Thomas R. Dean

Affiliations:
  • Queen's University, Kingston, Canada


According to our database1, Thomas R. Dean authored at least 83 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SimSched: A tool for Simulating Autosar Implementaion in Simulink.
CoRR, 2023

Timed Model-Based Mutation Operators for Simulink Models.
CoRR, 2023

2020
Rethinking Modulation and Detection for High Doppler Channels.
IEEE Trans. Wirel. Commun., 2020

An approach to represent and transform application-specific constraints for an intrusion detection system.
Proceedings of the CASCON '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 10, 2020

2019
Fast Blind MIMO Decoding Through Vertex Hopping.
IEEE Trans. Wirel. Commun., 2019

Blind Joint MIMO Channel Estimation and Decoding.
IEEE Trans. Inf. Theory, 2019

Software Engineering by Source Transformation - Experience with TXL (Most Influential Paper, SCAM 2001).
Proceedings of the 19th International Working Conference on Source Code Analysis and Manipulation, 2019

A semi-automated framework for migrating web applications from SQL to document oriented NoSQL database.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

LL(k) optimization of a network protocol parser generator.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

Detection of feature interaction in dynamic scripting languages.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

Variability Identification and Representation for Automotive Simulink Models.
Proceedings of the Automotive Systems and Software Engineering, 2019

2018
Generating a Real-Time Constraint Engine for Network Protocols.
Proceedings of the Information Security Theory and Practice, 2018

Zero-Padded FDM-FDCP: Real-Time Signal Processing for Underwater Channels.
Proceedings of the 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2018

Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Modeling AUTOSAR Implementations in Simulink.
Proceedings of the Modelling Foundations and Applications - 14th European Conference, 2018

2017
Physical-Layer Cryptography Through Massive MIMO.
IEEE Trans. Inf. Theory, 2017

Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A new modulation technique for Doppler compensation in frequency-dispersive channels.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

A Constraint-based intrusion detection system.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

2016
Intrusion detection in a private network by satisfying constraints.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Modelling Functional Behavior of Event-based Systems: A Practical Knowledge-based Approach.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 20th International Conference KES-2016, 2016

Affordances in Representing the Behaviour of Event-Based Systems.
Proceedings of the Joint Ontology Workshops 2016 Episode 2: The French Summer of Ontology co-located with the 9th International Conference on Formal Ontology in Information Systems (FOIS 2016), 2016

2015
Detecting Android Malware Using Clone Detection.
J. Comput. Sci. Technol., 2015

2014
Clone Detection in Matlab Stateflow Models.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2014

Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

Analysis and clustering of model clones: An automotive industrial experience.
Proceedings of the 2014 Software Evolution Week, 2014

Practical language-independent detection of near-miss clones.
Proceedings of 24th Annual International Conference on Computer Science and Software Engineering, 2014

2013
Linguistic security testing for text communication protocols.
Softw. Pract. Exp., 2013

Guest Editorial: Special Section on International Conference on Program Comprehension, 2011.
Inf. Softw. Technol., 2013

A Framework for Migrating Web Applications to Web Services.
Proceedings of the Web Engineering - 13th International Conference, 2013

Using clone detection to find malware in acrobat files.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

2012
Normalizing object-oriented class styles in JavaScript.
Proceedings of the 14th IEEE International Symposium on Web Systems Evolution, 2012

Automated verification of role-based access control security models recovered from dynamic web applications.
Proceedings of the 14th IEEE International Symposium on Web Systems Evolution, 2012

Near-miss model clone detection for Simulink models.
Proceedings of the Proceeding of the 6th International Workshop on Software Clones, 2012

Recovering Role-Based Access Control Security Models from Dynamic Web Applications.
Proceedings of the Web Engineering - 12th International Conference, 2012

Models are code too: Near-miss clone detection for Simulink models.
Proceedings of the 28th IEEE International Conference on Software Maintenance, 2012

2011
Towards the profiling of scientific software for accuracy.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

Towards a framework for migrating web applications to web services.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

2010
Migrating legacy data structures based on variable overlay to Java.
J. Softw. Maintenance Res. Pract., 2010

Automating Coverage Metrics for Dynamic Web Applications.
Proceedings of the 14th European Conference on Software Maintenance and Reengineering, 2010

2009
Modelling methods for web application verification and testing: state of the art.
Softw. Test. Verification Reliab., 2009

Recovering structured data types from a legacy data model with overlays.
Inf. Softw. Technol., 2009

WAFA: Fine-grained dynamic analysis of web applications.
Proceedings of the 11th IEEE International Symposium on Web Systems Evolution, 2009

Lessons Learned from a Survey of Web Applications Testing.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

A verification framework for access control in dynamic web applications.
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2009

2008
Data Model Reverse Engineering in Migrating a Legacy System to Java.
Proceedings of the WCRE 2008, 2008

SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas.
Proceedings of the WCRE 2008, 2008

Automated Migration of List Based JSP Web Pages to AJAX.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Using Program Transformations to Add Structure to a Legacy Data Model.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008

Industrial Realities of Program Comprehension (IRPC 2008).
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008

2007
Special Issue on Web Site Evolution (WSE 2006).
J. Softw. Maintenance Res. Pract., 2007

Research Directions in Web Site Evolution II: Web Application Security.
Proceedings of the 9th IEEE International Symposium on Web Systems Evolution, 2007

Evaluating Aspect Mining Techniques: A Case Study.
Proceedings of the 15th International Conference on Program Comprehension (ICPC 2007), 2007

A Survey of Analysis Models and Methods in Website Verification and Testing.
Proceedings of the Web Engineering, 7th International Conference, 2007

Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection.
Proceedings of the 2007 conference of the Centre for Advanced Studies on Collaborative Research, 2007

2006
Clone Detector Use Questions: A List of Desirable Empirical Studies.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

A lightweight approach to state based security testing.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

Packet decoding using context sensitive parsing.
Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, 2006

2005
Source Transformation for Concurrency Analysis.
Proceedings of the Fifth Workshop on Language Descriptions, Tools, and Applications, 2005

Modernizing JavaServer Pages by Transformation.
Proceedings of the Seventh IEEE International Workshop on Web Site Evolution (WSE 2005), 2005

Enhancing Security Using Legality Assertions.
Proceedings of the 12th Working Conference on Reverse Engineering, 2005

Transforming Embedded Java Code into Custom Tags.
Proceedings of the 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September, 2005

Agile Parsing to Transform Web Applications.
Proceedings of the Generative and Transformational Techniques in Software Engineering, 2005

SCL: a language for security testing of network applications.
Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, 2005

2003
Agile Parsing in TXL.
Autom. Softw. Eng., 2003

Resolution of Static Clones in Dynamic Web Pages.
Proceedings of the 5th International Workshop on Web Site Evolution (WSE 2003), 2003

Unique Renaming of Java Using Source Transformation.
Proceedings of the 3rd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2003), 2003

Design Recovery of a Two Level System.
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003

Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter.
Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), 2003

Robust multilingual parsing using island grammars.
Proceedings of the 2003 conference of the Centre for Advanced Studies on Collaborative Research, 2003

2002
Source transformation in software engineering using the TXL transformation system.
Inf. Softw. Technol., 2002

Grammar Programming in TXL.
Proceedings of the 2nd IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2002), 2002

Where's the Schema? A Taxonomy of Patterns for Software Exchange.
Proceedings of the 10th International Workshop on Program Comprehension (IWPC 2002), 2002

2001
Union Schemas as a Basis for a C++ Extractor.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

Software Engineering by Source Transformation-Experience with TXL.
Proceedings of the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 2001

Processing Software Source Text in Automated Design Recovery and Transformation.
Proceedings of the 9th International Workshop on Program Comprehension (IWPC 2001), 2001

HSML: Design Directed Source Code Hot Spots.
Proceedings of the 9th International Workshop on Program Comprehension (IWPC 2001), 2001

Using Design Recovery Techniques to Transform Legacy Systems.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

1995
A Syntactic Theory of Software Architecture.
IEEE Trans. Software Eng., 1995

1994
A theory model core for module interconnection languages.
Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31, 1994

1993
Software Structure Characterization Using Connectivity.
Proceedings of the Studies of Software Design, 1993


  Loading...