David Clark

According to our database1, David Clark authored at least 110 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Normalised Squeeziness and Failed Error Propagation.
Inf. Process. Lett., 2019

The arms race: Adversarial search defeats entropy used to detect malware.
Expert Syst. Appl., 2019

SafeStrings: Representing Strings as Structured Data.
CoRR, 2019

Constructing Search Spaces for Search-Based Software Testing Using Neural Networks.
Proceedings of the Search-Based Software Engineering - 11th International Symposium, 2019

Dorylus: An Ant Colony Based Tool for Automated Test Case Generation.
Proceedings of the Search-Based Software Engineering - 11th International Symposium, 2019

Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table.
Proceedings of the Internet Measurement Conference, 2019

Directing a Search Towards Execution Properties with a Learned Fitness Function.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

2018
Picking on the family: Disrupting android malware triage by forcing misclassification.
Expert Syst. Appl., 2018

A comparison of code similarity analysers.
Empirical Software Engineering, 2018

Indexing Operators to Extend the Reach of Symbolic Execution.
CoRR, 2018

OASIs: oracle assessment and improvement tool.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Advancing the Art of Internet Edge Outage Detection.
Proceedings of the Internet Measurement Conference 2018, 2018

2017
Workshop on Tracking Quality of Experience in the Internet: Summary and Outcomes.
Computer Communication Review, 2017

2016
ITect: Scalable Information Theoretic Similarity for Malware Detection.
CoRR, 2016

Similarity of Source Code in the Presence of Pervasive Modifications.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016

Test oracle assessment and improvement.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Test Set Diameter: Quantifying the Diversity of Sets of Test Cases.
Proceedings of the 2016 IEEE International Conference on Software Testing, 2016

2015
A Purpose-built Global Network: Google's Move to SDN.
ACM Queue, 2015

A semiring-based trace semantics for processes with applications to information leakage analysis.
Mathematical Structures in Computer Science, 2015

Detecting Malware with Information Complexity.
CoRR, 2015

The network and the OS.
Proceedings of the SOSP History Day 2015, Monterey, California, USA, October 4, 2015, 2015

What has Worked and What Won't Work in Crowdsourcing.
Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, 2015

Information Transformation: An Underpinning Theory for Software Engineering.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
The Nonexistence of (18, 3, 18, 6) Relative Difference Sets.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

An analysis of the relationship between conditional entropy and failed error propagation in software testing.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Amorphous Slicing of Extended Finite State Machines.
IEEE Trans. Software Eng., 2013

Fault localization prioritization: Comparing information-theoretic and coverage-based approaches.
ACM Trans. Softw. Eng. Methodol., 2013

An Experimental Analysis of Asymmetric Power in Conflict Bargaining.
Games, 2013

State-based model slicing: A survey.
ACM Comput. Surv., 2013

Enumeration of (16, 4, 16, 4) Relative Difference Sets.
Electr. J. Comb., 2013

A new class of majority-logic decodable codes derived from polarity designs.
Adv. in Math. of Comm., 2013

2012
Squeeziness: An information theoretic measure for avoiding fault masking.
Inf. Process. Lett., 2012

Nonbinary quantum codes derived from finite geometries.
Finite Fields and Their Applications, 2012

2011
Foreword: programming language interference and dependence.
Mathematical Structures in Computer Science, 2011

Affine geometry designs, polarities, and Hamada's conjecture.
J. Comb. Theory, Ser. A, 2011

A Tool: Quantitative Analyser for Programs.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Experiences from over 15 years of on-line partial discharge (OLPD) testing of in-service MV and HV cables, switchgear, transformers and rotating machines.
Proceedings of the IEEE IX Latin American Robotics Symposium and IEEE Colombian Conference on Automatic Control, 2011

Model projection: simplifying models in response to restricting the environment.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
An alternative characterization of weak order dependence.
Inf. Process. Lett., 2010

Entanglement-assisted quantum low-density parity-check codes
CoRR, 2010

2009
An Interval-based Abstraction for Quantifying Information Flow.
Electr. Notes Theor. Comput. Sci., 2009

Control Dependence for Extended Finite State Machines.
Proceedings of the Fundamental Approaches to Software Engineering, 2009

Quantitative Analysis of Secure Information Flow via Probabilistic Semantics.
Proceedings of the The Forth International Conference on Availability, 2009

Axiomatic Semantics of State Machines.
Proceedings of the UML 2 Semantics and Applications, 2009

2008
Model Transformation Specification and Verification.
Proceedings of the Eighth International Conference on Quality Software, 2008

Non-Interference for Deterministic Interactive Programs.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

Semantics and Refinement of Behavior State Machines.
Proceedings of the ICEIS 2008, 2008

2007
NIRA: a new inter-domain routing architecture.
IEEE/ACM Trans. Netw., 2007

Direct Semantics of Extended State Machines.
Journal of Object Technology, 2007

Special issue on Programming Language Interference and Dependence.
J. Log. Algebr. Program., 2007

A static analysis for quantifying information flow in a simple imperative language.
Journal of Computer Security, 2007

2005
Quantitative Information Flow, Relations and Polymorphic Types.
J. Log. Comput., 2005

Refinement Patterns for UML.
Electr. Notes Theor. Comput. Sci., 2005

Quantified Interference for a While Language.
Electr. Notes Theor. Comput. Sci., 2005

2004
From the Newsstand.
IEEE Internet Computing, 2004

Elsewhere.
IEEE Internet Computing, 2004

Testing Programming Skills with Multiple Choice Questions.
Informatics in Education, 2004

The International Observatory on End of Life Care (IOELC): An Information Resource for Palliative Care.
Health Informatics Journal, 2004

UML to B: Formal Verification of Object-Oriented Models.
Proceedings of the Integrated Formal Methods, 4th International Conference, 2004

2003
RSDS, a Subset of UML with Precise Semantics.
L'OBJET, 2003

2002
Elsewhere: Networking.
IEEE Internet Computing, 2002

Do Web Standards and Patents Mix?
IEEE Computer, 2002

Mobile Processors Begin to Grow Up.
IEEE Computer, 2002

Information flow for Algol-like languages.
Comput. Lang. Syst. Struct., 2002

Using Consensus Ensembles to Identify Suspect Data.
Austr. J. Intelligent Information Processing Systems, 2002

Safety and Security Analysis of Object-Oriented Models.
Proceedings of the Computer Safety, 2002

From Implicit Specifications to Explicit Designs in Reactive System Development.
Proceedings of the Integrated Formal Methods, Third International Conference, 2002

2001
Quantitative Analysis of the Leakage of Confidential Data.
Electr. Notes Theor. Comput. Sci., 2001

Visual Basic and the Future of Web-Application Development.
IEEE Computer, 2001

Speech Recognition: The Wireless Interface Revolution.
IEEE Computer, 2001

Face-to-Face with Peer-to-Peer Networking.
IEEE Computer, 2001

The changing face of technical communication: new directions for the field in a new millennium.
Proceedings of the Nineteenth Annual International Conference of Computer Documentation: Communicating in the New Millennium, 2001

2000
Fast Tracking the Learning of How to Use Neural Networks as Classifiers.
Computer Science Education, 2000

Encryption Advances to Meet Internet Challenges.
IEEE Computer, 2000

Are Too Many Programmers Too Narrowly Trained?
IEEE Computer, 2000

Handhelds Drive Mixed-Signal Chip Development.
IEEE Computer, 2000

Shopbots Become Agents for Business Change.
IEEE Computer, 2000

Safety of Strictness Analysis via Term Graph Rewriting.
Proceedings of the Static Analysis, 7th International Symposium, 2000

Invariant-Based Synthesis of Fault-Tolerant Systems.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2000

Structuring and Design of Reactive Systems Using RSDS and B.
Proceedings of the Fundamental Approaches to Software Engineering, 2000

Teaching object-oriented development with emphasis on pattern application.
Proceedings of the ACM SIGCSE 4th Australasian Conference on Computer Science Education, 2000

1999
Network nirvana and the intelligent device.
IEEE Concurrency, 1999

Preparing for a New Generation of Wireless Data.
IEEE Computer, 1999

Modules for Maple.
ACM SIGSAM Bulletin, 1999

An Investigation into the Effect of Ensemble Size and Voting Threshold on the Accuracy of Neural Network Ensembles.
Proceedings of the Advanced Topics in Artificial Intelligence, 1999

1998
On the Wire: Powerline Communications: Finally Ready for Prime Time?
IEEE Internet Computing, 1998

ASCI Pathforward: to 30 Tflops and beyond.
IEEE Concurrency, 1998

OpenMP: a parallel standard for the masses.
IEEE Concurrency, 1998

Heavy Traffic Drives Networks to IP over Sonet.
IEEE Computer, 1998

Are ATM, Gigabit Ethernet Ready for Prime Time?
IEEE Computer, 1998

Developments Shake Domain-Name Plan.
IEEE Computer, 1998

New Era for Digital Signal Processors.
IEEE Computer, 1998

From Interface to Persistence: A Framework for Business Oriented Applications.
Proceedings of the TOOLS 1998: 28th International Conference on Technology of Object-Oriented Languages and Systems, 1998

Java as a teaching language - opportunities, pitfalls and solutions.
Proceedings of the ACM SIGCSE 3rd Australasian Conference on Computer Science Education, 1998

1997
CISCO Connect Online: It's Good for Business.
IEEE Internet Computing, 1997

Cyber-bricks and paradigms.
IEEE Concurrency, 1997

Bluer Than Blue: How IBM Managed It.
IEEE Concurrency, 1997

No nukes is good news for supercomputers [nuclear weapons simulation].
IEEE Concurrency, 1997

Interview: Deep Thoughts on Deep Blue.
IEEE Expert, 1997

Will New Fiber Technology Quench the Thrist for Bandwidth?
IEEE Computer, 1997

PC and TV Makers Battle Over Convergence.
IEEE Computer, 1997

1996
Event Structures and Non-Orthogonal Term Graph Rewriting.
Mathematical Structures in Computer Science, 1996

Toy Story - a technological leap.
IEEE P&DT, 1996

WebQuest: Using the World Wide Web & Interactive Simulation Games in the Classroom.
First Monday, 1996

Strategic Directions in Networks and Telecommunications.
ACM Comput. Surv., 1996

WebQuest: Substantiating Education in Edutainment Through Interactive Learning Games.
Computer Networks, 1996

1995
Buy it by the slice: The Microsoft vision for distributed computing.
IEEE P&DT, 1995

Some properties of non-orthogonal term graph rewriting systems.
Electr. Notes Theor. Comput. Sci., 1995

1994
Static Analysis of Value-Passing Process Calculi.
Proceedings of the Proceedings for the Second Imperial College Department of Computing Workshop on Theory and Formal Methods, 1994

1993
A Lattice of Abstract Graphs.
Proceedings of the Programming Language Implementation and Logic Programming, 1993


  Loading...