The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas R. Dean: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James R. Cordy, Thomas R. Dean, Nikita Synytskyy
    Practical language-independent detection of near-miss clones. [Citation Graph (0, 0)][DBLP]
    CASCON, 2004, pp:1-12 [Conf]
  2. Thomas R. Dean, David Alex Lamb
    A theory model core for module interconnection languages. [Citation Graph (0, 0)][DBLP]
    CASCON, 1994, pp:13- [Conf]
  3. Sylvain Marquis, Thomas R. Dean, Scott Knight
    SCL: a language for security testing of network applications. [Citation Graph (0, 0)][DBLP]
    CASCON, 2005, pp:155-164 [Conf]
  4. Nikita Synytskyy, James R. Cordy, Thomas R. Dean
    Robust multilingual parsing using island grammars. [Citation Graph (0, 0)][DBLP]
    CASCON, 2003, pp:266-278 [Conf]
  5. Songtao Zhang, Thomas R. Dean, Scott Knight
    A lightweight approach to state based security testing. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:341-344 [Conf]
  6. Sylvain Marquis, Thomas R. Dean, Scott Knight
    Packet decoding using context sensitive parsing. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:263-274 [Conf]
  7. Dean Jin, James R. Cordy, Thomas R. Dean
    Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter. [Citation Graph (0, 0)][DBLP]
    CSMR, 2003, pp:399-408 [Conf]
  8. Thomas R. Dean, James R. Cordy
    Software Structure Characterization Using Connectivity. [Citation Graph (0, 0)][DBLP]
    ICSE Workshop on Studies of Software Design, 1993, pp:33-48 [Conf]
  9. Thomas R. Dean, James R. Cordy, Kevin A. Schneider, Andrew J. Malton
    Using Design Recovery Techniques to Transform Legacy Systems. [Citation Graph (0, 0)][DBLP]
    ICSM, 2001, pp:622-631 [Conf]
  10. Thomas R. Dean, Yuling Chen
    Design Recovery of a Two Level System. [Citation Graph (0, 0)][DBLP]
    IWPC, 2003, pp:23-32 [Conf]
  11. James R. Cordy, Kevin A. Schneider, Thomas R. Dean, Andrew J. Malton
    HSML: Design Directed Source Code Hot Spots. [Citation Graph (0, 0)][DBLP]
    IWPC, 2001, pp:145-156 [Conf]
  12. Dean Jin, James R. Cordy, Thomas R. Dean
    Where's the Schema? A Taxonomy of Patterns for Software Exchange. [Citation Graph (0, 0)][DBLP]
    IWPC, 2002, pp:65-74 [Conf]
  13. Andrew J. Malton, Kevin A. Schneider, James R. Cordy, Thomas R. Dean, Darren Cousineau, Jason Reynolds
    Processing Software Source Text in Automated Design Recovery and Transformation. [Citation Graph (0, 0)][DBLP]
    IWPC, 2001, pp:127-134 [Conf]
  14. James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
    Software Engineering by Source Transformation-Experience with TXL. [Citation Graph (0, 0)][DBLP]
    SCAM, 2001, pp:170-180 [Conf]
  15. Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider
    Grammar Programming in TXL. [Citation Graph (0, 0)][DBLP]
    SCAM, 2002, pp:93-0 [Conf]
  16. Xinping Guo, James R. Cordy, Thomas R. Dean
    Unique Renaming of Java Using Source Transformation. [Citation Graph (0, 0)][DBLP]
    SCAM, 2003, pp:151-160 [Conf]
  17. Shannon Xu, Thomas R. Dean
    Transforming Embedded Java Code into Custom Tags. [Citation Graph (0, 0)][DBLP]
    SCAM, 2005, pp:173-182 [Conf]
  18. Thomas R. Dean, Andrew J. Malton, Richard C. Holt
    Union Schemas as a Basis for a C++ Extractor. [Citation Graph (0, 0)][DBLP]
    WCRE, 2001, pp:59-0 [Conf]
  19. Lei Wang, James R. Cordy, Thomas R. Dean
    Enhancing Security Using Legality Assertions. [Citation Graph (0, 0)][DBLP]
    WCRE, 2005, pp:35-44 [Conf]
  20. Shannon Xu, Thomas R. Dean
    Modernizing JavaServer Pages by Transformation. [Citation Graph (0, 0)][DBLP]
    WSE, 2005, pp:111-118 [Conf]
  21. Nikita Synytskyy, James R. Cordy, Thomas R. Dean
    Resolution of Static Clones in Dynamic Web Pages. [Citation Graph (0, 0)][DBLP]
    WSE, 2003, pp:49- [Conf]
  22. Thomas Dean, Mykyta Synytskyy
    Agile Parsing to Transform Web Applications. [Citation Graph (0, 0)][DBLP]
    GTTSE, 2006, pp:312-326 [Conf]
  23. Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider
    Agile Parsing in TXL. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2003, v:10, n:4, pp:311-336 [Journal]
  24. Timothy Cassidy, James R. Cordy, Thomas R. Dean, Jürgen Dingel
    Source Transformation for Concurrency Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:141, n:4, pp:57-75 [Journal]
  25. James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
    Source transformation in software engineering using the TXL transformation system. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:13, pp:827-837 [Journal]
  26. Thomas R. Dean, James R. Cordy
    A Syntactic Theory of Software Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1995, v:21, n:4, pp:302-313 [Journal]
  27. Manar H. Alalfi, James R. Cordy, Thomas R. Dean
    A Survey of Analysis Models and Methods in Website Verification and Testing. [Citation Graph (0, 0)][DBLP]
    ICWE, 2007, pp:306-311 [Conf]
  28. Chanchal Kumar Roy, Mohammad Gias Uddin, Banani Roy, Thomas R. Dean
    Evaluating Aspect Mining Techniques: A Case Study. [Citation Graph (0, 0)][DBLP]
    ICPC, 2007, pp:167-176 [Conf]

  29. Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection. [Citation Graph (, )][DBLP]


  30. Clone Detector Use Questions: A List of Desirable Empirical Studies. [Citation Graph (, )][DBLP]


  31. Lessons Learned from a Survey of Web Applications Testing. [Citation Graph (, )][DBLP]


  32. Industrial Realities of Program Comprehension (IRPC 2008). [Citation Graph (, )][DBLP]


  33. Automated Migration of List Based JSP Web Pages to AJAX. [Citation Graph (, )][DBLP]


  34. Linguistic Security Testing for Text Communication Protocols. [Citation Graph (, )][DBLP]


  35. SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas. [Citation Graph (, )][DBLP]


  36. A verification framework for access control in dynamic web applications. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002