Остановите войну!
for scientists:
default search action
Gregory Butler
- > Home > Persons > Gregory Butler
Publications
- 2021
- [j31]Qian Wang, Xin Zhang, Alexander E. Sorochinsky, Greg Butler, Jianlin Han, Vadim A. Soloshonok:
Advances in the Development of Trifluoromethoxylation Reagents. Symmetry 13(12): 2380 (2021) - 2016
- [c76]Stuart Thiel, Greg Butler, Larry H. Thiel:
Improving GraphChi for Large Graph Processing: Fast Radix Sort in Pre-Processing. IDEAS 2016: 135-141 - 2015
- [c73]Lin Cheng, Greg Butler:
Accelerating Search of Protein Sequence Databases using CUDA-Enabled GPU. DASFAA (1) 2015: 279-298 - 2012
- [c66]Jun Luo, Gregory Butler:
ECTree: an extended tree index for attributed subgraph queries. IDEAS 2012: 216-221 - 2011
- [c63]Stephen C. Barrett, Patrice Chalin, Greg Butler:
Table-Driven Detection and Resolution of Operation-Based Merge Conflicts with Mirador. ECMFA 2011: 329-344 - 2010
- [c59]Stephen C. Barrett, Greg Butler, Patrice Chalin:
Mirador: a synthesis of model matching strategies. IWMCP@ICMT 2010: 2-10 - 2009
- [c57]Stephen C. Barrett, Daniel Sinnig, Patrice Chalin, Greg Butler:
Merging of Use Case Models: Semantic Foundations. TASE 2009: 182-189 - 2006
- [c52]Lugang Xu, Greg Butler:
Cascaded Refactoring for Framework Development and Evolution. ASWEC 2006: 319-330 - [c49]Greg Butler, Guang Wang, Yue Wang, Liqian Zou:
Query Optimization for a Graph Database with Visual Queries. DASFAA 2006: 602-616 - 2005
- [c48]Greg Butler, Guang Wang, Yue Wang, Liqian Zou:
A graph database with visual queries for genomics. APBC 2005: 31-40 - 2004
- [c46]Jian Xu, Wei Yu, Kexing Rui, Gregory Butler:
Use Case Refactoring: A Tool and a Case Study. APSEC 2004: 484-491 - [c44]Shengbing Ren, Gregory Butler, Kexing Rui, Jian Xu, Wei Yu, Renhang Luo:
A Prototype Tool for Use Case Refactoring. ICEIS (3) 2004: 173-178 - [c40]Wei Yu, Jun Li, Greg Butler:
Refactoring Use Case Models on Episodes. ASE 2004: 328-331 - 2003
- [c37]Kexing Rui, Gregory Butler:
Refactoring Use Case Models: The Metamodel. ACSC 2003: 301-308 - [c34]Gregory Butler, Xin Shen, Lugang Xu:
Issues in Architectural Modeling and Evolution in the Know-It-All Case Study. ECBS 2003: 321-330 - [c33]Kexing Rui, Shengbing Ren, Gregory Butler:
Refactoring Use Case Models: A Case Study. ICEIS (3) 2003: 239-244 - [c32]Shengbing Ren, Kexing Rui, Gregory Butler:
Refactoring the Scenario Specification: A Message Sequence Chart Approach. OOIS 2003: 294-298 - 2001
- [c28]Gregory Butler, Lugang Xu:
Cascaded refactoring for framework. SSR 2001: 51-57 - 2000
- [c27]Shawn Delaney, Gregory Butler, Clement W. H. Lam, Larry H. Thiel:
Three Improvements to the BLASTP Search of Genome Databases. SSDBM 2000: 14-24 - 1999
- [c25]Greg Butler, Andrea Gantchev, Peter Grogono:
Reusable Strategies for Software Agents via the Subsumption. APSEC 1999: 326-333 - [c23]Miguel Abdalla, Ferhat Khendek, Greg Butler:
New results on deriving SDL specifications from MSCs. SDL Forum 1999: 51-66 - 1998
- [c22]Greg Butler, Peter Grogono, Ferhat Khendek:
A Reuse Case Perspective on Documenting Frameworks. APSEC 1998: 94-101 - [c21]Yuan Peng, Ferhat Khendek, Peter Grogono, Greg Butler:
Feature Interaction Detection Technique Based on Feature Assumptions. FIW 1998: 291-298 - 1997
- [c19]Greg Butler, Peter Grogono, Ferhat Khendek:
A Z Specification of Use Cases: A Preliminary Report. APSEC 1997: 505-506 - 1996
- [c18]Gregory Butler, Peter Grogono, Rajjan Shinghal, Indra A. Tjandra:
Document Recognition, Semantics, and Symbolic Reasoning in Reverse Engineering of Software. AISMC 1996: 38-48 - 1995
- [c15]Gregory Butler, Peter Grogono, Rajjan Shinghal, Indra A. Tjandra:
Analyzing the logical structure of data flow diagrams in software documents. ICDAR 1995: 575-578 - [c14]Gregory Butler, Peter Grogono, Rajjan Shinghal, Indra A. Tjandra:
Retrieving Information from Data Flow Diagrams. WCRE 1995: 22-29 - [c13]Indra A. Tjandra, Gregory Butler:
Formal Representation of Reusable Software Modules. WCRE 1995: 198-202 - 1994
- [c11]Gregory Butler, Clement W. H. Lam:
The Preliminary Design of an Object-Oriented Framework for Combinatorial Enumeration. COODBSE 1994: 134-144 - 1985
- [j2]Gregory Butler, Clement W. H. Lam:
A General Backtrack Algorithm for the Isomorphism Problem of Combinatorial Objects. J. Symb. Comput. 1(4): 363-381 (1985)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint