default search action
Ettore Merlo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i7]Qiaolin Qin, Heng Li, Ettore Merlo:
Wrangling Data Issues to be Wrangled: Literature Review, Taxonomy, and Industry Case Study. CoRR abs/2405.16033 (2024) - 2023
- [c96]Julien Cassagne, Ettore Merlo, Paula Branco, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Unsupervised Graph Neural Networks for Source Code Similarity Detection. DS 2023: 535-549 - [c95]Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code. FPS (1) 2023: 321-338 - 2022
- [j21]Florian Tambon, Gabriel Laberge, Le An, Amin Nikanjam, Paulina Stevia Nouwou Mindom, Yann Pequignot, Foutse Khomh, Giulio Antoniol, Ettore Merlo, François Laviolette:
How to certify machine learning based safety-critical systems? A systematic literature review. Autom. Softw. Eng. 29(2): 38 (2022) - [c94]Mira Marhaba, Ettore Merlo, Foutse Khomh, Giuliano Antoniol:
Identification of out-of-distribution cases of CNN using class-based surprise adequacy. CAIN 2022: 39-40 - [c93]Ettore Merlo, Carlo Pinciroli, Jacopo Panerati, Michalis Famelis, Giovanni Beltrame:
Automated extraction and checking of property models from source code for robot swarms. RoSE@ICSE 2022: 47-54 - [c92]Ettore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Phishing Kits Source Code Similarity Distribution: A Case Study. SANER 2022: 983-994 - 2021
- [j20]Marc-André Laverdière, Karl Julien, Ettore Merlo:
RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications. Inf. Softw. Technol. 139: 106630 (2021) - [i6]Florian Tambon, Gabriel Laberge, Le An, Amin Nikanjam, Paulina Stevia Nouwou Mindom, Yann Pequignot, Foutse Khomh, Giulio Antoniol, Ettore Merlo, François Laviolette:
How to Certify Machine Learning Based Safety-critical Systems? A Systematic Literature Review. CoRR abs/2107.12045 (2021) - [i5]Ettore Merlo, Mira Marhaba, Foutse Khomh, Houssem Ben Braiek, Giuliano Antoniol:
Models of Computational Profiles to Study the Likelihood of DNN Metamorphic Test Cases. CoRR abs/2107.13491 (2021) - 2020
- [j19]Zhuobing Han, Xiaohong Li, Guangquan Xu, Naixue Xiong, Ettore Merlo, Eleni Stroulia:
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models. IEEE Trans. Ind. Informatics 16(2): 1024-1034 (2020)
2010 – 2019
- 2018
- [c91]Amine Barrak, Marc-André Laverdière, Foutse Khomh, Le An, Ettore Merlo:
Just-in-time detection of protection-impacting changes on WordPress and MediaWiki. CASCON 2018: 178-188 - [c90]Nasim Beigi Mohammadi, Marin Litoiu, Mahsa Emami-Taba, Ladan Tahvildari, Marios Fokaefs, Ettore Merlo, Iosif-Viorel Onut:
A DevOps framework for quality-driven self-protection in web software systems. CASCON 2018: 270-274 - [c89]Giovanni Beltrame, Ettore Merlo, Jacopo Panerati, Carlo Pinciroli:
Engineering safety in swarm robotics. RoSE@ICSE 2018: 36-39 - [c88]Marc-André Laverdière, Ettore Merlo:
Detection of protection-impacting changes during software evolution. SANER 2018: 434-444 - 2017
- [j18]Thierry Lavoie, Mathieu Mérineau, Ettore Merlo, Pascal Potvin:
A case study of TTCN-3 test scripts clone analysis in an industrial telecommunication setting. Inf. Softw. Technol. 87: 32-45 (2017) - [c87]Marc-André Laverdière, Ettore Merlo:
Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper). PST 2017: 349-354 - [c86]Marc-André Laverdière, Ettore Merlo:
Computing counter-examples for privilege protection losses using security models. SANER 2017: 240-249 - 2015
- [c85]Zhuobing Han, Mathieu Mérineau, François Gauthier, Ettore Merlo, Xiaohong Li, Eleni Stroulia:
Evolutionary analysis of access control models: a formal concept analysis method. CASCON 2015: 261-264 - [c84]Guy-Vincent Jourdan, Gregor von Bochmann, Ettore Merlo, James Miller, Vio Onut, Lin Tan:
Workshop on the application of security and testing to rich internet applications. CASCON 2015: 320-322 - [c83]Thierry Lavoie, Ettore Merlo:
Performance impact of lazy deletion in metric trees for incremental clone analysis. IWSC 2015: 15-18 - [c82]Marc-André Laverdière, Bernhard J. Berger, Ettore Merlo:
Taint analysis of manual service compositions using Cross-Application Call Graphs. SANER 2015: 585-589 - 2014
- [j17]Thierry Lavoie, Ettore Merlo:
About Metrics for Clone Detection. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 63 (2014) - [c81]François Gauthier, Ettore Merlo, Eleni Stroulia, David Turner:
Supporting Maintenance and Evolution of Access Control Models in Web Applications. ICSME 2014: 506-510 - 2013
- [c80]François Gauthier, Thierry Lavoie, Ettore Merlo:
Uncovering access control weaknesses and flaws with security-discordant software clones. ACSAC 2013: 209-218 - [c79]François Gauthier, Ettore Merlo:
Semantic smells and errors in access control models: a case study in PHP. ICSE 2013: 1169-1172 - [c78]Ettore Merlo, Thierry Lavoie, Pascal Potvin, Pierre Busnel:
Large scale multi-language clone analysis in a telecommunication industrial setting. IWSC 2013: 69-75 - [c77]Thierry Lavoie, Ettore Merlo:
How much really changes? A case study of firefox version evolution using a clone detector. IWSC 2013: 83-89 - [c76]Philip C. Pratt-Szeliga, Marc-André Laverdière, Ettore Merlo, James W. Fawcett, Roy D. Welch:
Soot class loading in the rootbeer GPU compiler. SOAP@PLDI 2013: 19-24 - 2012
- [c75]François Gauthier, Ettore Merlo:
Investigation of Access Control Models with Formal Concept Analysis: A Case Study. CSMR 2012: 397-402 - [c74]Neset Sozen, Ettore Merlo:
Adapting software product lines for complex certifiable avionics software. PLEASE@ICSE 2012: 21-24 - [c73]Maxime Ouellet, Ettore Merlo, Neset Sozen, Martin Gagnon:
Locating features in dynamically configured avionics software. ICSE 2012: 1453-1454 - [c72]Thierry Lavoie, Ettore Merlo:
An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance. IWSC 2012: 1-7 - [c71]François Gauthier, Ettore Merlo:
Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications. SCAM 2012: 44-53 - [c70]Dominic Letarte, François Gauthier, Ettore Merlo, Nattavut Sutyanyong, Calisto Zuzarte:
Targeted genetic test SQL generation for the DB2 database. DBTest 2012: 5 - [c69]François Gauthier, Ettore Merlo:
Fast Detection of Access Control Vulnerabilities in PHP Applications. WCRE 2012: 247-256 - [c68]Thierry Lavoie, Foutse Khomh, Ettore Merlo, Ying Zou:
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection. WCRE 2012: 325-334 - 2011
- [c67]Dominic Letarte, François Gauthier, Ettore Merlo:
Security Model Evolution of PHP Web Applications. ICST 2011: 289-298 - [c66]Thierry Lavoie, Ettore Merlo:
Automated type-3 clone oracle using levenshtein metric. IWSC 2011: 34-40 - [c65]François Gauthier, Dominic Letarte, Thierry Lavoie, Ettore Merlo:
Extraction and comprehension of moodle's access control model: A case study. PST 2011: 44-51 - 2010
- [c64]Thierry Lavoie, Michael Eilers-Smith, Ettore Merlo:
Challenging cloning related problems with GPU-based algorithms. IWSC 2010: 25-32
2000 – 2009
- 2009
- [c63]Dominic Letarte, Ettore Merlo:
Extraction of Inter-procedural Simple Role Privilege Models from PHP Code. WCRE 2009: 187-191 - [c62]Ettore Merlo, Thierry Lavoie:
Computing Structural Types of Clone Syntactic Blocks. WCRE 2009: 274-278 - 2008
- [j16]Concettina Del Grosso, Giuliano Antoniol, Ettore Merlo, Philippe Galinier:
Detecting buffer overflow via automatic test input data generation. Comput. Oper. Res. 35(10): 3125-3143 (2008) - 2007
- [j15]Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, Ettore Merlo:
Comparison and Evaluation of Clone Detection Tools. IEEE Trans. Software Eng. 33(9): 577-591 (2007) - [c61]Ettore Merlo, Dominic Letarte, Giuliano Antoniol:
Automated Protection of PHP Applications Against SQL-injection Attacks. CSMR 2007: 191-202 - [c60]Giuliano Antoniol, Yann-Gaël Guéhéneuc, Ettore Merlo, Paolo Tonella:
Mining the Lexicon Used by Programmers during Sofware Evolution. ICSM 2007: 14-23 - [c59]Ettore Merlo, Dominic Letarte, Giuliano Antoniol:
SQL-Injection Security Evolution Analysis in PHP. WSE 2007: 45-49 - [e1]Rainer Koschke, Ettore Merlo, Andrew Walenstein:
Duplication, Redundancy, and Similarity in Software, 23.07. - 26.07.2006. Dagstuhl Seminar Proceedings 06301, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - 2006
- [c58]Salah Bouktif, Giuliano Antoniol, Ettore Merlo, Markus Neteler:
A novel approach to optimize clone refactoring activity. GECCO 2006: 1885-1892 - [c57]Salah Bouktif, Giuliano Antoniol, Ettore Merlo:
A Feedback Based Quality Assessment to Support Open Source Software Evolution: the GRASS Case Study. ICSM 2006: 155-165 - [c56]Ettore Merlo, Dominic Letarte, Giuliano Antoniol:
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP. WCRE 2006: 147-156 - [i4]Rainer Koschke, Andrew Walenstein, Ettore Merlo:
06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software. Duplication, Redundancy, and Similarity in Software 2006 - [i3]Ettore Merlo:
Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity. Duplication, Redundancy, and Similarity in Software 2006 - [i2]Andrew Walenstein, James R. Cordy, William S. Evans, Ahmed E. Hassan, Toshihiro Kamiya, Cory Kapser, Ettore Merlo:
06301 Working Session Summary: Presentation and Visualization of Redundant Code. Duplication, Redundancy, and Similarity in Software 2006 - [i1]Andrew Walenstein, Rainer Koschke, Ettore Merlo:
06301 Summary -- Duplication, Redundancy, and Similarity in Software. Duplication, Redundancy, and Similarity in Software 2006 - 2005
- [j14]Massimiliano Di Penta, Markus Neteler, Giuliano Antoniol, Ettore Merlo:
A language-independent software renovation framework. J. Syst. Softw. 77(3): 225-240 (2005) - [c55]Concettina Del Grosso, Giuliano Antoniol, Massimiliano Di Penta, Philippe Galinier, Ettore Merlo:
Improving network applications security: a new heuristic to generate stress testing data. GECCO 2005: 1037-1043 - [c54]Giuliano Antoniol, Ettore Merlo, Yann-Gaël Guéhéneuc, Houari A. Sahraoui:
On feature traceability in object oriented programs. TEFSE@ASE 2005: 73-78 - 2004
- [c53]Ettore Merlo, Giuliano Antoniol, Massimiliano Di Penta, Vincenzo Fabio Rollo:
Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses. ICSM 2004: 412-416 - [c52]Giuliano Antoniol, Massimiliano Di Penta, Ettore Merlo:
An Automatic Approach to identify Class Evolution Discontinuities. IWPSE 2004: 31-40 - 2003
- [j13]Ettore Merlo, Ian McAdam, Renato de Mori:
Feed-forward and recurrent neural networks for source code informal information analysis. J. Softw. Maintenance Res. Pract. 15(4): 205-244 (2003) - [c51]Ettore Merlo, Giuliano Antoniol, Pierre-Luc Brunelle:
Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels. CSMR 2003: 351- - [c50]Pierre-Luc Brunelle, Ettore Merlo, Giuliano Antoniol:
Investigating Java Type Analyses for the Receiver-Classes Testing Criterion. ISSRE 2003: 419-429 - [c49]Giuliano Antoniol, Massimiliano Di Penta, Ettore Merlo:
YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs. IWPC 2003: 13-22 - 2002
- [j12]Giuliano Antoniol, Umberto Villano, Ettore Merlo, Massimiliano Di Penta:
Analyzing cloning evolution in the Linux kernel. Inf. Softw. Technol. 44(13): 755-765 (2002) - [j11]Giuliano Antoniol, Gerardo Canfora, Gerardo Casazza, Andrea De Lucia, Ettore Merlo:
Recovering Traceability Links between Code and Documentation. IEEE Trans. Software Eng. 28(10): 970-983 (2002) - [c48]Ettore Merlo, Michel R. Dagenais, P. Bachand, J. S. Sormani, Sara Gradara, Giuliano Antoniol:
Investigating Large Software System Evolution: The Linux Kernel. COMPSAC 2002: 421-426 - [c47]Massimiliano Di Penta, Markus Neteler, Giuliano Antoniol, Ettore Merlo:
Knowledge-Based Library Re-Factoring for an Open Source Project. WCRE 2002: 319-328 - 2001
- [c46]Massimiliano Di Penta, Gerardo Casazza, Giuliano Antoniol, Ettore Merlo:
Modeling Web Maintenance Centers through Queue Models. CSMR 2001: 131-138 - [c45]Bruno Malenfant, Giuliano Antoniol, Ettore Merlo, Michel R. Dagenais:
Flow Analysis to Detect Blocked Statements. ICSM 2001: 62- - [c44]Giuliano Antoniol, Gerardo Casazza, Massimiliano Di Penta, Ettore Merlo:
Modeling Clones Evolution through Time Series. ICSM 2001: 273-280 - [c43]Giuliano Antoniol, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo:
A Method to Re-Organize Legacy Systems via Concept Analysis. IWPC 2001: 281-290 - [c42]Giuliano Antoniol, Umberto Villano, Massimiliano Di Penta, Gerardo Casazza, Ettore Merlo:
Identifying Clones in the Linux Kernel. SCAM 2001: 92-99 - [c41]Giuliano Antoniol, Gerardo Casazza, Giuseppe A. Di Lucca, Massimiliano Di Penta, Ettore Merlo:
Predicting Web Site Access: An Application of Time Series. WSE 2001: 57-61 - 2000
- [j10]Jean Mayrand, Jean-François Patenaude, Ettore Merlo, Michel R. Dagenais, Bruno Laguë:
Software assessment using metrics: A comparison across large C++ and Java systems. Ann. Softw. Eng. 9: 117-141 (2000) - [c40]Ying Hu, Ettore Merlo, Michel R. Dagenais, Bruno Laguë:
C/C++ Conditional Compilation Analysis using Symbolic Execution. ICSM 2000: 196-206 - [c39]Giuliano Antoniol, Gerardo Canfora, Andrea De Lucia, Gerardo Casazza, Ettore Merlo:
Tracing Object-Oriented Code into Functional Requirements. IWPC 2000: 79-86 - [c38]Giuliano Antoniol, Gerardo Casazza, Ettore Merlo:
Identification of Lower-Level Artifacts. IWPC 2000: 253 - [c37]Magdalena Balazinska, Ettore Merlo, Michel R. Dagenais, Bruno Laguë, Kostas Kontogiannis:
Advanced Clone-Analysis to Support Object-Oriented System Refactoring. WCRE 2000: 98-107
1990 – 1999
- 1999
- [j9]Roberto Fiutem, Paolo Tonella, Giuliano Antoniol, Ettore Merlo:
Points-to analysis for program understanding. J. Syst. Softw. 44(3): 213-227 (1999) - [j8]Paolo Tonella, Giuliano Antoniol, Roberto Fiutem, Ettore Merlo:
Variable-precision reaching definitions analysis. J. Softw. Maintenance Res. Pract. 11(2): 117-142 (1999) - [j7]Roberto Fiutem, Giuliano Antoniol, Paolo Tonella, Ettore Merlo:
ART: an architectural reverse engineering environment. J. Softw. Maintenance Res. Pract. 11(5): 339-364 (1999) - [c36]Ettore Merlo, Giuliano Antoniol:
A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. CASCON 1999: 7 - [c35]Sébastien Lapierre, Ettore Merlo, Gilles Savard, Giuliano Antoniol, Roberto Fiutem, Paolo Tonella:
Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees. ICSM 1999: 189-198 - [c34]Jean-François Patenaude, Ettore Merlo, Michel R. Dagenais, Bruno Laguë:
Extending Software Quality Assessment Techniques to Java Systems. IWPC 1999: 49-56 - [c33]Gregory Knapen, Bruno Laguë, Michel R. Dagenais, Ettore Merlo:
Parsing C++ Despite Missing Declarations. IWPC 1999: 114-125 - [c32]Magdalena Balazinska, Ettore Merlo, Michel R. Dagenais, Bruno Laguë, Kostas Kontogiannis:
Measuring Clone Based Reengineering Opportunities. IEEE METRICS 1999: 292-303 - [c31]Giuliano Antoniol, Gerardo Canfora, Andrea De Lucia, Ettore Merlo:
Recovering Code to Documentation Links in OO Systems. WCRE 1999: 136-144 - [c30]Magdalena Balazinska, Ettore Merlo, Michel R. Dagenais, Bruno Laguë, Kostas Kontogiannis:
Partial Redesign of Java Software Systems Based on Clone Analysis. WCRE 1999: 326-336 - 1998
- [c29]Michel R. Dagenais, Ettore Merlo, Bruno Laguë, Daniel Proulx:
Clones occurence in large object oriented software packages. CASCON 1998: 10 - [c28]Alain April, Alain Abran, Ettore Merlo:
Process Assurance Audits: Lessons Learned. ICSE 1998: 482-485 - [c27]Bruno Laguë, Charles Leduc, André Le Bon, Ettore Merlo, Michel R. Dagenais:
An Analysis Framework for Understanding Layered Software Architectures. IWPC 1998: 37-44 - 1997
- [c26]Paolo Tonella, Giuliano Antoniol, Roberto Fiutem, Ettore Merlo:
Variable Precision Reaching Definitions Analysis for Software Maintenance. CSMR 1997: 60-67 - [c25]Paolo Tonella, Giuliano Antoniol, Roberto Fiutem, Ettore Merlo:
Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing. ICSE 1997: 433-443 - [c24]Giuliano Antoniol, Roberto Fiutem, G. Lutteri, Paolo Tonella, S. Zanfei, Ettore Merlo:
Program Understanding and Maintenance with the CANTO Environment. ICSM 1997: 72- - [c23]Bruno Laguë, Daniel Proulx, Jean Mayrand, Ettore Merlo, John P. Hudepohl:
Assessing the Benefits of Incorporating Function Clone Detection in a Development Process. ICSM 1997: 314-321 - [c22]Paolo Tonella, Giuliano Antoniol, Roberto Fiutem, Ettore Merlo:
Points-to Analysis for Program Understanding. WPC 1997: 90-99 - [c21]Alain April, Ettore Merlo, Alain Abran:
A Reverse Engineering Approach to Evaluate Function Point Rules. WCRE 1997: 236-246 - 1996
- [j6]Kostas Kontogiannis, Renato de Mori, Ettore Merlo, Michael Galler, Morris Bernstein:
Pattern Matching for Clone and Concept Detection. Autom. Softw. Eng. 3(1/2): 77-108 (1996) - [c20]Jean Mayrand, Claude Leblanc, Ettore Merlo:
Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. ICSM 1996: 244- - [c19]Roberto Fiutem, Paolo Tonella, Giuliano Antoniol, Ettore Merlo:
A Cliche'-Based Environment to Support Architectural Reverse Engineering. ICSM 1996: 319-328 - [c18]Roberto Fiutem, Ettore Merlo, Giuliano Antoniol, Paolo Tonella:
Understanding the architecture of software systems. WPC 1996: 187- - [c17]Jean Mayrand, Francois Guay, Ettore Merlo:
Inheritance Graph Assessment Using Metrics. IEEE METRICS 1996: 54-63 - [c16]Paolo Tonella, Roberto Fiutem, Giuliano Antoniol, Ettore Merlo:
Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic -A Case Study. WCRE 1996: 198-207 - [c15]Roberto Fiutem, Paolo Tonella, Giuliano Antoniol, Ettore Merlo:
A Cliche-Based Environment to Support Architectural Reverse Engineering. WCRE 1996: 277-286 - 1995
- [j5]Ettore Merlo, Jean-Francois Girard, Laurie J. Hendren, Renato de Mori:
Multi-Valued Constant Propagation Analysis for User Interface Reengineering. Int. J. Softw. Eng. Knowl. Eng. 5(1): 5-23 (1995) - [j4]Ettore Merlo, Pierre-Yves Gagné, Jean-Francois Girard, Kostas Kontogiannis, Laurie J. Hendren, Prakash Panangaden, Renato de Mori:
Reengineering User Interfaces. IEEE Softw. 12(1): 64-73 (1995) - [c14]Michael J. Whitney, Morris Bernstein, Renato de Mori, Kostas Kontogiannis, Brian Corrie, Hausi A. Müller, Scott R. Tilley, Ettore Merlo, John Mylopoulos, Kenny Wong, J. Howard Johnson, James McDaniel, Martin Stanley:
Using an integrated toolset for program understanding. CASCON 1995: 59 - [c13]Giuliano Antoniol, Roberto Fiutem, Ettore Merlo, Paolo Tonella:
Application and user interface migration from BASIC to Visual C++. ICSM 1995: 76- - [c12]Kostas Kontogiannis, Renato de Mori, Morris Bernstein, Michael Galler, Ettore Merlo:
Pattern Matching for Design Concept Localization. WCRE 1995 - 1994
- [j3]Erich B. Buss, Renato de Mori, W. Morven Gentleman, John Henshaw, J. Howard Johnson, Kostas Kontogiannis, Ettore Merlo, Hausi A. Müller, John Mylopoulos, Santanu Paul, Atul Prakash, Martin Stanley, Scott R. Tilley, Joel Troster, Kenny Wong:
Investigating Reverse Engineering Technologies for the CAS Program Understanding Project. IBM Syst. J. 33(3): 477-500 (1994) - [c11]John Mylopoulos, Martin Stanley, Kenny Wong, Morris Bernstein, Renato de Mori, Graham W. Ewart, Kostas Kontogiannis, Ettore Merlo, Hausi A. Müller, Scott R. Tilley, Marijana Tomic:
Towards an integrated toolset for program understanding. CASCON 1994: 48 - [c10]Ettore Merlo, Pierre-Yves Gagné, Alain Thiboutôt:
Inference of Graphical AUIDL Specifications for the Reverse Engineering of User Interfaces. ICSM 1994: 80-88 - [c9]Kostas Kontogiannis, Renato de Mori, Morris Bernstein, Ettore Merlo:
Localization of Design Concepts in Legacy Systems. ICSM 1994: 414-423 - 1993
- [c8]Kostas Kontogiannis, Morris Bernstein, Ettore Merlo, Renato de Mori:
The development of a partial design recovery environment for legacy systems. CASCON 1993: 206-216 - [c7]Ettore Merlo, Jean-Francois Girard, Laurie J. Hendren, Renato de Mori:
Multi-Valued Constant Propagation for the Reengineering of User Interfaces. ICSM 1993: 120-129 - [c6]Ettore Merlo, Ian McAdam, Renato de Mori:
Source Code Informal Information Analysis Using Connectionist Models. IJCAI 1993: 1339-1345 - [c5]Ettore Merlo, Renato DeMori, Kostas Kontogiannis:
A process algebra based program and system representation for reverse engineering. WPC 1993: 17-25 - [c4]Ettore Merlo, Jean-Francois Girard, Kostas Kontogiannis, Prakash Panangaden, Renato de Mori:
Reverse Engineering of User Interfaces. WCRE 1993: 171-179
1980 – 1989
- 1989
- [j2]Yoshua Bengio, Régis Cardin, Renato de Mori, Ettore Merlo:
Programmable Execution of Multi-Layered Networks for Automatic Speech Recognition. Commun. ACM 32(2): 195-199 (1989) - [c3]Yoshua Bengio, Régis Cardin, Piero Cosi, Renato De Mori, Ettore Merlo:
Speech coding with multilayer networks. NATO Neurocomputing 1989: 207-216 - 1988
- [j1]Renato De Mori, Régis Cardin, Ettore Merlo, Mathew Palakal, Jean Rouat:
A network of actions for automatic speech recognition. Speech Commun. 7(4): 337-353 (1988) - 1987
- [c2]Renato de Mori, Ettore Merlo, Mathew J. Palakal, Jean Rouat:
Use of Procedural Knowledge for Automatic Speech Recognition. IJCAI 1987: 840-843 - 1986
- [c1]Ettore Merlo, Renato De Mori, Mathew Palakal, Guy Mercier:
A continuous parameter and frequency domain based Markov model. ICASSP 1986: 1597-1600
Coauthor Index
aka: Giulio Antoniol
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint