![]() | Up a level |
Balazinska, M., & Merlo, E. (1999). Redesigning software systems using clone information : technical report. (Technical Report n° EPM-RT-99-13). Restricted access
Lavoie, T. M., & Merlo, E. (2011). Levenshtein edit distance-based type III clone detection using metric trees. (Technical Report n° EPM-RT-2011-01). Available
Merlo, E., & Lavoie, T. M. (2009). Detection of redundant clone relations based on clone subsumption. (Technical Report n° EPM-RT-2009-05). Available
Merlo, E., Letarte, D., & Antoniol, G. (2006). Insider threat resistant SQL-injection prevention in PHP. (Technical Report n° EPM-RT-2006-04). Available
Merlo, E., Deslauriers, B., Antoniol, G., Brunelle, P.-L., Jomphe, M., Bouchard, G., Tremblay, J., & Hamet, P. (2004). Layered founders : a novel approach to investigate the ancestral transmission of complex traits. (Technical Report n° EPM-RT-2004-05). Available
Merlo, E., & Antoniol, G. (1997). Dynamic pointers analysis. (Technical Report n° EPM-RT-97-07). Restricted access
Mayrand, J., & Merlo, E. (1996). Évaluation de la qualité des logiciels. (Technical Report n° EPM-RT-96-12). Restricted access
Merlo, E. (1994). Analysis, representation, and structural and behavioural abstraction for the reverse engineering of user interfaces. (Technical Report n° EPM-RT-94-06). Restricted access
Merlo, E., McAdam, I., & De Mori, R. (1993). Feed-forward and recurrent neural networks for source code informal information analysis. (Technical Report n° EPM-RT-93-35). Restricted access
Ouellet, M., Gauthier, F., Merlo, E., Sozen, N., & Gagnon, M. (2012). Mapping features to source code in dynamically configured avionics software. (Technical Report n° EPM-RT-2012-02). Available