-82 [Conf ] Robert M. Freeman , Malcolm Munro Redocumentation for the maintenance of software. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1992, pp:413-416 [Conf ] Keith H. Bennett , Paul J. Layzell , David Budgen , Pearl Brereton , Linda A. Macaulay , Malcolm Munro Service-based software: the future for flexible software. [Citation Graph (0, 0)][DBLP ] APSEC, 2000, pp:214-221 [Conf ] Oh-Cheon Kwon , Gyu-Sang Shin , Cornelia Boldyreff , Malcolm Munro Maintenance with Reuse: An Integrated Approach Based on Software Configuration Management. [Citation Graph (0, 0)][DBLP ] APSEC, 1999, pp:507-515 [Conf ] Keith H. Bennett , Jie Xu , Malcolm Munro , Zhuang Hong , Paul J. Layzell , Nicolas Gold , David Budgen , Pearl Brereton An Architectural Model for Service-Based Flexible Software. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2001, pp:137-142 [Conf ] Elizabeth Burd , Malcolm Munro Reengineering Support for Software Evolution: An Evaluation through Case Study. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1998, pp:212-217 [Conf ] In Sang Chung , Malcolm Munro , W. K. Lee , Yong Rae Kwon Applying Conventional Testing Techniques for Class Testing. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1996, pp:447-454 [Conf ] Nik Looker , Malcolm Munro , Jie Xu WS-FIT: A Tool for Dependability Analysis of Web Services. [Citation Graph (0, 0)][DBLP ] COMPSAC Workshops, 2004, pp:120-123 [Conf ] Nik Looker , Malcolm Munro , Jie Xu A Comparison of Network Level Fault Injection with Code Insertion. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:479-484 [Conf ] Nik Looker , Malcolm Munro , Jie Xu Increasing Web Service Dependability Through Consensus Voting. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2005, pp:66-69 [Conf ] B. J. Cornelius , Malcolm Munro , D. J. Robson Project Work in Software Maintenance Education. [Citation Graph (0, 0)][DBLP ] CSEE, 1989, pp:16-25 [Conf ] James Ingham , Malcolm Munro Applying a Domain Specific Language Approach to Component Oriented Programming. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 1998, pp:161-162 [Conf ] Claire Knight , Malcolm Munro Towards automatic adaptation of data interfaces. [Citation Graph (0, 0)][DBLP ] HCI, 2001, pp:78-82 [Conf ] Keith H. Bennett , Malcolm Munro , Jie Xu , Nicolas Gold , Paul J. Layzell , Nikolay Mehandjiev , David Budgen , Pearl Brereton Prototype Implementations of an Architectural Model for Service-Based Flexible Software. [Citation Graph (0, 0)][DBLP ] HICSS, 2002, pp:76- [Conf ] Suhaimi Ibrahim , Norbik Bashah Idris , Malcolm Munro , Aziz Deraman Implementing a Document-based Requirements Traceability: A Case Study. [Citation Graph (0, 0)][DBLP ] IASTED Conf. on Software Engineering, 2005, pp:124-131 [Conf ] Xiaofeng Du , William Song , Malcolm Munro Semantics Recognition in Service Composition Using Conceptual Graph. [Citation Graph (0, 0)][DBLP ] IAT Workshops, 2006, pp:295-298 [Conf ] Claire Knight , Malcolm Munro Visualisations; Functionality and Interaction. [Citation Graph (0, 0)][DBLP ] International Conference on Computational Science (2), 2001, pp:470-475 [Conf ] Helen M. Edwards , Malcolm Munro RECAST: Reverse Engineering from COBOL to SSADM Specification. [Citation Graph (0, 0)][DBLP ] ICSE, 1993, pp:499-508 [Conf ] Gerardo Canfora , Aniello Cimitile , Malcolm Munro , C. J. Taylor Extracting Abstract Data Types from C Programs: A Case Study. [Citation Graph (0, 0)][DBLP ] ICSM, 1993, pp:200-209 [Conf ] Gerardo Canfora , Aniello Cimitile , Maria Tortorella , Malcolm Munro A Precise Method for Identifying Reusable Abstract Data Types in Code. [Citation Graph (0, 0)][DBLP ] ICSM, 1994, pp:404-413 [Conf ] Keith H. Bennett , Malcolm Munro , Nicolas Gold , Paul J. Layzell , David Budgen , Pearl Brereton An Architectural Model for Service-Based Software with Ultra Rapid Evolution. [Citation Graph (0, 0)][DBLP ] ICSM, 2001, pp:292-300 [Conf ] Cornelia Boldyreff , Elizabeth Burd , R. M. Hather , Richard E. Mortimer , Malcolm Munro , E. J. Younger The AMES approach to application understanding: a case study. [Citation Graph (0, 0)][DBLP ] ICSM, 1995, pp:182-191 [Conf ] Elizabeth Burd , Malcolm Munro Investigating the Maintenance Implications of the Replication of Code. [Citation Graph (0, 0)][DBLP ] ICSM, 1997, pp:322-0 [Conf ] Elizabeth Burd , Malcolm Munro Investigating Component-Based Maintenance and the Effect of Software Evolution: A Reengineering Approach Using Data Clustering. [Citation Graph (0, 0)][DBLP ] ICSM, 1998, pp:199-207 [Conf ] Elizabeth Burd , Malcolm Munro Evaluating the Use of Dominance Trees for C and COBOL. [Citation Graph (0, 0)][DBLP ] ICSM, 1999, pp:401-410 [Conf ] Elizabeth Burd , Malcolm Munro , Clazien D. Wezeman Analysing Large COBOL Programs: the extraction of reusable modules. [Citation Graph (0, 0)][DBLP ] ICSM, 1996, pp:238-243 [Conf ] Aniello Cimitile , Andrea De Lucia , Malcolm Munro Identifying reusable functions using specification driven program slicing: a case study. [Citation Graph (0, 0)][DBLP ] ICSM, 1995, pp:124-133 [Conf ] Helen M. Edwards , Malcolm Munro Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method. [Citation Graph (0, 0)][DBLP ] ICSM, 1993, pp:162-171 [Conf ] Mark Harman , Lin Hu , Robert M. Hierons , Malcolm Munro , Xingyuan Zhang , José Javier Dolado , Mari Carmen Otero , Joachim Wegener A Post-Placement Side-Effect Removal Algorithm. [Citation Graph (0, 0)][DBLP ] ICSM, 2002, pp:2-11 [Conf ] David A. Kinloch , Malcolm Munro Understanding C Programs Using the Combined C Graph Representation. [Citation Graph (0, 0)][DBLP ] ICSM, 1994, pp:172-180 [Conf ] Malcolm Munro , Paul J. Layzell , David Griffiths , Pearl Brereton Software Maintenance for 2005. [Citation Graph (0, 0)][DBLP ] ICSM, 1996, pp:370-0 [Conf ] Jean-Pierre Queille , Jean-Francois Voidrot , Norman Wilde , Malcolm Munro The Impact Analysis Task in Software Maintenance: A Model and a Case Study. [Citation Graph (0, 0)][DBLP ] ICSM, 1994, pp:234-242 [Conf ] Paul Townend , Jie Xu , Malcolm Munro Building Embedded Fault-Tolerant Systems for Critical Applications: An Experimental Study. [Citation Graph (0, 0)][DBLP ] DIPES, 2002, pp:101-112 [Conf ] Claire Knight , Malcolm Munro Virtual but Visible Software. [Citation Graph (0, 0)][DBLP ] IV, 2000, pp:198-205 [Conf ] Cornelia Boldyreff , Elizabeth Burd , R. M. Hather , Malcolm Munro , E. J. Younger Greater Understanding Through Maintainer Driven Traceability. [Citation Graph (0, 0)][DBLP ] WPC, 1996, pp:100-0 [Conf ] Elizabeth Burd , Malcolm Munro Enriching Program Comprehension for Software Reuse. [Citation Graph (0, 0)][DBLP ] WPC, 1997, pp:130-137 [Conf ] Pui-Shan Chan , Malcolm Munro PUI: A Tool to Support Program Understanding. [Citation Graph (0, 0)][DBLP ] WPC, 1997, pp:192-0 [Conf ] Mark Harman , Malcolm Munro , Lin Hu , Xingyuan Zhang Side-Effect Removal Transformation. [Citation Graph (0, 0)][DBLP ] IWPC, 2001, pp:310-322 [Conf ] Claire Knight , Malcolm Munro Mediating Diverse Visualisations for Comprehension. [Citation Graph (0, 0)][DBLP ] IWPC, 2001, pp:18-25 [Conf ] Claire Knight , Malcolm Munro Program Comprehension Experiences with GXL; Comprehension for Comprehension. [Citation Graph (0, 0)][DBLP ] IWPC, 2002, pp:147-158 [Conf ] Claire Knight , Malcolm Munro Comprehension with[in] Virtual Environment Visualisations. [Citation Graph (0, 0)][DBLP ] IWPC, 1999, pp:4-11 [Conf ] Andrea De Lucia , Anna Rita Fasolino , Malcolm Munro Understanding Function Behaviors through Program Slicing. [Citation Graph (0, 0)][DBLP ] WPC, 1996, pp:9-10 [Conf ] Paul Warren , Cornelia Boldyreff , Malcolm Munro The Evolution of Websites. [Citation Graph (0, 0)][DBLP ] IWPC, 1999, pp:178-0 [Conf ] Peter Young , Malcolm Munro Visualizing Software in Virtual Reality. [Citation Graph (0, 0)][DBLP ] IWPC, 1998, pp:19-0 [Conf ] Mark Harman , Lin Hu , Malcolm Munro , Xingyuan Zhang , Sebastian Danicic , Mohammed Daoudi , Lahcen Ouarbya An Interprocedural Amorphous Slicer for WSL. [Citation Graph (0, 0)][DBLP ] SCAM, 2002, pp:105-114 [Conf ] Xingyuan Zhang , Malcolm Munro , Mark Harman , Lin Hu Mechanized Operational Semantics of WSL. [Citation Graph (0, 0)][DBLP ] SCAM, 2002, pp:73-82 [Conf ] Gerardo Canfora , Andrea De Lucia , Malcolm Munro An Integrated Environment for Reuse Reengineering C Code. [Citation Graph (0, 0)][DBLP ] SEKE, 1996, pp:214-221 [Conf ] Stuart M. Charters , Claire Knight , Nigel Thomas , Malcolm Munro Visualisation for informed decision making; from code to components. [Citation Graph (0, 0)][DBLP ] SEKE, 2002, pp:765-772 [Conf ] Suhaimi Ibrahim , Norbik Idris , Malcolm Munro , Aziz Deraman A Software Traceability Validation For Change Impact Analysis of Object Oriented Software. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2006, pp:453-459 [Conf ] Xingyuan Zhang , Malcolm Munro , Mark Harman , Lin Hu Weakest Precondition for General Recursive Programs Formalized in Coq. [Citation Graph (0, 0)][DBLP ] TPHOLs, 2002, pp:332-348 [Conf ] K. Gallagher , A. Hatch , Malcolm Munro A Framework for Software Architecture Visualization Assessment. [Citation Graph (0, 0)][DBLP ] VISSOFT, 2005, pp:76-81 [Conf ] Michael P. Smith , Malcolm Munro Runtime Visualisation of Object Oriented Software. [Citation Graph (0, 0)][DBLP ] VISSOFT, 2002, pp:81- [Conf ] Michael P. Smith , Malcolm Munro Identifying Structural Features of Java Programs by Analysing the Interaction of Classes at Runtime. [Citation Graph (0, 0)][DBLP ] VISSOFT, 2005, pp:108-113 [Conf ] Christopher M. B. Taylor , Malcolm Munro Revision Towers. [Citation Graph (0, 0)][DBLP ] VISSOFT, 2002, pp:43-50 [Conf ] Elizabeth Burd , Malcolm Munro An Initial Approach towards Measuring and Characterizing Software Evolution. [Citation Graph (0, 0)][DBLP ] WCRE, 1999, pp:168-174 [Conf ] Elizabeth Burd , Malcolm Munro Assisting Human Understanding to Aid the Targeting of Necessary Reengineering Work. [Citation Graph (0, 0)][DBLP ] WCRE, 1998, pp:2-9 [Conf ] Aniello Cimitile , Andrea De Lucia , Malcolm Munro Qualifying Reusable Functions Using Symbolic Execution. [Citation Graph (0, 0)][DBLP ] WCRE, 1995, pp:0-0 [Conf ] Elizabeth Burd , Malcolm Munro , Clazien D. Wezeman Extracting Reusable Modules from Legacy Code: Considering the Issues of Module Granularity. [Citation Graph (0, 0)][DBLP ] WCRE, 1996, pp:189-0 [Conf ] Helen M. Edwards , Malcolm Munro RECAST: Reverse Engineering from COBOL to SSADM Specifications. [Citation Graph (0, 0)][DBLP ] WCRE, 1993, pp:44-53 [Conf ] Helen M. Edwards , Malcolm Munro Deriving a Logical Data Model for a System Using the RECAST Method. [Citation Graph (0, 0)][DBLP ] WCRE, 1995, pp:0-0 [Conf ] Elizabeth Burd , Malcolm Munro The Implications of Non-Functional Requirements for the Reengineering of Legacy Code. [Citation Graph (0, 0)][DBLP ] WCRE, 1997, pp:215-0 [Conf ] Mark Harman , Lin Hu , Malcolm Munro , Xingyuan Zhang GUSTT: An Amorphous Slicing System which Combines Slicing and Transformation. [Citation Graph (0, 0)][DBLP ] WCRE, 2001, pp:271-280 [Conf ] Claire Knight , Malcolm Munro Should Users Inhabit Visualizations? [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:43-50 [Conf ] Nik Looker , Malcolm Munro , Binka Gwynne , Jie Xu An Ontology-Based Approach for Determining the Dependability of Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP ] WORDS, 2005, pp:171-178 [Conf ] Paul Townend , Jie Xu , Malcolm Munro Building Dependable Software for Critical Applications: Multi-Version Software versus One Good Version. [Citation Graph (0, 0)][DBLP ] WORDS, 2001, pp:103-110 [Conf ] Nigel Thomas , Malcolm Munro , Peter J. B. King , Rob Pooley Visual representation of stochastic process algebra models. [Citation Graph (0, 0)][DBLP ] Workshop on Software and Performance, 2000, pp:18-19 [Conf ] Elizabeth Burd , Malcolm Munro Supporting program comprehension using dominance trees. [Citation Graph (0, 0)][DBLP ] Ann. Software Eng., 2000, v:9, n:, pp:193-213 [Journal ] Mark Harman , Lin Hu , Malcolm Munro , Xingyuan Zhang , David Binkley , Sebastian Danicic , Mohammed Daoudi , Lahcen Ouarbya Syntax-Directed Amorphous Slicing. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 2004, v:11, n:1, pp:27-61 [Journal ] Pearl Brereton , David Budgen , Keith H. Bennett , Malcolm Munro , Paul J. Layzell , Linda A. Macaulay , David Griffiths , Charles Stannett The Future of Software. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:12, pp:78-84 [Journal ] Sid L. Huff , Malcolm Munro , Barbara H. Martin Growth Stages of End User Computing. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1988, v:31, n:5, pp:542-550 [Journal ] Suhaimi Ibrahim , Norbik Bashah Idris , Malcolm Munro , Aziz Deraman Integrating Software Traceability for Change Impact Analysis. [Citation Graph (0, 0)][DBLP ] Int. Arab J. Inf. Technol., 2005, v:2, n:4, pp:301-308 [Journal ] Keith H. Bennett , Magnus Ramage , Malcolm Munro Decision model for legacy systems. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 1999, v:146, n:3, pp:153-159 [Journal ] Oh-Cheon Kwon , Cornelia Boldyreff , Malcolm Munro Software Configuration Management for a Reusable Software Library within a Software Maintenance Environment. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 1998, v:8, n:4, pp:483-515 [Journal ] Frank P. A. Coolen , Michael Goldstein , Malcolm Munro Generalized partition testing via Bayes linear methods. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2001, v:43, n:13, pp:783-793 [Journal ] Mark Harman , Malcolm Munro , Lin Hu , Xingyuan Zhang Source code analysis and manipulation. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2002, v:44, n:13, pp:717-720 [Journal ] Ishbel Duncan , Dave Robson , Malcolm Munro Test-Case Development During OO Lifecycle and Evolution. [Citation Graph (0, 0)][DBLP ] JOOP, 1999, v:11, n:9, pp:36-40 [Journal ] Elizabeth Burd , Malcolm Munro Using evolution to evaluate reverse engineering technologies: mapping the process of software change. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2000, v:53, n:1, pp:43-51 [Journal ] Elizabeth Burd , Malcolm Munro A method for the identification of reusable units through the reengineering of legacy code. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:44, n:2, pp:121-134 [Journal ] Gerardo Canfora , Andrea De Lucia , Malcolm Munro An integrated environment for reuse reengineering C code. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:42, n:2, pp:153-164 [Journal ] D. J. Robson , Keith H. Bennett , B. J. Cornelius , Malcolm Munro Approaches to program comprehension. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1991, v:14, n:2, pp:79-84 [Journal ] Peter R. Newsted , Sid L. Huff , Malcolm Munro Survey Instruments in Information Systems. [Citation Graph (0, 0)][DBLP ] MIS Quarterly, 1998, v:22, n:4, pp:- [Journal ] Yoon Kyu Jang , Malcolm Munro , Yong Rae Kwon An improved method of selecting regression tests for C++ programs. [Citation Graph (0, 0)][DBLP ] Journal of Software Maintenance, 2001, v:13, n:5, pp:331-350 [Journal ] Nicolas Gold , Claire Knight , Andrew Mohan , Malcolm Munro Understanding Service-Oriented Software. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2004, v:21, n:2, pp:71-77 [Journal ] Aniello Cimitile , Malcolm Munro An Improved Algorithm for Identifying Objects in Code. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1996, v:26, n:1, pp:25-48 [Journal ] Simon C. Shaw , Michael Goldstein , Malcolm Munro , Elizabeth Burd Moral Dominance Relations for Program Comprehension. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2003, v:29, n:9, pp:851-863 [Journal ] Samer Hanna , Malcolm Munro An Approach for Specification-based Test Case Generation for Web Services. [Citation Graph (0, 0)][DBLP ] AICCSA, 2007, pp:16-23 [Conf ] Fault-Based Web Services Testing. [Citation Graph (, )][DBLP ] An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. [Citation Graph (, )][DBLP ] An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. [Citation Graph (, )][DBLP ] An efficient fair exchange protocol that enforces the merchant to be honest. [Citation Graph (, )][DBLP ] An e-Commerce fair exchange protocol for exchanging digital products and payments. [Citation Graph (, )][DBLP ] An evaluation of users' tips effectiveness for Phishing websites detection. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.460secs