Travelled to:
1 × Belgium
1 × Ireland
1 × Italy
1 × Japan
3 × Canada
8 × USA
Collaborated with:
J.Aldrich R.Vanciu N.Ammar E.Khalaj N.H.Nahas B.R.Schmerl D.Garlan J.M.Barnes W.Coelho N.Medvidović A.Giang B.W.Boehm D.Port Z.Hailat D.Wang P.Torr S.Chandrashekar A.Egyed Y.Wang V.Rajlich J.Kwan A.Lynch T.Tseng
Talks about:
architectur (10) object (6) ownership (4) extract (4) graph (4) implement (3) structur (3) code (3) use (3) increment (2)
Person: Marwan Abi-Antoun
DBLP: Abi-Antoun:Marwan
Contributed to:
Wrote 19 papers:
- SANER-2015-Abi-AntounWKGR #graph #impact analysis
- Impact analysis based on a global hierarchical Object Graph (MAA, YW, EK, AG, VR), pp. 221–230.
- SCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question #using
- Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
- ASE-2013-VanciuA #architecture #constraints #using
- Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
- QoSA-2012-Abi-AntounAH #case study #experience #graph #object-oriented
- Extraction of ownership object graphs from object-oriented code: an experience report (MAA, NA, ZH), pp. 133–142.
- WCRE-2012-AmmarA #diagrams #empirical #evaluation #runtime
- Empirical Evaluation of Diagrams of the Run-time Structure for Coding Tasks (NA, MAA), pp. 367–376.
- WCRE-2012-VanciuA #data flow #graph
- Ownership Object Graphs with Dataflow Edges (RV, MAA), pp. 267–276.
- ASE-2010-Abi-AntounB #architecture #security
- Analyzing security architectures (MAA, JMB), pp. 3–12.
- OOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime #using
- Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
- PASTE-2008-Abi-AntounA #architecture #case study #runtime
- A field study in static extraction of runtime architectures (MAA, JA), pp. 22–28.
- ASE-2007-Abi-AntounA #execution #object-oriented #source code #tool support
- Tool support for the compile-time execution structure of object-oriented programs with ownership annotations (MAA, JA), pp. 543–544.
- ASE-2007-Abi-AntounWT #consistency #data flow #diagrams #implementation #modelling #security
- Checking threat modeling data flow diagrams for implementation conformance and security (MAA, DW, PT), pp. 393–396.
- ASE-2006-Abi-AntounANSG #architecture #difference
- Differencing and Merging of Architectural Views (MAA, JA, NHN, BRS, DG), pp. 47–58.
- ICSE-2005-Abi-AntounAGSNT #architecture #implementation #modelling
- Modeling and implementing software architecture with acme and archJava (MAA, JA, DG, BRS, NHN, TT), pp. 676–677.
- WICSA-2005-Abi-AntounAGSN #architecture #automation #concept #implementation #incremental
- Semi-Automated Incremental Synchronization between Conceptual and Implementation Level Architectures (MAA, JA, DG, BRS, NHN), pp. 265–268.
- WICSA-2005-Abi-AntounC #architecture #case study #incremental #legacy #re-engineering
- A Case Study in Incremental Architecture-Based Re-engineering of a Legacy Application (MAA, WC), pp. 159–168.
- RE-1999-BoehmAPKL #requirements
- Requirements Engineering, Expectations Management, and the Two Cultures (BWB, MAA, DP, JK, AL), pp. 14–22.
- UML-1999-Abi-AntounM #architecture #design #refinement
- Enabling the Refinement of a Software Architecture into a Design (MAA, NM), pp. 17–31.
- WICSA-1999-BoehmPEA #architecture #lifecycle
- The MBASE Life Cycle Architecture Milestone Package (BWB, DP, AE, MAA), pp. 511–528.
- GPCE-2018-KhalajA
- Inferring ownership domains from refinements (EK, MAA), pp. 53–65.