Travelled to:
1 × Australia
1 × Denmark
1 × Finland
1 × Germany
1 × Norway
1 × Spain
1 × The Netherlands
3 × Canada
3 × France
3 × Italy
3 × Switzerland
4 × USA
Collaborated with:
D.V.Landuyt E.Truyen R.Scandariato P.Verbaeten Y.Berbers B.N.Jørgensen S.Michiels D.Hughes B.Lagaisse S.V.Baelen K.Yskout A.Hovsepyan W.Daniels D.Preuveneers L.Desmet S.Walraven N.Matthys J.Proença G.S.Ramachandran T.Heyman K.Buyens F.Sanen J.Pollet S.Bijnens M.Makki M.Decat J.Bogaerts P.D.Ryck F.Piessens P.J.d.Cid D.Clarke B.Vanhooff D.Ayed B.Vanhaute Danny Hughes 0001 S.R.Afzal C.Huygens B.Porter Laurens Sion Pierre Dewitte Kim Wuyts Ivo Emanuilov Peggy Valcke N.Cardozo J.Vallejos E.Bainomugisha S.Günther T.D'Hondt S.O.d.beeck S.Meynckens G.d.Jong O.Barais M.Acher
Talks about:
architectur (8) applic (8) base (8) compon (6) manag (5) dynam (5) softwar (4) middlewar (3) sensor (3) design (3)
♂ Person: Wouter Joosen
DBLP: Joosen:Wouter
Facilitated 1 volumes:
Contributed to:
Wrote 31 papers:
- CBSE-2015-DanielsPCJH #component #low cost #metadata #named #pervasive
- Refraction: Low-Cost Management of Reflective Meta-Data in Pervasive Component-Based Applications (WD, JP, DC, WJ, DH), pp. 27–36.
- CBSE-2015-RamachandranDPM #network
- Hitch Hiker: A Remote Binding Model with Priority Based Data Aggregation for Wireless Sensor Networks (GSR, WD, JP, SM, WJ, DH, BP), pp. 43–48.
- ICSE-v1-2015-YskoutSJ #design #question #security
- Do Security Patterns Really Help Designers? (KY, RS, WJ), pp. 292–302.
- SAC-2015-DecatBLJ #as a service #data access #middleware #multitenancy #named #performance
- Amusa: middleware for efficient access control management of multi-tenant SaaS applications (MD, JB, BL, WJ), pp. 2141–2148.
- SAC-2015-PreuveneersJ #authentication #named
- SmartAuth: dynamic context fingerprinting for continuous user authentication (DP, WJ), pp. 2185–2191.
- SAC-2015-RyckDPJ #named
- SecSess: keeping your session tucked away in your browser (PDR, LD, FP, WJ), pp. 2171–2176.
- SPLC-2015-LanduytWJ #as a service #middleware #multitenancy #research #roadmap #variability
- Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines (DVL, SW, WJ), pp. 211–215.
- CBSE-2014-CidHMJ
- Ensuring application integrity in shared sensing environments (PJdC, DH, SM, WJ), pp. 149–158.
- FASE-2014-LanduytJ #architecture #requirements
- Modularizing Early Architectural Assumptions in Scenario-Based Requirements (DVL, WJ), pp. 170–184.
- SPLC-2014-LanduytbHMJMJBA #design #safety #towards #variability
- Towards managing variability in the safety design of an automotive hall effect sensor (DVL, SOdb, AH, SM, WJ, SM, GdJ, OB, MA), pp. 304–309.
- ICSE-2012-YskoutSJ #architecture #question #security
- Does organizing security patterns focus architectural choices? (KY, RS, WJ), pp. 617–627.
- SAC-2012-TruyenCWVBGDJ #as a service #programming
- Context-oriented programming for customizable SaaS applications (ET, NC, SW, JV, EB, SG, TD, WJ), pp. 418–425.
- WICSA-ECSA-2012-HeymanSJ #architecture #formal method #modelling #reuse
- Reusable Formal Models for Secure Software Architectures (TH, RS, WJ), pp. 41–50.
- WICSA-ECSA-2012-LanduytTJ #architecture #requirements
- Documenting Early Architectural Assumptions in Scenario-Based Requirements (DVL, ET, WJ), pp. 329–333.
- ECSA-2010-ScandariatoBJ #architecture #automation #detection
- Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
- SAC-2010-MatthysAHMJH #data access #fine-grained #network #towards
- Towards fine-grained and application-centric access control for wireless sensor networks (NM, SRA, CH, SM, WJ, DH), pp. 793–794.
- GPCE-2009-SanenTJ #approach #feature model #interactive #problem
- Mapping problem-space to solution-space features: a feature interaction approach (FS, ET, WJ), pp. 167–176.
- TOOLS-EUROPE-2009-HovsepyanBBJ #domain-specific language #modelling #specification
- Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages (AH, SVB, YB, WJ), pp. 116–135.
- ECMDA-FA-2008-HovsepyanBBJ #composition #reuse
- Generic Reusable Concern Compositions (AH, SVB, YB, WJ), pp. 231–245.
- MoDELS-2007-VanhooffABJB #framework #named
- UniTI: A Unified Transformation Infrastructure (BV, DA, SVB, WJ, YB), pp. 31–45.
- CBSE-2005-LagaisseJ #aspect-oriented #component #composition #middleware
- Component-Based Open Middleware Supporting Aspect-Oriented Software Composition (BL, WJ), pp. 139–154.
- WICSA-2004-MichielsDJV #architecture #protocol #self
- The DiPS+ Software Architecture for Self-healing Protocol Stacks (SM, LD, WJ, PV), pp. 233–242.
- ICSM-2002-TruyenJV #consistency
- Consistency Management in the Presence of Simultaneous Client-Specific Views (ET, WJ, PV), pp. 501–510.
- ICSE-2001-TruyenVJVJ #component
- Dynamic and Selective Combination of Extensions in Component-Based Applications (ET, BV, WJ, PV, BNJ), pp. 233–242.
- TOOLS-EUROPE-2000-JorgensenTJ #component #configuration management
- Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration (BNJ, ET, WJ), pp. 181–194.
- TOOLS-PACIFIC-1999-JorgensenJ #architecture #component #interactive #product line
- Classifying Component Interaction in Product-Line Architectures (BNJ, WJ), pp. 66–77.
- PDP-1994-JoosenPV #clustering #performance
- The Efficient Management Of Task Clusters In A Dynamic Load Balancer (WJ, JP, PV), pp. 285–290.
- PDP-1993-BijnensJB #memory management #parallel #verification
- Load balanced parallel program verification on a shared memory machine (SB, WJ, YB), pp. 161–168.
- GPCE-2016-MakkiLJ #automation #framework #process #testing
- Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery (MM, DVL, WJ), pp. 178–189.
- CBSE-2016-RamachandranMDJ #component
- Building Dynamic and Dependable Component-Based Internet-of-Things Applications with Dawn (GSR, NM, WD, WJ, DH0), pp. 97–106.
- ICSA-2019-SionDLWEVJ #architecture #design
- An Architectural View for Data Protection by Design (LS, PD, DVL, KW, IE, PV, WJ), pp. 11–20.