


default search action
James R. Cordy
Person information
- affiliation: Queen's University, Kingston, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c154]Bara' Nazzal, Manar H. Alalfi, James R. Cordy:
A Survey on the Verification and Validation of Artificial Pancreas Software Systems. ICSTW 2024: 1-9 - 2022
- [c153]Michael Ling, Yijun Yu
, Haitao Wu, Yuan Wang, James R. Cordy, Ahmed E. Hassan:
In Rust We Trust - A Transpiler from Unsafe C to Safer Rust. ICSE-Companion 2022: 354-355 - 2021
- [p8]Manishankar Mondal, Chanchal K. Roy, James R. Cordy:
NiCad: A Modern Clone Detector. Code Clone Analysis 2021: 45-50 - 2020
- [c152]Nafiseh Kahani, Mojtaba Bagherzadeh, James R. Cordy:
Synthesis of state machine models. MoDELS 2020: 274-284 - [c151]Nafiseh Kahani, James R. Cordy:
Bounded Verification of State Machine Models. SAM 2020: 23-32
2010 – 2019
- 2019
- [j39]Nafiseh Kahani, Mojtaba Bagherzadeh, James R. Cordy, Juergen Dingel, Dániel Varró
:
Survey and classification of model transformation tools. Softw. Syst. Model. 18(4): 2361-2397 (2019) - [j38]Matthew Stephan
, James R. Cordy:
MuMonDE: A framework for evaluating model clone detectors using model mutation analysis. Softw. Test. Verification Reliab. 29(1-2) (2019) - [c150]James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation - Experience with TXL (Most Influential Paper, SCAM 2001). SCAM 2019: 140 - [p7]Manar H. Alalfi, Eric J. Rapos, Andrew Stevenson, Matthew Stephan, Thomas R. Dean, James R. Cordy:
Variability Identification and Representation for Automotive Simulink Models. Automotive Systems and Software Engineering 2019: 109-139 - 2018
- [j37]Mojtaba Bagherzadeh, Nafiseh Kahani, Cor-Paul Bezemer
, Ahmed E. Hassan, Juergen Dingel, James R. Cordy:
Analyzing a decade of Linux system calls. Empir. Softw. Eng. 23(3): 1519-1551 (2018) - [j36]Manar H. Alalfi, Elizabeth P. Antony, James R. Cordy:
An approach to clone detection in sequence diagrams and its application to security analysis. Softw. Syst. Model. 17(4): 1287-1309 (2018) - [c149]Mojtaba Bagherzadeh, Nafiseh Kahani, Cor-Paul Bezemer, Ahmed E. Hassan, Juergen Dingel, James R. Cordy:
Analyzing a decade of Linux system calls. ICSE 2018: 267 - [c148]Eric J. Rapos, James R. Cordy:
SimEvo: A Toolset for Simulink Test Evolution & Maintenance. ICST 2018: 410-415 - [c147]Chanchal K. Roy, James R. Cordy:
Adventures in NICAD: a ten-year retrospective. ICPC 2018: 19 - [c146]Michal Pasternak, Nafiseh Kahani, Mojtaba Bagherzadeh, Juergen Dingel, James R. Cordy:
Simgen: a tool for generating simulations and visualizations of embedded systems on the unity game engine. MoDELS (Companion) 2018: 42-46 - [c145]Chanchal K. Roy, James R. Cordy:
Benchmarks for software clone detection: A ten-year retrospective. SANER 2018: 26-37 - 2017
- [c144]Nafiseh Kahani, Nicolas Hili, James R. Cordy, Juergen Dingel:
Evaluation of UML-RT and Papyrus-RT for Modelling Self-Adaptive Systems. MiSE@ICSE 2017: 12-18 - [c143]Eric J. Rapos, James R. Cordy:
SimPact: Impact Analysis for Simulink Models. ICSME 2017: 489-493 - [c142]Gehan M. K. Selim, James R. Cordy, Juergen Dingel:
How is ATL Really Used? Language Feature Use in the ATL Zoo. MoDELS 2017: 34-44 - 2016
- [c141]Nafiseh Kahani, Khalid Elgazzar, James R. Cordy:
Authentication and Access Control in e-Health Systems in the Cloud. BigDataSecurity/HPSC/IDS 2016: 13-23 - [c140]Tarek M. Ahmed, Farhana H. Zulkernine, James R. Cordy:
Proactive auto-scaling of resources for stream processing engines in the cloud. CASCON 2016: 226-231 - [c139]Eric J. Rapos, James R. Cordy:
Examining the co-evolution relationship between simulink models and their test cases. MiSE@ICSE 2016: 34-40 - [c138]Douglas H. Martin, James R. Cordy:
On the maintenance complexity of makefiles. WETSoM@ICSE 2016: 50-56 - [c137]Nafiseh Kahani, Mojtaba Bagherzadeh, Juergen Dingel, James R. Cordy:
The problems with eclipse modeling tools: a topic analysis of eclipse forums. MoDELS 2016: 227-237 - [c136]Matthew Stephan, James R. Cordy:
Model-Driven Evaluation of Software Architecture Quality Using Model Clone Detection. QRS 2016: 92-99 - [c135]Ashiqur Rahman, James R. Cordy:
Pattern Analysis of TXL Programs. IWSC 2016: 37-43 - 2015
- [j35]Moussa Amrani, Benoît Combemale, Levi Lucio, Gehan M. K. Selim, Jürgen Dingel, Yves Le Traon
, Hans Vangheluwe
, James R. Cordy:
Formal Verification Techniques for Model Transformations: A Tridimensional Classification. J. Object Technol. 14(3): 1:1-43 (2015) - [j34]Nicola Zeni
, Nadzeya Kiyavitskaya, Luisa Mich
, James R. Cordy, John Mylopoulos:
GaiusT: supporting the extraction of rights and obligations for regulatory compliance. Requir. Eng. 20(1): 1-22 (2015) - [j33]Andrew Stevenson, James R. Cordy:
Parse views with Boolean grammars. Sci. Comput. Program. 97: 59-63 (2015) - [j32]Gehan M. K. Selim, Shige Wang, James R. Cordy, Juergen Dingel:
Model transformations for migrating legacy deployment models in the automotive industry. Softw. Syst. Model. 14(1): 365-381 (2015) - [c134]Michalis Famelis, Levi Lucio, Gehan M. K. Selim, Alessio Di Sandro
, Rick Salay, Marsha Chechik, James R. Cordy, Jürgen Dingel, Hans Vangheluwe
, S. Ramesh:
Migrating Automotive Product Lines: A Case Study. ICMT 2015: 82-97 - [c133]Matthew Stephan, James R. Cordy:
Identifying Instances of Model Design Patterns and Antipatterns Using Model Clone Detection. MiSE@ICSE 2015: 48-53 - [c132]Douglas H. Martin, James R. Cordy, Bram Adams
, Giuliano Antoniol:
Make it simple: an empirical analysis of GNU make feature use in open source projects. ICPC 2015: 207-217 - [c131]Levi Lúcio, Bentley James Oakes, Cláudio Gomes, Gehan M. K. Selim, Juergen Dingel, James R. Cordy, Hans Vangheluwe:
SyVOLT: Full Model Transformation Verification Using Contracts. P&D@MoDELS 2015: 24-27 - [c130]Gehan M. K. Selim, James R. Cordy, Jürgen Dingel, Levi Lucio, Bentley J. Oakes:
Finding and Fixing Bugs in Model Transformations with Formal Verification: An Experience Report. AMT@MoDELS 2015: 26-35 - [c129]Matthew Stephan, James R. Cordy:
Identification of Simulink model antipattern instances using model clone detection. MoDELS 2015: 276-285 - [c128]Eric J. Rapos, Andrew Stevenson, Manar H. Alalfi
, James R. Cordy:
SimNav: Simulink navigation of model clone classes. SCAM 2015: 241-246 - [c127]Laleh Mousavi Eshkevari, Fabien Dos Santos, James R. Cordy, Giuliano Antoniol:
Are PHP applications ready for Hack? SANER 2015: 63-72 - [c126]James R. Cordy:
TXL source transformation in practice. SANER 2015: 590-591 - 2014
- [j31]James R. Cordy, Chanchal K. Roy:
Tuning research tools for scalability and performance: The NiCad experience. Sci. Comput. Program. 79: 158-171 (2014) - [j30]Andrew Stevenson, James R. Cordy:
A survey of grammatical inference in software engineering. Sci. Comput. Program. 96: 444-459 (2014) - [j29]Mariano Ceccato
, Zheng Li
, James R. Cordy:
Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012. J. Softw. Evol. Process. 26(6): 531-532 (2014) - [c125]James R. Cordy, Thomas R. Dean, Nikita Synytskyy:
Practical language-independent detection of near-miss clones. CASCON 2014: 2 - [c124]Scott Grant, James R. Cordy:
Examining the relationship between topic model similarity and software maintenance. CSMR-WCRE 2014: 303-307 - [c123]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
Analysis and clustering of model clones: An automotive industrial experience. CSMR-WCRE 2014: 375-378 - [c122]Gehan M. K. Selim, Levi Lucio, James R. Cordy, Jürgen Dingel, Bentley J. Oakes
:
Specification and Verification of Graph-Based Model Transformation Properties. ICGT 2014: 113-129 - [c121]Manar H. Alalfi
, Eric J. Rapos, Andrew Stevenson, Matthew Stephan, Thomas R. Dean, James R. Cordy:
Semi-automatic Identification and Representation of Subsystem Variability in Simulink Models. ICSME 2014: 486-490 - [c120]Matthew Stephan, Manar H. Alalfi
, James R. Cordy:
Towards a Taxonomy for Simulink Model Mutations. ICST Workshops 2014: 206-215 - [c119]Laleh Mousavi Eshkevari, Giuliano Antoniol, James R. Cordy, Massimiliano Di Penta
:
Identifying and locating interference issues in PHP applications: the case of WordPress. ICPC 2014: 157-167 - 2013
- [j28]Scott Grant, James R. Cordy, David B. Skillicorn
:
Using heuristics to estimate an appropriate number of latent topics in source code analysis. Sci. Comput. Program. 78(9): 1663-1678 (2013) - [j27]James R. Cordy, Paolo Tonella
:
Special section on ICSM 2011. J. Softw. Evol. Process. 25(11): 1137-1138 (2013) - [c118]Matthew Stephan, Manar H. Alalfi, Andrew Stevenson, James R. Cordy:
Using mutation analysis for a model-clone detector comparison framework. ICSE 2013: 1261-1264 - [c117]Asil A. Almonaies, Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
A Framework for Migrating Web Applications to Web Services. ICWE 2013: 384-399 - [c116]Paul L. Geesaman, James R. Cordy, Amal Zouaq:
Light-weight ontology alignment using best-match clone detection. IWSC 2013: 1-7 - [c115]Jeffrey Svajlenko, Chanchal K. Roy, James R. Cordy:
A mutation analysis based benchmarking framework for clone detectors. IWSC 2013: 8-9 - [c114]Matthew Stephan, Manar H. Alalfi, James R. Cordy, Andrew Stevenson:
Evolution of Model Clones in Simulink. ME@MoDELS 2013: 40-49 - [c113]Gehan M. K. Selim, Fabian Büttner, James R. Cordy, Jürgen Dingel, Shige Wang:
Automated Verification of Model Transformations in the Automotive Industry. MoDELS 2013: 690-706 - [c112]Matthew Stephan, James R. Cordy:
A Survey of Model Comparison Approaches and Applications. MODELSWARD 2013: 265-277 - [c111]Matthew Stephan, James R. Cordy:
Application of Model Comparison Techniques to Model Transformation Testing. MODELSWARD 2013: 307-311 - [c110]Nicola Zeni
, Luisa Mich
, John Mylopoulos, James R. Cordy:
Applying gaiust for extracting requirements from legal documents. RELAW 2013: 65-68 - [c109]James R. Cordy:
Submodel pattern extraction for simulink models. SPLC 2013: 7-10 - [c108]Elizabeth P. Antony, Manar H. Alalfi
, James R. Cordy:
An approach to clone detection in behavioural models. WCRE 2013: 472-476 - [e9]James R. Cordy, Krzystof Czarnecki, Sang-Ah Han:
Center for Advanced Studies on Collaborative Research, CASCON '13, Toronto, ON, Canada, November 18-20, 2013. IBM / ACM 2013 [contents] - [e8]Mark H. Chignell, James R. Cordy, Ryan Kealey, Joanna Ng, Yelena Yesha:
The Personal Web - A Research Agenda. Lecture Notes in Computer Science 7855, Springer 2013, ISBN 978-3-642-39994-7 [contents] - 2012
- [c107]Scott Grant, James R. Cordy, David B. Skillicorn
:
Using Topic Models to Support Software Maintenance. CSMR 2012: 403-408 - [c106]Gehan M. K. Selim, Shige Wang, James R. Cordy, Jürgen Dingel:
Model Transformations for Migrating Legacy Models: An Industrial Case Study. ECMFA 2012: 90-101 - [c105]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Models are code too: Near-miss clone detection for Simulink models. ICSM 2012: 295-304 - [c104]Moussa Amrani, Levi Lucio, Gehan M. K. Selim, Benoît Combemale, Jürgen Dingel, Hans Vangheluwe
, Yves Le Traon
, James R. Cordy:
A Tridimensional Approach for Studying the Formal Verification of Model Transformations. ICST 2012: 921-928 - [c103]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
Recovering Role-Based Access Control Security Models from Dynamic Web Applications. ICWE 2012: 121-136 - [c102]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean, Matthew Stephan, Andrew Stevenson:
Near-miss model clone detection for Simulink models. IWSC 2012: 78-79 - [c101]James R. Cordy, Katsuro Inoue, Rainer Koschke:
Foreword. IWSC 2012 - [c100]Matthew Stephan, Manar H. Alalfi, Andrew Stevenson, James R. Cordy:
Towards qualitative comparison of Simulink model clone detection approaches. IWSC 2012: 84-85 - [c99]Gehan M. K. Selim, James R. Cordy, Juergen Dingel:
Model transformation testing: the state of the art. AMT@MoDELS 2012: 21-26 - [c98]Andrew Stevenson, James R. Cordy:
Grammatical Inference in Software Engineering: An Overview of the State of the Art. SLE 2012: 204-223 - [c97]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
Automated verification of role-based access control security models recovered from dynamic web applications. WSE 2012: 1-10 - [c96]Widd Gama, Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
Normalizing object-oriented class styles in JavaScript. WSE 2012: 79-83 - [e7]James R. Cordy, Katsuro Inoue, Rainer Koschke, Jens Krinke, Chanchal K. Roy:
Proceeding of the 6th International Workshop on Software Clones, IWSC 2012, Zurich, Switzerland, June 4, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1794-8 [contents] - [i5]Ira D. Baxter, Michael Conradt, James R. Cordy, Rainer Koschke:
Software Clone Management Towards Industrial Application (Dagstuhl Seminar 12071). Dagstuhl Reports 2(2): 21-57 (2012) - 2011
- [c95]Asil A. Almonaies, Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
Towards a framework for migrating web applications to web services. CASCON 2011: 229-241 - [c94]Mark H. Chignell, James R. Cordy, Joanna W. Ng, Yelena Yesha:
Second Symposium on the Personal Web. CASCON 2011: 353-354 - [c93]James R. Cordy, Katsuro Inoue, Stanislaw Jarzabek, Rainer Koschke:
Fifth international workshop on software clones: (IWSC 2011). ICSE 2011: 1210-1211 - [c92]Andrian Marcus
, James R. Cordy, Paolo Tonella
:
Foreword. ICSM 2011 - [c91]James R. Cordy:
Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots. ICPC 2011: 151-160 - [c90]James R. Cordy, Chanchal K. Roy:
DebCheck: Efficient Checking for Open Source Code Clones in Software Systems. ICPC 2011: 217-218 - [c89]James R. Cordy, Chanchal K. Roy:
The NiCad Clone Detector. ICPC 2011: 219-220 - [c88]Douglas H. Martin, James R. Cordy:
Analyzing web service similarity using contextual clones. IWSC 2011: 41-46 - [c87]James R. Cordy:
Live scatterplots. IWSC 2011: 79-80 - [c86]Scott Grant, James R. Cordy, David B. Skillicorn
:
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code. WCRE 2011: 87-91 - [c85]Scott Grant, Douglas H. Martin, James R. Cordy, David B. Skillicorn
:
Contextualized semantic analysis of web services. WSE 2011: 33-42 - [e6]James R. Cordy, Katsuro Inoue, Stanislaw Jarzabek, Rainer Koschke:
Proceeding of the 5th ICSE International Workshop on Software Clones, IWSC 2011, Waikiki, Honolulu, HI, USA, May 23, 2011. ACM 2011, ISBN 978-1-4503-0588-4 [contents] - 2010
- [j26]Chanchal K. Roy, James R. Cordy:
Near-miss function clones in open source software: an empirical study. J. Softw. Maintenance Res. Pract. 22(3): 165-189 (2010) - [c84]Mark H. Chignell
, James R. Cordy, Joanna W. Ng, Yelena Yesha:
First symposium on the Personal Web. CASCON 2010: 327-329 - [c83]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
Automating Coverage Metrics for Dynamic Web Applications. CSMR 2010: 51-60 - [c82]Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy, Rainer Koschke:
Fourth International Workshop on Software Clones (IWSC). ICSE (2) 2010: 465-466 - [c81]Chanchal K. Roy, James R. Cordy:
Are scripting languages really different? IWSC 2010: 17-24 - [c80]Scott Grant, James R. Cordy:
Estimating the Optimal Number of Latent Concepts in Source Code Analysis. SCAM 2010: 65-74 - [c79]Francisco Durán
, Manuel Roldán, Jean-Christophe Bach, Emilie Balland, Mark van den Brand
, James R. Cordy, Steven Eker, Luc Engelen
, Maartje de Jonge, Karl Trygve Kalleberg, Lennart C. L. Kats, Pierre-Etienne Moreau, Eelco Visser
:
The Third Rewrite Engines Competition. WRLA 2010: 243-261 - [p6]Joanna W. Ng, Mark H. Chignell
, James R. Cordy, Yelena Yesha:
Motivation. The Smart Internet 2010: 3-8 - [p5]Joanna W. Ng, Mark H. Chignell
, James R. Cordy, Yelena Yesha:
Overview of the Smart Internet. The Smart Internet 2010: 49-56 - [p4]Joanna W. Ng, Mark H. Chignell
, James R. Cordy, Yelena Yesha:
Smart Interactions. The Smart Internet 2010: 59-64 - [p3]Joanna W. Ng, Mark H. Chignell
, James R. Cordy, Yelena Yesha:
Smart Services. The Smart Internet 2010: 173-177 - [p2]Douglas H. Martin, James R. Cordy:
Towards Web Services Tagging by Similarity Detection. The Smart Internet 2010: 216-233 - [e5]Mark H. Chignell, James R. Cordy, Joanna Ng, Yelena Yesha:
The Smart Internet - Current Research and Future Applications. Lecture Notes in Computer Science 6400, Springer 2010, ISBN 978-3-642-16598-6 [contents] - [e4]Katsuro Inoue, Stanislaw Jarzabek, Rainer Koschke, James R. Cordy:
Proceeding of the 4th ICSE International Workshop on Software Clones, IWSC 2010, Cape Town, South Africa, May 2010. ACM 2010, ISBN 978-1-60558-980-0 [contents]
2000 – 2009
- 2009
- [j25]Nadzeya Kiyavitskaya, Nicola Zeni
, James R. Cordy, Luisa Mich
, John Mylopoulos:
Cerno: Light-weight tool support for semantic annotation of textual documents. Data Knowl. Eng. 68(12): 1470-1492 (2009) - [j24]James R. Cordy, Lu Zhang:
Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008. Inf. Softw. Technol. 51(10): 1377-1378 (2009) - [j23]Chanchal Kumar Roy, James R. Cordy, Rainer Koschke:
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Sci. Comput. Program. 74(7): 470-495 (2009) - [j22]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
Modelling methods for web application verification and testing: state of the art. Softw. Test. Verification Reliab. 19(4): 265-296 (2009) - [c78]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
A verification framework for access control in dynamic web applications. C3S2E 2009: 109-113 - [c77]James R. Cordy, Mark H. Chignell
, Joanna Ng:
SITCON: the CAS/NSERC strategic workshop in smart internet technologies. CASCON 2009: 283-284 - [c76]Joanna W. Ng, Mark H. Chignell
, James R. Cordy:
The smart internet: transforming the web for the user. CASCON 2009: 285-296 - [c75]Rainer Koschke, Stanislaw Jarzabek, James R. Cordy, Katsuro Inoue:
Third International Workshop on Software Clones (IWSC). CSMR 2009: 269-270 - [c74]James R. Cordy:
Eating our own dog food: DSLs for generative and transformational engineering. GPCE 2009: 3-4 - [c73]James R. Cordy:
Excerpts from the TXL Cookbook. GTTSE 2009: 27-91 - [c72]Chanchal K. Roy, James R. Cordy:
A Mutation/Injection-Based Automatic Framework for Evaluating Code Clone Detection Tools. ICST Workshops 2009: 157-166 - [c71]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications. ICST Workshops 2009: 287-294 - [c70]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
White-Box Evaluation of Computer Vision Algorithms through Explicit Decision-Making. ICVS 2009: 295-304 - [c69]Scott Grant, James R. Cordy:
Vector space analysis of software clones. ICPC 2009: 233-237 - [c68]James R. Cordy:
Eating Our Own Dog Food: DSLs for Generative and Transformational Engineering. SLE 2009: 1 - [c67]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
WAFA: Fine-grained dynamic analysis of web applications. WSE 2009: 141-150 - 2008
- [c66]Nicola Zeni
, Nadzeya Kiyavitskaya, James R. Cordy, Luisa Mich
, John Mylopoulos:
Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract. ARES 2008: 1437-1442 - [c65]Chanchal Kumar Roy, James R. Cordy:
Towards a mutation-based automatic framework for evaluating code clone detection tools. C3S2E 2008: 137-140 - [c64]Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breaux, Annie I. Antón, James R. Cordy, Luisa Mich
, John Mylopoulos:
Automating the Extraction of Rights and Obligations for Regulatory Compliance. ER 2008: 154-168 - [c63]Nevon Brake, James R. Cordy, Elizabeth Dancy, Marin Litoiu
, Valentina Popescu:
Automating discovery of software tuning parameters. SEAMS 2008: 65-72 - [c62]Chanchal Kumar Roy, James R. Cordy:
Scenario-Based Comparison of Clone Detection Techniques. ICPC 2008: 153-162 - [c61]Chanchal Kumar Roy, James R. Cordy:
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization. ICPC 2008: 172-181 - [c60]Chanchal Kumar Roy, James R. Cordy:
An Empirical Study of Function Clones in Open Source Software. WCRE 2008: 81-90 - [c59]Scott Grant, James R. Cordy, David B. Skillicorn
:
Automated Concept Location Using Independent Component Analysis. WCRE 2008: 138-142 - [c58]Manar H. Alalfi
, James R. Cordy, Thomas R. Dean:
SQL2XMI: Reverse Engineering of UML-ER Diagrams from Relational Database Schemas. WCRE 2008: 187-191 - [p1]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
Decision-Based Specification and Comparison of Table Recognition Algorithms. Machine Learning in Document Analysis and Recognition 2008: 71-103 - 2007
- [c57]Andy Y. Mao, James R. Cordy, Thomas R. Dean:
Automated conversion of table-based websites to structured stylesheets using table recognition and clone detection. CASCON 2007: 12-26 - [c56]Nadzeya Kiyavitskaya, Nicola Zeni
, Luisa Mich
, James R. Cordy, John Mylopoulos:
Annotating Accommodation Advertisements Using CERNO. ENTER 2007: 389-400 - [c55]Manar H. Alalfi, James R. Cordy, Thomas R. Dean:
A Survey of Analysis Models and Methods in Website Verification and Testing. ICWE 2007: 306-311 - [c54]Nadzeya Kiyavitskaya, Nicola Zeni
, Travis D. Breaux
, Annie I. Antón, James R. Cordy, Luisa Mich
, John Mylopoulos:
Extracting rights and obligations from regulations: toward a tool-supported process. ASE 2007: 429-432 - [c53]Nicola Zeni
, Nadzeya Kiyavitskaya, Luisa Mich
, John Mylopoulos, James R. Cordy:
A Lightweight Approach to Semantic Annotation of Research Papers. NLDB 2007: 61-72 - 2006
- [j21]James R. Cordy:
The TXL source transformation language. Sci. Comput. Program. 61(3): 190-210 (2006) - [j20]Hongyu Zhang, Jeremy S. Bradbury
, James R. Cordy, Jürgen Dingel:
Using source transformation to test and model check implicit-invocation systems. Sci. Comput. Program. 62(3): 209-227 (2006) - [j19]James R. Cordy, Harald C. Gall
, Jonathan I. Maletic:
Guest editorial. Softw. Qual. J. 14(3): 185-186 (2006) - [c52]Adrian D. Thurston, James R. Cordy:
A backtracking LR algorithm for parsing ambiguous context-dependent languages. CASCON 2006: 39-53 - [c51]Elizabeth Dancy, James R. Cordy:
STAC: software tuning panels for autonomic control. CASCON 2006: 146-160 - [c50]Chanchal Kumar Roy, Thomas Noll
, Banani Roy, James R. Cordy:
Towards automatic verification of Erlang programs by pi-calculus translation. Erlang Workshop 2006: 38-50 - [c49]Dean Jin, James R. Cordy:
A Service-Sharing Methodology for Integrating COTS-Based Software Systems. ICCBSS 2006: 177-186 - [c48]Dean Jin, James R. Cordy:
Integrating Reverse Engineering Tools Using a Service-Sharing Methodology. ICPC 2006: 94-99 - [c47]Nadzeya Kiyavitskaya, Nicola Zeni
, Luisa Mich
, James R. Cordy, John Mylopoulos:
Text Mining Through Semi Automatic Semantic Annotation. PAKM 2006: 143-154 - [c46]James R. Cordy:
Source transformation, analysis and generation in TXL. PEPM 2006: 1-11 - [c45]Adrian D. Thurston, James R. Cordy:
Evolving TXL. SCAM 2006: 117-126 - [e3]James R. Cordy, Ralf Lämmel, Andreas Winter:
Transformation Techniques in Software Engineering, 17.-22. April 2005. Dagstuhl Seminar Proceedings 05161, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany 2006 [contents] - [i4]Andrew Walenstein, James R. Cordy, William S. Evans, Ahmed E. Hassan, Toshihiro Kamiya, Cory Kapser, Ettore Merlo:
06301 Working Session Summary: Presentation and Visualization of Redundant Code. Duplication, Redundancy, and Similarity in Software 2006 - [i3]Andrew Walenstein, Mohammad El-Ramly, James R. Cordy, William S. Evans, Kiarash Mahdavi, Markus Pizka, Ganesan Ramalingam, Jürgen Wolff von Gudenberg:
Similarity in Programs. Duplication, Redundancy, and Similarity in Software 2006 - 2005
- [c44]James R. Cordy, Anatol W. Kark:
Workshops of CASCON 2005/Ateliers de CASCON 20005. CASCON 2005: 283-291 - [c43]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
Recognition Tasks Are Imitation Games. ICAPR (1) 2005: 209-218 - [c42]Nadzeya Kiyavitskaya, Nicola Zeni
, James R. Cordy, Luisa Mich
, John Mylopoulos:
Applying Software Analysis Technology to Lightweight Semantic Markup of Document Text. ICAPR (1) 2005: 590-600 - [c41]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
Historical Recall and Precision: Summarizing Generated Hypotheses. ICDAR 2005: 202-206 - [c40]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
The Recognition Strategy Language. ICDAR 2005: 565-569 - [c39]Dean Jin, James R. Cordy:
Ontology-Based Software Analysis and Reengineering Tool Integration: The OASIS Service-Sharing Methodology. ICSM 2005: 613-616 - [c38]Jeremy S. Bradbury
, James R. Cordy, Jürgen Dingel:
An empirical framework for comparing effectiveness of testing and property-based formal analysis. PASTE 2005: 2-5 - [c37]Hongyu Zhang, Jeremy S. Bradbury
, James R. Cordy, Jürgen Dingel:
Implementation and Verification of Implicit-Invocation Systems Using Source Transformation. SCAM 2005: 87-96 - [c36]Derek M. Shimozawa, James R. Cordy:
TETE: A Non-Invasive Unit Testing Framework for Source Transformation. STEP 2005: 137-146 - [c35]Nadzeya Kiyavitskaya, Nicola Zeni, James R. Cordy, Luisa Mich, John Mylopoulos:
Semi-Automatic Semantic Annotations for Web Documents. SWAP 2005 - [c34]Lei Wang, James R. Cordy, Thomas R. Dean:
Enhancing Security Using Legality Assertions. WCRE 2005: 35-44 - [c33]Timothy Cassidy, James R. Cordy, Thomas R. Dean, Jürgen Dingel:
Source Transformation for Concurrency Analysis. LDTA@ETAPS 2005: 57-75 - [e2]James R. Cordy, Anatol W. Kark, Darlene A. Stewart:
Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative Research, October 17-20, 2005, Toronto, Ontario, Canada. IBM 2005 [contents] - [i2]James R. Cordy, Ralf Lämmel, Andreas Winter:
05161 Executive Summary - Transformation Techniques in Software Engineering. Transformation Techniques in Software Engineering 2005 - [i1]Jurgen J. Vinju, James R. Cordy:
How to make a bridge between transformation and analysis technologies?. Transformation Techniques in Software Engineering 2005 - 2004
- [j18]Andrea De Lucia
, James R. Cordy, John Mylopoulos:
Introduction. Autom. Softw. Eng. 11(1): 5-6 (2004) - [j17]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
A survey of table recognition. Int. J. Document Anal. Recognit. 7(1): 1-16 (2004) - [c32]James R. Cordy, Thomas R. Dean, Nikita Synytskyy:
Practical language-independent detection of near-miss clones. CASCON 2004: 1-12 - [c31]Jeremy S. Bradbury
, James R. Cordy, Jürgen Dingel, Michel Wermelinger:
A survey of self-management in dynamic software architecture specifications. WOSS 2004: 28-33 - [c30]James R. Cordy:
TXL - A Language for Programming Language Tools and Applications . LDTA@ETAPS 2004: 3-31 - [c29]Dean Jin, James R. Cordy:
Factbase Filtering Issues in an Ontology-Based Reverse Engineering Tool Integration System. ateM 2004: 65-75 - 2003
- [j16]Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider
:
Agile Parsing in TXL. Autom. Softw. Eng. 10(4): 311-336 (2003) - [c28]Nikita Synytskyy, James R. Cordy, Thomas R. Dean:
Robust multilingual parsing using island grammars. CASCON 2003: 266-278 - [c27]Dean Jin, James R. Cordy, Thomas R. Dean:
Transparent Reverse Engineering Tool Integration Using a Conceptual Transaction Adapter. CSMR 2003: 399-408 - [c26]James R. Cordy:
Generalized Selective XML Markup of Source Code Using Agile Parsing. IWPC 2003: 144-153 - [c25]James R. Cordy:
Comprehending Reality - Practical Barriers to Industrial Adoption of Software Maintenance Automation. IWPC 2003: 196-206 - [c24]Xinping Guo, James R. Cordy, Thomas R. Dean:
Unique Renaming of Java Using Source Transformation. SCAM 2003: 151-160 - [c23]Nikita Synytskyy, James R. Cordy, Thomas R. Dean:
Resolution of Static Clones in Dynamic Web Pages. WSE 2003: 49 - 2002
- [j15]James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider
:
Source transformation in software engineering using the TXL transformation system. Inf. Softw. Technol. 44(13): 827-837 (2002) - [j14]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
Recognizing Mathematical Expressions Using Tree Transformation. IEEE Trans. Pattern Anal. Mach. Intell. 24(11): 1455-1467 (2002) - [c22]Kevin A. Schneider, James R. Cordy:
AUI: A Programming Language for Developing Plastic Interactive Software. HICSS 2002: 281 - [c21]Dorothea Blostein, James R. Cordy, Richard Zanibbi
:
Applying Compiler Techniques to Diagram Recognition. ICPR (3) 2002: 123-126 - [c20]Dean Jin, James R. Cordy, Thomas R. Dean:
Where's the Schema? A Taxonomy of Patterns for Software Exchange. IWPC 2002: 65-74 - [c19]Thomas R. Dean, James R. Cordy, Andrew J. Malton, Kevin A. Schneider:
Grammar Programming in TXL. SCAM 2002: 93- - 2001
- [c18]Kevin A. Schneider
, James R. Cordy:
Abstract User Interfaces: A Model and Notation to Support Plasticity in Interactive Systems. DSV-IS 2001: 28-48 - [c17]Richard Zanibbi
, Dorothea Blostein, James R. Cordy:
Baseline Structure Analysis of Handwritten Mathematics Notation. ICDAR 2001: 768-773 - [c16]Thomas R. Dean, James R. Cordy, Kevin A. Schneider
, Andrew J. Malton:
Using Design Recovery Techniques to Transform Legacy Systems. ICSM 2001: 622-631 - [c15]Andrew J. Malton, Kevin A. Schneider, James R. Cordy, Thomas R. Dean, Darren Cousineau, Jason Reynolds:
Processing Software Source Text in Automated Design Recovery and Transformation. IWPC 2001: 127-134 - [c14]James R. Cordy, Kevin A. Schneider, Thomas R. Dean, Andrew J. Malton:
HSML: Design Directed Source Code Hot Spots. IWPC 2001: 145-154 - [c13]Hoda Fahmy, Richard C. Holt, James R. Cordy:
Wins and Losses of Algebraic Transformations of Software Architectures. ASE 2001: 51-62 - [c12]James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider:
Software Engineering by Source Transformation-Experience with TXL. SCAM 2001: 170-180
1990 – 1999
- 1995
- [j13]Thomas R. Dean, James R. Cordy:
A Syntactic Theory of Software Architecture. IEEE Trans. Software Eng. 21(4): 302-313 (1995) - 1994
- [c11]Rateb Abu-Hamdeh, James R. Cordy, T. Patrick Martin:
Schema translation using structural transformation. CASCON 1994: 1 - 1993
- [j12]James R. Cordy, Mario Barbacci:
Introduction to the Special Issue on ICCL '92. Comput. Lang. 19(2): 63-64 (1993) - [c10]Thomas R. Dean, James R. Cordy:
Software Structure Characterization Using Connectivity. ICSE Workshop on Studies of Software Design 1993: 33-48 - 1992
- [j11]James R. Cordy, T. C. Nicholas Graham:
GVL: Visual specification of graphical output. J. Vis. Lang. Comput. 3(1): 25-47 (1992) - [c9]James R. Cordy, Medha Shukla:
Practical metaprogramming. CASCON 1992: 215-224 - [e1]James R. Cordy, Mario Barbacci:
ICCL'92, Proceedings of the 1992 International Conference on Computer Languages, Oakland, California, USA, 20-23 Apr 1992. IEEE Computer Society 1992, ISBN 0-8186-2585-6 [contents] - 1991
- [j10]James R. Cordy, Charles D. Halpern-Hamu
, Eric Promislow:
TXL: A Rapid Prototyping System for Programming Language Dialects. Comput. Lang. 16(1): 97-107 (1991) - 1990
- [j9]James R. Cordy, Richard C. Holt:
Code Generation Using an Orthogonal Model. Softw. Pract. Exp. 20(3): 301-320 (1990) - [j8]James R. Cordy, Nicholas L. Eliot, Michael G. Robertson:
TuringTool: A User Interface to Aid in the Software Maintenance Task. IEEE Trans. Software Eng. 16(3): 294-301 (1990) - [c8]James R. Cordy, T. C. Nicholas Graham:
GVL: A Graphical, Functional Language for the Specification of Output in Programming Languages. ICCL 1990: 11-22 - [c7]James R. Cordy, Eric Promislow:
Specification and Automatic Prototype Implementation of Polymorphic Objects in TURING Using the TXL Dialect Processor. ICCL 1990: 145-154
1980 – 1989
- 1989
- [j7]David T. Barnard, James R. Cordy:
Automatically Generating SL Parsers From LL(1) Grammars. Comput. Lang. 14(2): 93-98 (1989) - 1988
- [j6]Richard C. Holt, James R. Cordy:
The Turing Programming Language. Commun. ACM 31(12): 1410-1423 (1988) - [j5]David T. Barnard, James R. Cordy:
SL Parses The LR Languages. Comput. Lang. 13(2): 65-74 (1988) - [j4]Stephen G. Perelgut, James R. Cordy:
Turing Plus: a comparison with C and Pascal. ACM SIGPLAN Notices 23(1): 137-143 (1988) - [c6]James R. Cordy, Charles D. Halpern-Hamu, Eric Promislow:
TXL: a rapid prototyping system for programming language dialects. ICCL 1988: 280-285 - 1987
- [c5]James R. Cordy, T. C. Nicholas Graham:
Design of an interpretive environment for Turing. PLDI 1987: 199-204 - 1986
- [b1]James R. Cordy:
An orthogonal model for code generation. University of Toronto, Canada, 1986 - 1984
- [j3]James R. Cordy:
Compile-Time Detection of Aliasing in Euclid Programs. Softw. Pract. Exp. 14(8): 755-768 (1984) - 1982
- [j2]Richard C. Holt, James R. Cordy, David B. Wortman:
An Introduction to S/SL: Syntax/Semantic Language. ACM Trans. Program. Lang. Syst. 4(2): 149-178 (1982) - 1981
- [c4]David B. Wortman, Richard C. Holt, James R. Cordy, David R. Crowe, Ian H. Griggs:
Euclid: a language for compiling quality software. AFIPS National Computer Conference 1981: 257-263 - [c3]David B. Wortman, James R. Cordy:
Early Experiences with Euclid. ICSE 1981: 27-33
1970 – 1979
- 1979
- [c2]James R. Cordy, Richard C. Holt, David B. Wortman:
Semantic charts: A diagrammatic approach to semantic processing. SIGPLAN Symposium on Compiler Construction 1979: 39-49 - 1978
- [c1]Richard C. Holt, David B. Wortman, James R. Cordy, David R. Crowe:
The Euclid Language: a progress report. ACM Annual Conference (1) 1978: 111-115 - 1977
- [j1]Richard C. Holt, David B. Wortman, David T. Barnard, James R. Cordy:
SP/k: A System for Teaching Computer Programming. Commun. ACM 20(5): 301-309 (1977)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint