Victor L. Winter

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

26EEVictor L. Winter: Program Transformation: What, How, and Why. Wiley Encyclopedia of Computer Science and Engineering 2008
25EEJoost Visser, Victor L. Winter: Preface. Electr. Notes Theor. Comput. Sci. 219: 1-2 (2008)
24EEVictor L. Winter, Azamatbek Mametjanov: Generative programming techniques for Java library migration. GPCE 2007: 185-196
23EEVictor L. Winter, Azamatbek Mametjanov, Steven E. Morrison, James A. McCoy, Gregory L. Wickstrom: Transformation-Based Library Adaptation for Embedded Systems. HASE 2007: 209-218
22EEYan Wu, Harvey P. Siy, Mansour Zand, Victor L. Winter: Construction of Ontology-Based Software Repositories by Text Mining. International Conference on Computational Science (3) 2007: 790-797
21EEVictor L. Winter: Model-driven Transformation-based Generation of Java Stress Tests. Electr. Notes Theor. Comput. Sci. 174(1): 99-114 (2007)
20EEVictor L. Winter, Jason Beranek: Program Transformation Using HATS 1.84. GTTSE 2006: 378-396
19EEVictor L. Winter, Jason Beranek, Fares Fraij, Steve Roach, Gregory L. Wickstrom: A transformational perspective into the core of an abstract class loader for the SSP. ACM Trans. Embedded Comput. Syst. 5(4): 773-818 (2006)
18EEVictor L. Winter, Jason Beranek, Azamatbek Mametjanov, Fares Fraij, Steve Roach: A Transformational Overview of the Core Functionality of an Abstract Class Loader for the SSP. WORDS 2005: 301-311
17EEVictor L. Winter: Strategy Construction in the Higher-Order Framework of TL. Electr. Notes Theor. Comput. Sci. 124(1): 149-170 (2005)
16EEGregory L. Wickstrom, Jared Davis, Steven E. Morrison, Steve Roach, Victor L. Winter: The SSP: An Example of High-Assurance Systems Engineering. HASE 2004: 167-177
15 Victor L. Winter, Steve Roach, Fares Fraij: Higher-order strategic programming: A road to software assurance. IASTED Conf. on Software Engineering and Applications 2004: 350-355
14EEVictor L. Winter, Mahadevan Subramaniam: The transient combinator, higher-order strategies, and the distributed data problem. Sci. Comput. Program. 52: 165-212 (2004)
13 Victor L. Winter, Steve Roach, Gregory L. Wickstrom: Transformation-oriented programming: A development methodology for high assurance software. Advances in Computers 58: 49-117 (2003)
12 Adriaan de Groot, Jozef Hooman, Fabrice Kordon, Emmanuel Paviot-Adet, Isabelle Vernier-Mounier, Michel Lemoine, Gervais Gaudiére, Victor L. Winter, Deepak Kapur: A Survey: Applying Formal Methods to a Software Intensive System. HASE 2001: 55-64
11 Allen P. Nikora, Raphael R. Some, Jeffrey M. Voas, Victor L. Winter, Jie Xu: Software Dependability in Distributed and Mobile Computing Environments. HASE 2001: 7-10
10EEVictor L. Winter, Dejan Desovski, Bojan Cukic: Virtual Environment Modeling for Requirements Validation of High Consequence Systems. RE 2001: 23-30
9EEDeepak Kapur, Victor L. Winter, Raymond Berg: Designing a Controller for a Multi-Train Multi-Track System. Electr. Notes Theor. Comput. Sci. 50(1): (2001)
8EEVictor L. Winter: A Synchronous Paradigm for Modeling Stable Reactive Systems. HASE 1999: 257-
7EEVictor L. Winter, Raymond Berg: Software Systems: Consequence versus Functionality. HASE 1999: 269-270
6 James M. Boyle, R. Daniel Resler, Victor L. Winter: Do You Trust Your Compiler? IEEE Computer 32(5): 65-73 (1999)
5EERaymond Berg, Victor L. Winter: Risk Assessment and Integrity in System Design. ICECCS 1998: 115-120
4 I-Ling Yen, Raymond A. Paul, Victor L. Winter, John M. Covan, Larry J. Dalton, Leon Alkalai, Ann T. Tai, Rick Harper, Barry Flahive, Wei-Tek Tsai, Ramin Mojdehbakhsh, Sanjai Rayadurgam, Kinji Mori, Michael R. Lowry: Key Applications for High-Assurance Systems. IEEE Computer 31(4): 35-45 (1998)
3EEJames M. Boyle, R. Daniel Resler, Victor L. Winter: Do You Trust Your Compiler? Applying Formal Methods to Constructing High-Assurance Compilers. HASE 1997: 14-
2EEVictor L. Winter: Software on the edge. HASE 1996: 57-
1EEVictor L. Winter, James M. Boyle: Proving refinement transformations for deriving high-assurance software. HASE 1996: 68-77

Coauthor Index

1Leon Alkalai [4]
2Jason Beranek [18] [19] [20]
3Raymond Berg [5] [7] [9]
4James M. Boyle [1] [3] [6]
5John M. Covan [4]
6Bojan Cukic [10]
7Larry J. Dalton [4]
8Jared Davis [16]
9Dejan Desovski [10]
10Barry Flahive [4]
11Fares Fraij [15] [18] [19]
12Gervais Gaudiére [12]
13Adriaan de Groot [12]
14Rick Harper [4]
15Jozef Hooman [12]
16Deepak Kapur [9] [12]
17Fabrice Kordon [12]
18Michel Lemoine [12]
19Michael R. Lowry [4]
20Azamatbek Mametjanov [18] [23] [24]
21James A. McCoy [23]
22Ramin Mojdehbakhsh [4]
23Kinji Mori [4]
24Steven E. Morrison [16] [23]
25Allen P. Nikora [11]
26Raymond A. Paul [4]
27Emmanuel Paviot-Adet [12]
28Sanjai Rayadurgam [4]
29R. Daniel Resler [3] [6]
30Steve Roach [13] [15] [16] [18] [19]
31Harvey P. Siy [22]
32Raphael R. Some [11]
33Mahadevan Subramaniam [14]
34Ann T. Tai [4]
35Wei-Tek Tsai [4]
36Isabelle Vernier-Mounier [12]
37Joost Visser [25]
38Jeffrey M. Voas [11]
39Gregory L. Wickstrom [13] [16] [19] [23]
40Yan Wu [22]
41Jie Xu [11]
42I-Ling Yen [4]
43Mansour Zand [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)