Joey Paquet

Orcid: 0000-0002-4922-6989

Affiliations:
  • Concordia University, Montreal, Canada


According to our database1, Joey Paquet authored at least 74 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Kubernetes Underlay for OpenTDIP Forensic Computing Backend.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking.
Proceedings of the 19th International Conference on Network and Service Management, 2023

2020
Enabling Real-time Gesture Recognition Data Delivery over ROS and OpenISS.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

OpenISS as a Near-Realtime Composable Broadcast Service for Performing Arts and Beyond.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Toward Scalable Demand-Driven JSON-to-Forensic Lucid Encoder in GIPSY.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

OpenISS IoT Camera Simulation Environment for Real-time IoT Forensics and Incident Response.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Composite Web Services as Dataflow Graphs for Constraint Verification.
Proceedings of the 10th International Conference on Cloud Computing and Services Science, 2020

2018
Constraint verification failure recovery in web service composition.
Future Gener. Comput. Syst., 2018

Toward Multimodal Interaction in Scalable Visual Digital Evidence Visualization Using Computer Vision Techniques and ISS.
CoRR, 2018

Fast Context-Annotated Classification of Different Types of Web Service Descriptions.
CoRR, 2018

2017
Predictive Failure Recovery in Constraint-aware Web Service Composition.
Proceedings of the CLOSER 2017, 2017

Constraint Adaptation in Web Service Composition.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Network malware classification comparison using DPI and flow packet headers.
J. Comput. Virol. Hacking Tech., 2016

Efficient Constraint Verification in Service Composition Design and Execution (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Demand-Driven SOA Simulation Platform Based on GIPSY for Context-Based Brokerage.
Proceedings of the Service-Oriented Computing - ICSOC 2016 Workshops, 2016

2015
A service oriented broker-based approach for dynamic resource discovery in virtual networks.
J. Cloud Comput., 2015

MARFCAT: Fast code analysis for defects and vulnerabilities.
Proceedings of the 1st IEEE International Workshop on Software Analytics, 2015

Context-Aware Cloud Service Brokerage: A Solution to the Problem of Data Integration Among SaaS Providers.
Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, 2015

2014
Automating MAC Spoofer Evidence Gathering and Encoding for Investigations.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Toward Automated MAC Spoofer Investigations.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014

Toward Policy-Based Dynamic Context-Aware Adaptation Architecture for Web Service Composition.
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014

The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities.
Proceedings of the Advances in Artificial Intelligence, 2014

2013
A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An interactive graph-based automation assistant: a case study to manage the GIPSY's distributed multi-tier run-time system.
Proceedings of the Research in Adaptive and Convergent Systems, 2013

2012
MARFCAT: Transitioning to Binary and Larger Data Sets of SATE IV
CoRR, 2012

Unifying and refactoring DMF to support concurrent Jini and JMS DMS in GIPSY.
Proceedings of the Fifth International C* Conference on Computer Science & Software Engineering, 2012

2011
Furthering Baseline Core Lucid Standard Specification in the Context of the History of Lucid, Intensional Programming, and Context-Aware Computing.
CoRR, 2011

On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSY.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Reasoning About a Simulated Printer Case Investigation with Forensic Lucid.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011

2010
Towards Refactoring the DMF to Support Jini and JMS DMS in GIPSY
CoRR, 2010

The Need to Support of Data Flow Graph Visualization of Forensic Lucid Programs, Forensic Evidence, and their Evaluation by GIPSY
CoRR, 2010

Comparative Studies of Programming Languages; Course Lecture Notes
CoRR, 2010

Complete Context Calculus Design and Implementation in GIPSY
CoRR, 2010

Object-Oriented Intensional Programming: Intensional Java/Lucid Classes.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Using the General Intensional Programming System (GIPSY) for Evaluation of Higher-Order Intensional Logic (HOIL) Expressions.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Advances in the Design and Implementation of a Multi-tier Architecture in the GIPSY Environment with Java.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Towards a self-forensics property in the ASSL toolset.
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2010

A Type System for Higher-Order Intensional Logic Support for Variable Bindings in Hybrid Intensional-Imperative Programs in GIPSY.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid
CoRR, 2009

Reasoning About an ACME Printer Case Investigation with Forensic Lucid
CoRR, 2009

Advances in the Design and Implementation of a Multi-Tier Architecture in the GIPSY Environment
CoRR, 2009

A Type System Theory for Higher-Order Intensional Logic Support for Variable Bindings in Hybrid Intensional-Imperative Programs in GIPSY
CoRR, 2009

Formally Specifying and Proving Operational Aspects of Forensic Lucid in Isabelle
CoRR, 2009

Investigations using the rational unified process (RUP) diagrams for software process modeling.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009

Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid.
Proceedings of the Huntsville Simulation Conference, 2009

Reasoning About a Simulated Printer Case Investigation with Forensic Lucid (abstract).
Proceedings of the Huntsville Simulation Conference, 2009

Distributed Eductive Execution of Hybrid Intensional Programs.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

A type system for hybrid intensional-imperative programming support in GIPSY.
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2009

2008
Towards an ASSL specification model for NASA swarm-based exploration missions.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Design and Implementation of Demand Migration Systems in GIPSY.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

Formally Specifying Operational Semantics and Language Constructs of Forensic Lucid.
Proceedings of the IT-Incidents Management & IT-Forensics, 2008

Design and Implementation of Context Calculus in the GIPSY Environment.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
ASSL - Autonomic System Specification Language.
Proceedings of the 31st Annual IEEE / NASA Software Engineering Workshop (SEW-31 2007), 2007

Towards a new Demand-Driven Message-Oriented Middleware in GIPSY.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007

Assl Specification of Reliability Self-Assessment in the As-Trm.
Proceedings of the ICSOFT 2007, 2007

Towards an Autonomic Element Architecture for ASSL.
Proceedings of the 2007 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, 2007

Testing Intrusion Detection Systems in MANET: A Comprehensive Study.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

2006
Aspects of Memory Management in Java and C++.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Evaluation Issues in Generic Programming with Inheritance and Templates in C++.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Reactive, distributed and autonomic computing aspects of AS-TRM.
Proceedings of the ICSOFT 2006, 2006

2005
Object-Oriented Intensional Programming in the GIPSY: Preliminary Investigations.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

Lucx: Lucid Enriched with Context.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

A Generic Framework for Migrating Demands in the GIPSY Demand-Driven Execution Engine.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

GIPSY - A Platform for the Investigation on Intensional Programming Languages.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

General Imperative Compiler Framework within the GIPSY.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

Objective Lucid - First Step in Object-Oriented Intensional Programming in the GIPSY.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

Toward JLucid, Lucid with Embedded Java Functions in the GIPSY.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

An Architecture for Developing Context-Aware Systems.
Proceedings of the Modeling and Retrieval of Context, Second International Workshop, 2005

A General Architecture for Demand Migration in a Demand-Driven Execution Engine in a Heterogeneous and Distributed Environment.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

2004
Towards a framework for the general intensional programming compiler in the GIPSY.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

Real Time Reactive Programming in Lucid Enriched with Contexts.
Proceedings of the Theoretical Aspects of Computing, 2004

Intensional Programming for Agent Communication.
Proceedings of the Declarative Agent Languages and Technologies II, 2004

2000
The GIPSY Architecture.
Proceedings of the Distributed Communities on the Web, Third International Workshop, 2000


  Loading...