default search action
Thomas R. Dean
Person information
- affiliation: Queen's University, Kingston, Canada
Other persons with a similar name
- Thomas Dean — Brown University, Providence, USA
- Thomas J. Dean
- Thomas L. Dean
- Dean Thomas
- Dean P. Thomas
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c70]Jian Chen, Manar H. Alalfi, Thomas R. Dean:
Timed Model-Based Mutation Operators for Simulink Models. ICSTW 2024: 263-272 - 2023
- [i5]Jian Chen, Manar H. Alalfi, Thomas R. Dean:
Timed Model-Based Mutation Operators for Simulink Models. CoRR abs/2301.00835 (2023) - [i4]Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ramesh S.:
SimSched: A tool for Simulating Autosar Implementaion in Simulink. CoRR abs/2308.14974 (2023) - 2020
- [j16]Thomas R. Dean, Mainak Chowdhury, Nicole Grimwood, Andrea J. Goldsmith:
Rethinking Modulation and Detection for High Doppler Channels. IEEE Trans. Wirel. Commun. 19(6): 3629-3642 (2020) - [c69]Ayesha Babar, Fahim T. Imam, Thomas R. Dean, Jose Fernandez:
An approach to represent and transform application-specific constraints for an intrusion detection system. CASCON 2020: 53-62
2010 – 2019
- 2019
- [j15]Thomas R. Dean, Mary Wootters, Andrea J. Goldsmith:
Blind Joint MIMO Channel Estimation and Decoding. IEEE Trans. Inf. Theory 65(4): 2507-2524 (2019) - [j14]Thomas R. Dean, Jonathan Perlstein, Mary Wootters, Andrea J. Goldsmith:
Fast Blind MIMO Decoding Through Vertex Hopping. IEEE Trans. Wirel. Commun. 18(7): 3669-3682 (2019) - [c68]Rahma S. Al Mahruqi, Manar H. Alalfi, Thomas R. Dean:
A semi-automated framework for migrating web applications from SQL to document oriented NoSQL database. CASCON 2019: 44-53 - [c67]Omar A. Al Harthi, Manar H. Alalfi, Thomas R. Dean:
Detection of feature interaction in dynamic scripting languages. CASCON 2019: 130-137 - [c66]Kyle Lavorato, Fahim T. Imam, Thomas R. Dean:
LL(k) optimization of a network protocol parser generator. CASCON 2019: 183-192 - [c65]James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation - Experience with TXL (Most Influential Paper, SCAM 2001). SCAM 2019: 140 - [p1]Manar H. Alalfi, Eric J. Rapos, Andrew Stevenson, Matthew Stephan, Thomas R. Dean, James R. Cordy:
Variability Identification and Representation for Automotive Simulink Models. Automotive Systems and Software Engineering 2019: 109-139 - 2018
- [c64]Jonathan Perlstein, Thomas R. Dean, Mary Wootters, Andrea Goldsmith:
Fast Blind MIMO Decoding through Vertex Hopping. ACSSC 2018: 148-154 - [c63]Jian Chen, Manar H. Alalfi, Thomas R. Dean, S. Ramesh:
Modeling AUTOSAR Implementations in Simulink. ECMFA 2018: 279-292 - [c62]Michael James Michaud, Thomas R. Dean, Sylvain P. Leblanc:
Attacking OMG Data Distribution Service (DDS) Based Real-Time Mission Critical Distributed Systems. MALWARE 2018: 68-77 - [c61]Thomas R. Dean, Mainak Chowdhury, Andrea Goldsmith:
Zero-Padded FDM-FDCP: Real-Time Signal Processing for Underwater Channels. SPAWC 2018: 1-5 - [c60]Mohamed Sami Rakha, Fahim T. Imam, Thomas R. Dean:
Generating a Real-Time Constraint Engine for Network Protocols. WISTP 2018: 44-60 - [i3]Thomas R. Dean, Mary Wootters, Andrea J. Goldsmith:
Blind Joint MIMO Channel Estimation and Decoding. CoRR abs/1802.01049 (2018) - 2017
- [j13]Thomas R. Dean, Andrea J. Goldsmith:
Physical-Layer Cryptography Through Massive MIMO. IEEE Trans. Inf. Theory 63(8): 5419-5436 (2017) - [c59]M. D. Siam Hasan, Thomas R. Dean, Fahim T. Imam, Francisco Garcia, Sylvain P. Leblanc, Mohammad Zulkernine:
A Constraint-based intrusion detection system. ECBS 2017: 12:1-12:10 - [c58]Thomas R. Dean, Mary Wootters, Andrea Goldsmith:
Blind Joint MIMO Channel Estimation and Decoding. GLOBECOM 2017: 1-6 - [c57]Thomas R. Dean, Mainak Chowdhury, Andrea Goldsmith:
A new modulation technique for Doppler compensation in frequency-dispersive channels. PIMRC 2017: 1-7 - [c56]Ali ElShakankiry, Thomas R. Dean:
Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary Protocols. PST 2017: 77-86 - 2016
- [j12]Jian Chen, Thomas R. Dean, Manar H. Alalfi:
Clone detection in MATLAB Stateflow models. Softw. Qual. J. 24(4): 917-946 (2016) - [c55]Fahim T. Imam, Thomas R. Dean:
Affordances in Representing the Behaviour of Event-Based Systems. JOWO@FOIS 2016 - [c54]Fahim T. Imam, Thomas R. Dean:
Modelling Functional Behavior of Event-based Systems: A Practical Knowledge-based Approach. KES 2016: 617-626 - [c53]Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine:
Intrusion detection in a private network by satisfying constraints. PST 2016: 623-628 - 2015
- [j11]Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ying Zou:
Detecting Android Malware Using Clone Detection. J. Comput. Sci. Technol. 30(5): 942-956 (2015) - 2014
- [j10]Thomas Roy Dean, Jian Chen, Manar H. Alalfi:
Clone Detection in Matlab Stateflow Models. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [c52]James R. Cordy, Thomas R. Dean, Nikita Synytskyy:
Practical language-independent detection of near-miss clones. CASCON 2014: 2 - [c51]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Analysis and clustering of model clones: An automotive industrial experience. CSMR-WCRE 2014: 375-378 - [c50]Manar H. Alalfi, Eric J. Rapos, Andrew Stevenson, Matthew Stephan, Thomas R. Dean, James R. Cordy:
Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models. ICSME 2014: 486-490 - 2013
- [j9]Filippo Ricca, Thomas R. Dean, Susan Elliott Sim:
Guest Editorial: Special Section on International Conference on Program Comprehension, 2011. Inf. Softw. Technol. 55(4): 719-721 (2013) - [j8]Ben W. Y. Kam, Thomas R. Dean:
Linguistic security testing for text communication protocols. Softw. Pract. Exp. 43(9): 1103-1120 (2013) - [c49]Saruhan Karademir, Thomas R. Dean, Sylvain P. Leblanc:
Using clone detection to find malware in acrobat files. CASCON 2013: 70-80 - [c48]Asil A. Almonaies, Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
A Framework for Migrating Web Applications to Web Services. ICWE 2013: 384-399 - [c47]Thomas R. Dean, Andrea Goldsmith:
Physical-layer cryptography through massive MIMO. ITW 2013: 1-5 - [i2]Thomas R. Dean, Andrea Goldsmith:
Physical-Layer Cryptography Through Massive MIMO. CoRR abs/1310.1861 (2013) - 2012
- [c46]Manar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Models are code too: Near-miss clone detection for Simulink models. ICSM 2012: 295-304 - [c45]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Recovering Role-Based Access Control Security Models from Dynamic Web Applications. ICWE 2012: 121-136 - [c44]Manar H. Alalfi, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Near-miss model clone detection for Simulink models. IWSC 2012: 78-79 - [c43]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Automated verification of role-based access control security models recovered from dynamic web applications. WSE 2012: 1-10 - [c42]Widd Gama, Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Normalizing object-oriented class styles in JavaScript. WSE 2012: 79-83 - 2011
- [c41]Jason S. Alexander, Thomas R. Dean, Scott Knight:
Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions. CASCON 2011: 1-14 - [c40]Asil A. Almonaies, Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Towards a framework for migrating web applications to web services. CASCON 2011: 229-241 - [c39]Nicholas Jie Meng, Diane Kelly, Thomas R. Dean:
Towards the profiling of scientific software for accuracy. CASCON 2011: 257-271 - 2010
- [j7]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, Davide Marchignoli:
Migrating legacy data structures based on variable overlay to Java. J. Softw. Maintenance Res. Pract. 22(3): 211-237 (2010) - [c38]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Automating Coverage Metrics for Dynamic Web Applications. CSMR 2010: 51-60 - [c37]Ben W. Y. Kam, Thomas R. Dean:
Linguistic Security Testing for Text Communication Protocols. TAIC PART 2010: 104-117
2000 – 2009
- 2009
- [j6]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Recovering structured data types from a legacy data model with overlays. Inf. Softw. Technol. 51(10): 1454-1468 (2009) - [j5]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Modelling methods for web application verification and testing: state of the art. Softw. Test. Verification Reliab. 19(4): 265-296 (2009) - [c36]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
A verification framework for access control in dynamic web applications. C3S2E 2009: 109-113 - [c35]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications. ICST Workshops 2009: 287-294 - [c34]Ben W. Y. Kam, Thomas R. Dean:
Lessons Learned from a Survey of Web Applications Testing. ITNG 2009: 125-130 - [c33]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
WAFA: Fine-grained dynamic analysis of web applications. WSE 2009: 141-150 - 2008
- [c32]Thomas R. Dean, Joost Visser:
Industrial Realities of Program Comprehension (IRPC 2008). ICPC 2008: 283-284 - [c31]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Using Program Transformations to Add Structure to a Legacy Data Model. SCAM 2008: 197-206 - [c30]Jason Chu, Thomas R. Dean:
Automated Migration of List Based JSP Web Pages to AJAX. SCAM 2008: 217-226 - [c29]Mariano Ceccato, Thomas Roy Dean, Paolo Tonella, Davide Marchignoli:
Data Model Reverse Engineering in Migrating a Legacy System to Java. WCRE 2008: 177-186 - [c28]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas. WCRE 2008: 187-191 - 2007
- [j4]Davide Bolchini, Thomas R. Dean, Damiano Distante, Scott R. Tilley:
Special Issue on Web Site Evolution (WSE 2006). J. Softw. Maintenance Res. Pract. 19(5): 277-279 (2007) - [c27]Andy Y. Mao, James R. Cordy, Thomas R. Dean:
Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection. CASCON 2007: 12-26 - [c26]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
A Survey of Analysis Models and Methods in Website Verification and Testing. ICWE 2007: 306-311 - [c25]Chanchal Kumar Roy, Mohammad Gias Uddin, Banani Roy, Thomas R. Dean:
Evaluating Aspect Mining Techniques: A Case Study. ICPC 2007: 167-176 - [c24]Porfirio Tramontana, Thomas R. Dean, Scott R. Tilley:
Research Directions in Web Site Evolution II: Web Application Security. WSE 2007: 105-106 - 2006
- [c23]Sylvain Marquis, Thomas R. Dean, Scott Knight:
Packet decoding using context sensitive parsing. CASCON 2006: 263-274 - [c22]Songtao Zhang, Thomas R. Dean, Scott Knight:
A lightweight approach to state based security testing. CASCON 2006: 341-344 - [i1]Thomas R. Dean, Massimiliano Di Penta, Kostas Kontogiannis, Andrew Walenstein:
Clone Detector Use Questions: A List of Desirable Empirical Studies. Duplication, Redundancy, and Similarity in Software 2006 - 2005
- [c21]Sylvain Marquis, Thomas R. Dean, Scott Knight:
SCL: a language for security testing of network applications. CASCON 2005: 155-164 - [c20]Thomas R. Dean, Mykyta Synytskyy:
Agile Parsing to Transform Web Applications. GTTSE 2005: 312-326 - [c19]Shannon Xu, Thomas R. Dean:
Transforming Embedded Java Code into Custom Tags. SCAM 2005: 173-182 - [c18]Lei Wang, James R. Cordy, Thomas R. Dean:
Enhancing Security Using Legality Assertions. WCRE 2005: 35-44 - [c17]Shannon Xu, Thomas R. Dean:
Modernizing JavaServer Pages by Transformation. WSE 2005: 111-118 - [c16]Timothy Cassidy, James R. Cordy, Thomas R. Dean, Jürgen Dingel:
Source Transformation for Concurrency Analysis. LDTA@ETAPS 2005: 57-75 - 2004
- [c15]James R. Cordy, Thomas R. Dean, Nikita Synytskyy:
Practical language-independent detection of near-miss clones. CASCON 2004: 1-12 - 2003
- [j3]Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider:
Agile Parsing in TXL. Autom. Softw. Eng. 10(4): 311-336 (2003) - [c14]Nikita Synytskyy, James R. Cordy, Thomas R. Dean:
Robust multilingual parsing using island grammars. CASCON 2003: 266-278 - [c13]Dean Jin, James R. Cordy, Thomas R. Dean:
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter. CSMR 2003: 399-408 - [c12]Thomas R. Dean, Yuling Chen:
Design Recovery of a Two Level System. IWPC 2003: 23-32 - [c11]Xinping Guo, James R. Cordy, Thomas R. Dean:
Unique Renaming of Java Using Source Transformation. SCAM 2003: 151-160 - [c10]Nikita Synytskyy, James R. Cordy, Thomas R. Dean:
Resolution of Static Clones in Dynamic Web Pages. WSE 2003: 49 - 2002
- [j2]James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Source transformation in software engineering using the TXL transformation system. Inf. Softw. Technol. 44(13): 827-837 (2002) - [c9]Dean Jin, James R. Cordy, Thomas R. Dean:
Where's the Schema? A Taxonomy of Patterns for Software Exchange. IWPC 2002: 65-74 - [c8]Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider:
Grammar Programming in TXL. SCAM 2002: 93- - 2001
- [c7]Thomas R. Dean, James R. Cordy, Kevin A. Schneider, Andrew J. Malton:
Using Design Recovery Techniques to Transform Legacy Systems. ICSM 2001: 622-631 - [c6]Andrew J. Malton, Kevin A. Schneider, James R. Cordy, Thomas R. Dean, Darren Cousineau, Jason Reynolds:
Processing Software Source Text in Automated Design Recovery and Transformation. IWPC 2001: 127-134 - [c5]James R. Cordy, Kevin A. Schneider, Thomas R. Dean, Andrew J. Malton:
HSML: Design Directed Source Code Hot Spots. IWPC 2001: 145-154 - [c4]James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation-Experience with TXL. SCAM 2001: 170-180 - [c3]Thomas R. Dean, Andrew J. Malton, Richard C. Holt:
Union Schemas as a Basis for a C++ Extractor. WCRE 2001: 59-
1990 – 1999
- 1995
- [j1]Thomas R. Dean, James R. Cordy:
A Syntactic Theory of Software Architecture. IEEE Trans. Software Eng. 21(4): 302-313 (1995) - 1994
- [c2]Thomas R. Dean, David Alex Lamb:
A theory model core for module interconnection languages. CASCON 1994: 13 - 1993
- [c1]Thomas R. Dean, James R. Cordy:
Software Structure Characterization Using Connectivity. ICSE Workshop on Studies of Software Design 1993: 33-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint