Year |
Citation |
Score |
2019 |
Kahani N, Bagherzadeh M, Cordy JR, Dingel J, Varró D. Survey and classification of model transformation tools Software and Systems Modeling. 18: 2361-2397. DOI: 10.1007/S10270-018-0665-6 |
0.409 |
|
2018 |
Bagherzadeh M, Kahani N, Bezemer C, Hassan AE, Dingel J, Cordy JR. Analyzing a decade of Linux system calls Empirical Software Engineering. 23: 1519-1551. DOI: 10.1007/S10664-017-9551-Z |
0.366 |
|
2018 |
Alalfi MH, Antony EP, Cordy JR. An approach to clone detection in sequence diagrams and its application to security analysis Software and Systems Modeling. 17: 1287-1309. DOI: 10.1007/S10270-016-0557-6 |
0.43 |
|
2016 |
Rahman A, Cordy JR. Pattern analysis of TXL programs 2016 Ieee 23rd International Conference On Software Analysis, Evolution, and Reengineering, Saner 2016. 37-43. DOI: 10.1109/SANER.2016.110 |
0.36 |
|
2015 |
Amrani M, Combemale B, Lúcio L, Selim GMK, Dingel J, Le Traon Y, Vangheluwe H, Cordy JR. Formal verification techniques for model transformations: A tridimensional classification Journal of Object Technology. 14. DOI: 10.5381/Jot.2015.14.3.A1 |
0.351 |
|
2015 |
Stevenson A, Cordy JR. Parse views with Boolean grammars Science of Computer Programming. 97: 59-63. DOI: 10.1016/J.Scico.2013.11.007 |
0.438 |
|
2015 |
Zeni N, Kiyavitskaya N, Mich L, Cordy JR, Mylopoulos J. GaiusT: supporting the extraction of rights and obligations for regulatory compliance Requirements Engineering. 20: 1-22. DOI: 10.1007/S00766-013-0181-8 |
0.371 |
|
2014 |
Trezise M, Gobbi D, Cordy J, Abolmaesumi P, Mousavi P. SimITK: Model driven engineering for medical imaging Progress in Biomedical Optics and Imaging - Proceedings of Spie. 9036. DOI: 10.1117/12.2043197 |
0.319 |
|
2014 |
Stevenson A, Cordy JR. A survey of grammatical inference in software engineering Science of Computer Programming. 96: 444-459. DOI: 10.1016/J.Scico.2014.05.008 |
0.41 |
|
2014 |
Cordy JR, Roy CK. Tuning research tools for scalability and performance: The NiCad experience Science of Computer Programming. 79: 158-171. DOI: 10.1016/J.Scico.2011.11.002 |
0.328 |
|
2014 |
Ceccato M, Li Z, Cordy JR. Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012 Journal of Software: Evolution and Process. 26: 531-532. DOI: 10.1002/Smr.1655 |
0.311 |
|
2013 |
Antony EP, Alalfi MH, Cordy JR. An approach to clone detection in behavioural models Proceedings - Working Conference On Reverse Engineering, Wcre. 472-476. DOI: 10.1109/WCRE.2013.6671325 |
0.332 |
|
2013 |
Grant S, Cordy JR, Skillicorn DB. Using heuristics to estimate an appropriate number of latent topics in source code analysis Science of Computer Programming. 78: 1663-1678. DOI: 10.1016/J.Scico.2013.03.015 |
0.388 |
|
2013 |
Selim GMK, Wang S, Cordy JR, Dingel J. Model transformations for migrating legacy deployment models in the automotive industry Software and Systems Modeling. 14: 365-381. DOI: 10.1007/S10270-013-0365-1 |
0.421 |
|
2013 |
Stevenson A, Cordy JR. Grammatical inference in software engineering: An overview of the state of the art Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7745: 204-223. DOI: 10.1007/978-3-642-36089-3_12 |
0.311 |
|
2012 |
Selim GMK, Wang S, Cordy JR, Dingel J. Model transformations for migrating legacy models: An industrial case study Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7349: 90-101. DOI: 10.1007/978-3-642-31491-9_9 |
0.326 |
|
2010 |
Roy CK, Cordy JR. Are scripting languages really different? Proceedings - International Conference On Software Engineering. 17-24. DOI: 10.1145/1808901.1808904 |
0.342 |
|
2009 |
Alalfi MH, Cordy JR, Dean TR. Automated reverse engineering of UML sequence diagrams for dynamic web applications Ieee International Conference On Software Testing, Verification, and Validation Workshops, Icstw 2009. 287-294. DOI: 10.1109/ICSTW.2009.8 |
0.317 |
|
2009 |
Roy CK, Cordy JR, Koschke R. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach Science of Computer Programming. 74: 470-495. DOI: 10.1016/J.Scico.2009.02.007 |
0.335 |
|
2009 |
Cordy JR, Zhang L. Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008 Information and Software Technology. 51: 1377-1378. DOI: 10.1016/J.Infsof.2009.04.015 |
0.307 |
|
2009 |
Alalfi MH, Cordy JR, Dean TR. Modelling methods for web application verification and testing: State of the art Software Testing Verification and Reliability. 19: 265-296. DOI: 10.1002/Stvr.V19:4 |
0.36 |
|
2008 |
Roy CK, Cordy JR. NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization Ieee International Conference On Program Comprehension. 172-181. DOI: 10.1109/ICPC.2008.41 |
0.327 |
|
2008 |
Zeni N, Kiyavitskaya N, Mich L, Cordy JR, Mylopoulos J. Annotating regulations using Cerno: An application to Italian documents - extended abstract Ares 2008 - 3rd International Conference On Availability, Security, and Reliability, Proceedings. 1437-1442. DOI: 10.1109/ARES.2008.79 |
0.355 |
|
2006 |
Thurston AD, Cordy JR. A backtracking LR algorithm for parsing ambiguous context-dependent languages Proceedings of the 2006 Conference of the Center For Advanced Studies On Collaborative Research, Cascon '06. DOI: 10.1145/1188966.1188972 |
0.323 |
|
2006 |
Cordy JR. Source transformation, analysis and generation in TXL Proceedings of the Acm Sigplan Symposium On Partial Evaluation and Semantics-Based Program Manipulation. 1-11. DOI: 10.1145/1111542.1111544 |
0.371 |
|
2006 |
Thurston AD, Cordy JR. Evolving TXL Proceedings - Sixth Ieee International Workshop On Source Code Analysis and Manipulation, Scam 2006. 117-126. DOI: 10.1109/SCAM.2006.14 |
0.336 |
|
2006 |
Zhang H, Bradbury JS, Cordy JR, Dingel J. Using source transformation to test and model check implicit-invocation systems Science of Computer Programming. 62: 209-227. DOI: 10.1016/J.Scico.2006.04.008 |
0.49 |
|
2006 |
Cordy JR. The TXL source transformation language Science of Computer Programming. 61: 190-210. DOI: 10.1016/J.Scico.2006.04.002 |
0.479 |
|
2006 |
Roy CK, Noll T, Roy B, Cordy JR. Towards automatic verification of ERLANG programs by π-calculus translation Erlang'06 - Proceedings of the Acm Sigplan 2006 Erlang Workshop. 2006: 38-49. |
0.327 |
|
2005 |
Zhang H, Bradbury JS, Cordy JR, Dingel J. Implementation and verification of implicit-invocation systems using source transformation Proceedings - Fifth Ieee International Workshop On Source Code Analysis and Manipulation, Scam 2005. 87-96. DOI: 10.1109/SCAM.2005.15 |
0.405 |
|
2005 |
Jin D, Cordy JR. Factbase filtering issues in an ontology-based reverse engineering tool integration system Electronic Notes in Theoretical Computer Science. 137: 65-75. DOI: 10.1016/J.Entcs.2005.07.006 |
0.305 |
|
2005 |
Cassidy T, Cordy JR, Dean TR, Dingel J. Source transformation for concurrency analysis Electronic Notes in Theoretical Computer Science. 141: 57-75. DOI: 10.1016/J.Entcs.2005.05.012 |
0.433 |
|
2004 |
Cordy JR. TXL - A language for programming language tools and applications Electronic Notes in Theoretical Computer Science. 110: 3-31. DOI: 10.1016/J.Entcs.2004.11.006 |
0.474 |
|
2003 |
Guo X, Cordy JR, Dean TR. Unique renaming of Java using source transformation Proceedings - 3rd Ieee International Workshop On Source Code Analysis and Manipulation, Scam 2003. 151-160. DOI: 10.1109/SCAM.2003.1238041 |
0.31 |
|
2002 |
Schneider KA, Cordy JR. AUI: A programming language for developing plastic interactive software Proceedings of the Annual Hawaii International Conference On System Sciences. 2002: 3656-3665. DOI: 10.1109/HICSS.2002.994494 |
0.338 |
|
2002 |
Cordy JR, Dean TR, Malton AJ, Schneider KA. Source transformation in software engineering using the TXL transformation system Information and Software Technology. 44: 827-837. DOI: 10.1016/S0950-5849(02)00104-0 |
0.463 |
|
2001 |
Cordy JR, Dean TR, Malton AJ, Schneider KA. Software engineering by source transformation - Experience with TXL Proceedings - 1st Ieee International Workshop On Source Code Analysis and Manipulation. 168-178. DOI: 10.1109/SCAM.2001.972678 |
0.387 |
|
1995 |
Dean TR, Cordy JR. A syntactic theory of software architecture Ieee Transactions On Software Engineering. 21: 302-313. DOI: 10.1109/32.385969 |
0.381 |
|
1992 |
Cordy JR, Graham TCN. GVL: Visual specification of graphical output Journal of Visual Languages and Computing. 3: 25-47. DOI: 10.1016/1045-926X(92)90032-H |
0.431 |
|
1991 |
Cordy JR, Halpern-Hamu CD, Promislow E. TXL: A rapid prototyping system for programming language dialects Computer Languages. 16: 97-107. DOI: 10.1016/0096-0551(91)90019-6 |
0.458 |
|
1990 |
Cordy JR, Eliot NL, Robertson MG. Turing Tool: A User Interface to Aid in the Software Maintenance Task Ieee Transactions On Software Engineering. 16: 294-301. DOI: 10.1109/32.48937 |
0.408 |
|
1990 |
Cordy JR, Holt RC. Code generation using an orthogonal model Software - Practice and Experience. 20: 301-320. DOI: 10.1002/Spe.4380200306 |
0.401 |
|
1989 |
Barnard DT, Cordy JR. Automatically generating SL parsers from LL(1) grammars Computer Languages. 14: 93-98. DOI: 10.1016/0096-0551(89)90016-7 |
0.433 |
|
1988 |
Holt RC, Cordy JR. The Turing programming language Communications of the Acm. 31: 1410-1423. DOI: 10.1145/53580.53581 |
0.41 |
|
1988 |
Perelgut S, Cordy JR. Turing Plus: A comparison with C and Pascal Acm Sigplan Notices. 23: 137-143. DOI: 10.1145/44304.44318 |
0.424 |
|
1988 |
Barnard DT, Cordy JR. SL parses the LR languages Computer Languages. 13: 65-74. DOI: 10.1016/0096-0551(88)90010-0 |
0.413 |
|
1987 |
Cordy JR, Graham TCN. Design of an interpretive environment for Turing Acm Sigplan Notices. 22: 199-204. DOI: 10.1145/960114.29671 |
0.351 |
|
1984 |
Cordy JR. Compile—time detection of aliasing in euclid programs Software - Practice and Experience. 14: 755-768. DOI: 10.1002/Spe.4380140805 |
0.367 |
|
1982 |
Holt RC, Cordy JR, Wortman DB. An Introduction to S/SL: Syntax/Semantic Language Acm Transactions On Programming Languages and Systems (Toplas). 4: 149-178. DOI: 10.1145/357162.357164 |
0.413 |
|
1979 |
Cordy JR, Holt RC, Wortman DB. Semantic Charts: A Diagrammatic Approach to Semantic Processing Acm Sigplan Notices. 14: 39-49. DOI: 10.1145/872732.806952 |
0.34 |
|
1977 |
Holt RC, Wortman DB, Barnard DT, Cordy JR. SP/k: A System for Teaching Computer Programming Communications of the Acm. 20: 301-309. DOI: 10.1145/359581.359586 |
0.4 |
|
Show low-probability matches. |