The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Derrick G. Kourie: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lebelo Serutla, Derrick G. Kourie
    Sentence Analysis Using a Concept Lattice. [Citation Graph (0, 0)][DBLP]
    AMTA, 1998, pp:225-235 [Conf]
  2. R. L. Engelbrecht, Derrick G. Kourie
    Issues in Translating Smalltalk into Java. [Citation Graph (0, 0)][DBLP]
    CC, 1998, pp:249-263 [Conf]
  3. Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff
    On Lattices in Access Control Models. [Citation Graph (0, 0)][DBLP]
    ICCS, 2006, pp:374-387 [Conf]
  4. Mandy Northover, Andrew Boake, Derrick G. Kourie
    Karl Popper's Critical Rationalism in Agile Software Development. [Citation Graph (0, 0)][DBLP]
    ICCS, 2006, pp:360-373 [Conf]
  5. Dean van der Merwe, Sergei A. Obiedkov, Derrick G. Kourie
    AddIntent: A New Incremental Algorithm for Constructing Concept Lattices. [Citation Graph (0, 0)][DBLP]
    ICFCA, 2004, pp:372-385 [Conf]
  6. Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson
    On implementation and performance of table-driven DFA-based string processors. [Citation Graph (0, 0)][DBLP]
    Stringology, 2006, pp:108-122 [Conf]
  7. Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie
    A Framework for the Dynamic Implementation of Finite Automata for Performance Enhancement. [Citation Graph (0, 0)][DBLP]
    Stringology, 2004, pp:155-167 [Conf]
  8. Corné de Ridder, Derrick G. Kourie, Bruce W. Watson
    FireµSat: An algorithm to detect microsatellites in DNA. [Citation Graph (0, 0)][DBLP]
    Stringology, 2006, pp:137-150 [Conf]
  9. Tinus Strauss, Derrick G. Kourie, Bruce W. Watson
    A concurrent specification of Brzozowski's DFA construction algorithm. [Citation Graph (0, 0)][DBLP]
    Stringology, 2006, pp:90-99 [Conf]
  10. Bruce W. Watson, Derrick G. Kourie, Ernest Ketcha Ngassam, Tinus Strauss, Loek G. Cleophas
    Efficient automata constructions and approximate automata. [Citation Graph (0, 0)][DBLP]
    Stringology, 2006, pp:100-107 [Conf]
  11. Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie
    Preliminary Experiments in Hardcoding Finite Automata. [Citation Graph (0, 0)][DBLP]
    CIAA, 2003, pp:299-300 [Conf]
  12. Vreda Pieterse, Derrick G. Kourie, Andrew Boake
    Literate Programming to Enhance Agile Methods. [Citation Graph (0, 0)][DBLP]
    XP, 2004, pp:250-253 [Conf]
  13. Derrick G. Kourie, G. Deon Oosthuizen
    Lattices in Machine Learning: Complexity Issues. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 1998, v:35, n:4, pp:269-292 [Journal]
  14. Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Eloff
    Uncovering identities: A study into VPN tunnel fingerprinting. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:2, pp:97-105 [Journal]
  15. R. L. Engelbrecht, Derrick G. Kourie
    Translating smalltalk blocks into Java. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 2003, v:150, n:3, pp:203-211 [Journal]
  16. Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie
    A framework for the dynamic implementation of finite automata for performance enhancement. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2005, v:16, n:6, pp:1193-1206 [Journal]
  17. Ernest Ketcha Ngassam, Bruce W. Watson, Derrick G. Kourie
    Dynamic Allocation of Finite Automata States for Fast String Recognition. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:6, pp:1307-1324 [Journal]
  18. F. J. Van Der Merwe, Derrick G. Kourie
    Compressed pseudo-lattices. [Citation Graph (0, 0)][DBLP]
    J. Exp. Theor. Artif. Intell., 2002, v:14, n:2-3, pp:229-254 [Journal]
  19. Derrick G. Kourie
    Editorial notes. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2002, v:28, n:, pp:1-2 [Journal]
  20. Derrick G. Kourie
    Editorial. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2003, v:31, n:, pp:1-1 [Journal]
  21. Derrick G. Kourie
    Editorial. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2005, v:34, n:, pp:1- [Journal]
  22. Derrick G. Kourie
    Editorial. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2005, v:35, n:, pp:1- [Journal]
  23. T. Botha, Derrick G. Kourie, Bruce W. Watson
    A word game support tool case study. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2006, v:36, n:, pp:86-94 [Journal]
  24. Sadok Ben Yahia, Derrick G. Kourie, Engelbert Mephu Nguifo
    Editorial introduction to special ARIMA / SACJ joint issue on advances in end-user data mining techniques. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2006, v:36, n:, pp:1-3 [Journal]
  25. Derrick G. Kourie
    The Design and Use of a Prolog Trace Generator for CSP. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1987, v:17, n:7, pp:423-438 [Journal]
  26. L. I. Manolache, Derrick G. Kourie
    Software testing using model programs. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2001, v:31, n:13, pp:1211-1236 [Journal]
  27. Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson
    Performance of hardcoded finite automata. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2006, v:36, n:5, pp:525-538 [Journal]
  28. Ernest Ketcha Ngassam, Derrick G. Kourie, Bruce W. Watson
    Reordering finite automata states for fast string recognition. [Citation Graph (0, 0)][DBLP]
    Stringology, 2005, pp:69-80 [Conf]

  29. Exploring the use of glossy light volumes for interactive global illumination. [Citation Graph (, )][DBLP]


  30. Refactoring Tools and Complementary Techniques. [Citation Graph (, )][DBLP]


  31. Towards Concise Representation for Taxonomies of Epistemic Communities. [Citation Graph (, )][DBLP]


  32. FCA-Based Two Dimensional Pattern Matching. [Citation Graph (, )][DBLP]


  33. Software engineering in South Africa. [Citation Graph (, )][DBLP]


  34. Logical Traffic Isolation Using Differentiated Services. [Citation Graph (, )][DBLP]


  35. On Regular Expression Hashing to Reduce FA Size. [Citation Graph (, )][DBLP]


  36. A Concurrent Specification of an Incremental DFA Minimisation Algorithm. [Citation Graph (, )][DBLP]


  37. On Minimizing Deterministic Tree Automata. [Citation Graph (, )][DBLP]


  38. Agile software development: a contemporary philosophical perspective. [Citation Graph (, )][DBLP]


  39. Assessment of a framework to compare software development methodologies. [Citation Graph (, )][DBLP]


  40. The influence of optimisations on the performance of an object relational mapping tool. [Citation Graph (, )][DBLP]


  41. Composite refactoring using fine-grained transformations. [Citation Graph (, )][DBLP]


  42. Migrating to a real-time distributed parallel simulator architecture. [Citation Graph (, )][DBLP]


  43. Corporate-, Agile- and Open Source Software Development: A Witch's Brew or An Elixir of Life?. [Citation Graph (, )][DBLP]


  44. A New CSP Operator for Optional Parallelism. [Citation Graph (, )][DBLP]


  45. An Algorithm for Ordering Refactorings Based on Fine-Grained Model Transformations. [Citation Graph (, )][DBLP]


  46. Foiling an Attack - Defeating IPSec Tunnel Fingerprinting. [Citation Graph (, )][DBLP]


  47. A Cross-Layer Approach Towards Efficiency Optimization of Wireless Sensor and Actor Networks. [Citation Graph (, )][DBLP]


  48. A comparison of simulated traffic conditioner performance. [Citation Graph (, )][DBLP]


  49. Building access control models with attribute exploration. [Citation Graph (, )][DBLP]


  50. A security privacy aware architecture and protocol for a single smart card used for multiple services. [Citation Graph (, )][DBLP]


  51. Server-centric Web frameworks: An overview. [Citation Graph (, )][DBLP]


Search in 0.565secs, Finished in 0.567secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002