\n \n \n
\n
\n\n \n \n \n \n \n \n Models are code too: Near-miss clone detection for Simulink models.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; Dean, T. R.; Stephan, M.; and Stevenson, A.\n\n\n \n\n\n\n In
28th IEEE International Conference on Software Maintenance, ICSM 2012, Trento, Italy, September 23-28, 2012, pages 295–304, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icsm/AlalfiCDSS12,\n author = {Manar H. Alalfi and\n James R. Cordy and\n Thomas R. Dean and\n Matthew Stephan and\n Andrew Stevenson},\n title = {Models are code too: Near-miss clone detection for Simulink models},\n booktitle = {28th {IEEE} International Conference on Software Maintenance, {ICSM}\n 2012, Trento, Italy, September 23-28, 2012},\n pages = {295--304},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/ICSM.2012.6405285},\n doi = {10.1109/ICSM.2012.6405285},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icsm/AlalfiCDSS12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Recovering Role-Based Access Control Security Models from Dynamic Web Applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Brambilla, M.; Tokuda, T.; and Tolksdorf, R., editor(s),
Web Engineering - 12th International Conference, ICWE 2012, Berlin, Germany, July 23-27, 2012. Proceedings, volume 7387, of
Lecture Notes in Computer Science, pages 121–136, 2012. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icwe/AlalfiCD12,\n author = {Manar H. Alalfi and\n James R. Cordy and\n Thomas R. Dean},\n editor = {Marco Brambilla and\n Takehiro Tokuda and\n Robert Tolksdorf},\n title = {Recovering Role-Based Access Control Security Models from Dynamic\n Web Applications},\n booktitle = {Web Engineering - 12th International Conference, {ICWE} 2012, Berlin,\n Germany, July 23-27, 2012. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {7387},\n pages = {121--136},\n publisher = {Springer},\n year = {2012},\n url = {https://doi.org/10.1007/978-3-642-31753-8\\_9},\n doi = {10.1007/978-3-642-31753-8\\_9},\n timestamp = {Tue, 14 May 2019 10:00:53 +0200},\n biburl = {https://dblp.org/rec/conf/icwe/AlalfiCD12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Near-miss model clone detection for Simulink models.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; Dean, T. R.; Stephan, M.; and Stevenson, A.\n\n\n \n\n\n\n In Cordy, J. R.; Inoue, K.; Koschke, R.; Krinke, J.; and Roy, C. K., editor(s),
Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012, pages 78–79, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iwsc/AlalfiCDSS12,\n author = {Manar H. Alalfi and\n James R. Cordy and\n Thomas R. Dean and\n Matthew Stephan and\n Andrew Stevenson},\n editor = {James R. Cordy and\n Katsuro Inoue and\n Rainer Koschke and\n Jens Krinke and\n Chanchal K. Roy},\n title = {Near-miss model clone detection for Simulink models},\n booktitle = {Proceeding of the 6th International Workshop on Software Clones, {IWSC}\n 2012, Zurich, Switzerland, June 4, 2012},\n pages = {78--79},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/IWSC.2012.6227873},\n doi = {10.1109/IWSC.2012.6227873},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/iwsc/AlalfiCDSS12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Towards qualitative comparison of Simulink model clone detection approaches.\n \n \n \n \n\n\n \n Stephan, M.; Alalfi, M. H.; Stevenson, A.; and Cordy, J. R.\n\n\n \n\n\n\n In Cordy, J. R.; Inoue, K.; Koschke, R.; Krinke, J.; and Roy, C. K., editor(s),
Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012, pages 84–85, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iwsc/StephanASC12,\n author = {Matthew Stephan and\n Manar H. Alalfi and\n Andrew Stevenson and\n James R. Cordy},\n editor = {James R. Cordy and\n Katsuro Inoue and\n Rainer Koschke and\n Jens Krinke and\n Chanchal K. Roy},\n title = {Towards qualitative comparison of Simulink model clone detection approaches},\n booktitle = {Proceeding of the 6th International Workshop on Software Clones, {IWSC}\n 2012, Zurich, Switzerland, June 4, 2012},\n pages = {84--85},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/IWSC.2012.6227876},\n doi = {10.1109/IWSC.2012.6227876},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/iwsc/StephanASC12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Automated verification of role-based access control security models recovered from dynamic web applications.\n \n \n \n \n\n\n \n Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Tilley, S. R.; Distante, D.; and Rossi, G., editor(s),
14th IEEE International Symposium on Web Systems Evolution, WSE 2012, Trento, Italy, September 28, 2012, pages 1–10, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wse/AlalfiCD12,\n author = {Manar H. Alalfi and\n James R. Cordy and\n Thomas R. Dean},\n editor = {Scott R. Tilley and\n Damiano Distante and\n Gustavo Rossi},\n title = {Automated verification of role-based access control security models\n recovered from dynamic web applications},\n booktitle = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}\n 2012, Trento, Italy, September 28, 2012},\n pages = {1--10},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/WSE.2012.6320525},\n doi = {10.1109/WSE.2012.6320525},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/wse/AlalfiCD12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Normalizing object-oriented class styles in JavaScript.\n \n \n \n \n\n\n \n Gama, W.; Alalfi, M. H.; Cordy, J. R.; and Dean, T. R.\n\n\n \n\n\n\n In Tilley, S. R.; Distante, D.; and Rossi, G., editor(s),
14th IEEE International Symposium on Web Systems Evolution, WSE 2012, Trento, Italy, September 28, 2012, pages 79–83, 2012. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/wse/GamaACD12,\n author = {Widd Gama and\n Manar H. Alalfi and\n James R. Cordy and\n Thomas R. Dean},\n editor = {Scott R. Tilley and\n Damiano Distante and\n Gustavo Rossi},\n title = {Normalizing object-oriented class styles in JavaScript},\n booktitle = {14th {IEEE} International Symposium on Web Systems Evolution, {WSE}\n 2012, Trento, Italy, September 28, 2012},\n pages = {79--83},\n publisher = {{IEEE} Computer Society},\n year = {2012},\n url = {https://doi.org/10.1109/WSE.2012.6320536},\n doi = {10.1109/WSE.2012.6320536},\n timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/wse/GamaACD12.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n