default search action
Marwan Abi-Antoun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c37]Ebrahim Khalaj, Marwan Abi-Antoun:
Inferring ownership domains from refinements. GPCE 2018: 53-65 - 2016
- [c36]Marwan Abi-Antoun, Ebrahim Khalaj, Radu Vanciu, Ahmad Moghimi:
Abstract runtime structure for reasoning about security: poster. HotSoS 2016: 1-3 - 2015
- [c35]Marwan Abi-Antoun, Yibin Wang, Ebrahim Khalaj, Andrew Giang, Václav Rajlich:
Impact analysis based on a global hierarchical Object Graph. SANER 2015: 221-230 - 2014
- [c34]Radu Vanciu, Ebrahim Khalaj, Marwan Abi-Antoun:
Comparative Evaluation of Architectural and Code-Level Approaches for Finding Security Vulnerabilities. SIW@CCS 2014: 27-34 - [c33]Marwan Abi-Antoun, Andrew Giang, Sumukhi Chandrashekar, Ebrahim Khalaj:
The eclipse runtime perspective for object-oriented code exploration and program comprehension. ETX 2014: 3-8 - [c32]Ebrahim Khalaj, Radu Vanciu, Marwan Abi-Antoun:
Is there value in reasoning about security at the architectural level: a comparative evaluation. HotSoS 2014: 30 - [c31]Marwan Abi-Antoun, Sumukhi Chandrashekar, Radu Vanciu, Andrew Giang:
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? SCAM 2014: 245-254 - 2013
- [c30]Marwan Abi-Antoun, Radu Vanciu, Nariman Ammar:
Metrics to identify where object-oriented program comprehension benefits from the runtime structure. WETSoM 2013: 42-48 - [c29]Radu Vanciu, Marwan Abi-Antoun:
Finding architectural flaws using constraints. ASE 2013: 334-344 - [c28]Radu Vanciu, Marwan Abi-Antoun:
Finding architectural flaws in android apps is easy. SPLASH (Companion Volume) 2013: 21-22 - [c27]Andrew Giang, Marwan Abi-Antoun:
Finding the missing eclipse perspective: the runtime perspective. SPLASH (Companion Volume) 2013: 23-24 - [p1]Radu Vanciu, Marwan Abi-Antoun:
Object Graphs with Ownership Domains: An Empirical Study. Aliasing in Object-Oriented Programming 2013: 109-155 - 2012
- [c26]Marwan Abi-Antoun, Nariman Ammar, Zeyad Hailat:
Extraction of ownership object graphs from object-oriented code: an experience report. QoSA 2012: 133-142 - [c25]Radu Vanciu, Marwan Abi-Antoun:
Ownership Object Graphs with Dataflow Edges. WCRE 2012: 267-276 - [c24]Nariman Ammar, Marwan Abi-Antoun:
Empirical Evaluation of Diagrams of the Run-time Structure for Coding Tasks. WCRE 2012: 367-376 - 2010
- [c23]Marwan Abi-Antoun, Nariman Ammar, Thomas D. LaToza:
Questions about object structure during coding activities. CHASE 2010: 64-71 - [c22]Marwan Abi-Antoun, Talia Selitsky, Thomas D. LaToza:
Developer refinement of runtime architectural structure. SHARK@ICSE 2010: 80-87 - [c21]Marwan Abi-Antoun, Jeffrey M. Barnes:
Analyzing security architectures. ASE 2010: 3-12
2000 – 2009
- 2009
- [c20]Marwan Abi-Antoun, Jonathan Aldrich:
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations. OOPSLA 2009: 321-340 - [c19]Marwan Abi-Antoun, Jonathan Aldrich:
Static extraction of sound hierarchical runtime object graphs. TLDI 2009: 51-64 - 2008
- [j3]Marwan Abi-Antoun, Jonathan Aldrich, Nagi H. Nahas, Bradley R. Schmerl, David Garlan:
Differencing and merging of architectural views. Autom. Softw. Eng. 15(1): 35-74 (2008) - [c18]Marwan Abi-Antoun, Jonathan Aldrich:
Tool support for statically checking the structural conformance of an object-oriented system to its runtime architecture. OOPSLA Companion 2008: 741-742 - [c17]Marwan Abi-Antoun, Jonathan Aldrich:
Tool support for the static extraction of sound hierarchical representations of runtime object graphs. OOPSLA Companion 2008: 743-744 - [c16]Marwan Abi-Antoun:
Static extraction and conformance checking of the runtime architecture of object-oriented systems. OOPSLA Companion 2008: 911-912 - [c15]Marwan Abi-Antoun, Jonathan Aldrich:
A field study in static extraction of runtime architectures. PASTE 2008: 22-28 - 2007
- [j2]Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho:
A case study in re-engineering to enforce architectural control flow and data sharing. J. Syst. Softw. 80(2): 240-264 (2007) - [c14]Marwan Abi-Antoun, Daniel Wang, Peter Torr:
Checking threat modeling data flow diagrams for implementation conformance and security. ASE 2007: 393-396 - [c13]Marwan Abi-Antoun, Jonathan Aldrich:
Tool support for the compile-time execution structure of object-oriented programs with ownership annotations. ASE 2007: 543-544 - [c12]Marwan Abi-Antoun:
Compile-time execution structure of object-oriented programs with practical ownership domain annotations. OOPSLA Companion 2007: 919-920 - [c11]Marwan Abi-Antoun:
Making frameworks work: a project retrospective. OOPSLA Companion 2007: 1004-1018 - 2006
- [c10]Marwan Abi-Antoun, Jonathan Aldrich, Nagi H. Nahas, Bradley R. Schmerl, David Garlan:
Differencing and Merging of Architectural Views. ASE 2006: 47-58 - [c9]Marwan Abi-Antoun, Jonathan Aldrich:
Bringing ownership domains to mainstream Java. OOPSLA Companion 2006: 702-703 - [c8]Marwan Abi-Antoun, Jonathan Aldrich:
A static analysis for extracting runtime views from annotated object-oriented code. OOPSLA Companion 2006: 734-735 - 2005
- [j1]Marwan Abi-Antoun, Jonathan Aldrich, David Garlan, Bradley R. Schmerl, Nagi H. Nahas, Tony Tseng:
Improving system dependability by enforcing architectural intent. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c7]Marwan Abi-Antoun, Jonathan Aldrich, David Garlan, Bradley R. Schmerl, Nagi H. Nahas, Tony Tseng:
Improving system dependability by enforcing architectural intent. WADS@ICSE 2005: 1:1-1:7 - [c6]Marwan Abi-Antoun, Jonathan Aldrich, David Garlan, Bradley R. Schmerl, Nagi H. Nahas, Tony Tseng:
Modeling and implementing software architecture with acme and archJava. ICSE 2005: 676-677 - [c5]Marwan Abi-Antoun, Wesley Coelho:
A Case Study in Incremental Architecture-Based Re-engineering of a Legacy Application. WICSA 2005: 159-168 - [c4]Marwan Abi-Antoun, Jonathan Aldrich, David Garlan, Bradley R. Schmerl, Nagi H. Nahas:
Semi-Automated Incremental Synchronization between Conceptual and Implementation Level Architectures. WICSA 2005: 265-268
1990 – 1999
- 1999
- [c3]Barry W. Boehm, Marwan Abi-Antoun, Daniel Port, Julie Kwan, Anne Lynch:
Requirements Engineering, Expectations Management, and the Two Cultures. RE 1999: 14-22 - [c2]Marwan Abi-Antoun, Nenad Medvidovic:
Enabling the Refinement of a Software Architecture into a Design. UML 1999: 17-31 - [c1]Barry W. Boehm, Daniel Port, Alexander Egyed, Marwan Abi-Antoun:
The MBASE Life Cycle Architecture Milestone Package. WICSA 1999: 511-528
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint