<  Back to the Polytechnique Montréal portal

Items where Author is "Merlo, Ettore"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Jump to: B | L | M | O
Number of items: 10.

B

Balazinska, M., & Merlo, E. (1999). Redesigning software systems using clone information : technical report. (Technical Report n° EPM-RT-99-13). Restricted access

L

Lavoie, T. M., & Merlo, E. (2011). Levenshtein edit distance-based type III clone detection using metric trees. (Technical Report n° EPM-RT-2011-01). Available

M

Merlo, E., & Lavoie, T. M. (2009). Detection of redundant clone relations based on clone subsumption. (Technical Report n° EPM-RT-2009-05). Available

Merlo, E., Letarte, D., & Antoniol, G. (2006). Insider threat resistant SQL-injection prevention in PHP. (Technical Report n° EPM-RT-2006-04). Available

Merlo, E., Deslauriers, B., Antoniol, G., Brunelle, P.-L., Jomphe, M., Bouchard, G., Tremblay, J., & Hamet, P. (2004). Layered founders : a novel approach to investigate the ancestral transmission of complex traits. (Technical Report n° EPM-RT-2004-05). Available

Merlo, E., & Antoniol, G. (1997). Dynamic pointers analysis. (Technical Report n° EPM-RT-97-07). Restricted access

Mayrand, J., & Merlo, E. (1996). Évaluation de la qualité des logiciels. (Technical Report n° EPM-RT-96-12). Restricted access

Merlo, E. (1994). Analysis, representation, and structural and behavioural abstraction for the reverse engineering of user interfaces. (Technical Report n° EPM-RT-94-06). Restricted access

Merlo, E., McAdam, I., & De Mori, R. (1993). Feed-forward and recurrent neural networks for source code informal information analysis. (Technical Report n° EPM-RT-93-35). Restricted access

O

Ouellet, M., Gauthier, F., Merlo, E., Sozen, N., & Gagnon, M. (2012). Mapping features to source code in dynamically configured avionics software. (Technical Report n° EPM-RT-2012-02). Available

List generated on: Sun Feb 5 02:17:12 2023 EST