default search action
Ian Warren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j9]Nacha Chondamrongkul, Jing Sun, Ian Warren:
Formal security analysis for software architecture design: An expressive framework to emerging architectural styles. Sci. Comput. Program. 206: 102631 (2021) - [j8]Nacha Chondamrongkul, Jing Sun, Ian Warren:
Software Architectural Migration: An Automated Planning Approach. ACM Trans. Softw. Eng. Methodol. 30(4): 50:1-50:35 (2021) - 2020
- [j7]Nacha Chondamrongkul, Jing Sun, Ian Warren, Scott Uk-Jin Lee:
Integrated Formal Tools for Software Architecture Smell Detection. Int. J. Softw. Eng. Knowl. Eng. 30(6): 723-763 (2020) - [j6]Sally Kennedy, Ian Warren:
The legal geographies of extradition and sovereign power. Internet Policy Rev. 9(3) (2020) - [c46]Nacha Chondamrongkul, Jing Sun, Ian Warren:
Formal Software Architectural Migration Towards Emerging Architectural Styles. ECSA 2020: 21-38 - [c45]Nacha Chondamrongkul, Jing Sun, Ian Warren:
Automated Planning for Software Architectural Migration. ICECCS 2020: 216-224 - [c44]Nacha Chondamrongkul, Jing Sun, Ian Warren:
Automated Security Analysis for Microservice Architecture. ICSA Companion 2020: 79-82 - [c43]Nacha Chondamrongkul, Jing Sun, Ian Warren, Scott Uk-Jin Lee:
Semantic-based Architecture Smell Analysis. FormaliSE@ICSE 2020: 109-118 - [c42]Nacha Chondamrongkul, Jing Sun, Ian Warren:
Formal Security Analysis for Blockchain-based Software Architecture. SEKE 2020: 532-537
2010 – 2019
- 2019
- [j5]Elena C. Reinisch, Michael Cardiff, John Akerley, Ian Warren, Kurt L. Feigl:
Spatio-Temporal Analysis of Deformation at San Emidio Geothermal Field, Nevada, USA Between 1992 and 2010. Remote. Sens. 11(16): 1935 (2019) - [c41]Nacha Chondamrongkul, Jing Sun, Bingyang Wei, Ian Warren:
Parallel Verification of Software Architecture Design. HASE 2019: 50-57 - [c40]Ian Warren, Andrew Meads, Chong Wang, Robyn Whittaker:
Monitoring Driver Behaviour with BackPocketDriver. MobiWIS 2019: 57-70 - [c39]Nacha Chondamrongkul, Jing Sun, Ian Warren:
PAT approach to Architecture Behavioural Verification. SEKE 2019: 187-252 - 2018
- [c38]Jim Warren, Ewan D. Tempero, Ian Warren, Anjuka Sathianathan, Sarah Hopkins, Matthew Shepherd, Sally Merry:
Experience Building IT Infrastructure for Research with Online Youth Mental Health Tools. ASWEC 2018: 161-165 - [c37]Nacha Chondamrongkul, Jing Sun, Ian Warren:
Ontology-based Software Architectural Pattern Recognition and Reasoning (S). SEKE 2018: 23-28 - [c36]Catherine Shanly, Michael Ieti, Ian Warren, Jing Sun:
BackPocketDriver - A Mobile App to Enhance Safe Driving for Youth (S). SEKE 2018: 246-245 - [c35]Yu-Cheng Tu, Gillian Dobbie, Ian Warren, Andrew Meads, Cameron Grout:
An Experience Report on a Boot-Camp Style Programming Course. SIGCSE 2018: 509-514 - [r2]Darren Palmer, Ian Warren, Peter Miller:
Crime Prevention, Dataveillance, and the Regulation of Information Communication Technologies. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [c34]Harrison She, Ofek Wittenberg, Ian Warren:
An ad hoc broadcasting application by way of mobile devices. ACSW 2017: 21:1-21:10 - 2016
- [c33]I-Yang Huang, Mark Watkin, Ian Warren, Andrew Meads:
Eye Atlas: an instructive resource for ophthalmology students and practitioners. ACSW 2016: 65 - 2015
- [c32]Andrew Meads, Habib Naderi, Ian Warren:
A Test Harness for Networked Mobile Applications and Middleware. ASWEC 2015: 1-10 - 2014
- [j4]Ian Warren, Andrew Meads, Satish Narayana Srirama, Thiranjith Weerasinghe, Carlos Paniagua:
Push Notification Mechanisms for Pervasive Smartphone Applications. IEEE Pervasive Comput. 13(2): 61-71 (2014) - [c31]Adam Roughton, Ian Warren, Beryl Plimmer:
Concentus: Applying Stream Processing to Online Collective Interaction. Australian Software Engineering Conference 2014: 70-79 - [r1]Darren Palmer, Ian Warren, Peter Miller:
Privacy, Dataveillance, and Crime Prevention. Encyclopedia of Social Network Analysis and Mining 2014: 1353-1362 - 2013
- [j3]Syed Adeel Ali, Partha S. Roop, Ian Warren:
Web Service Choreography: Unanimous Handling of Control and Data. Int. J. Softw. Informatics 7(2): 309-330 (2013) - [c30]Syed Adeel Ali, Partha S. Roop, Ian Warren:
Stateful Web Services - Auto Modeling and Composition. ICWS 2013: 284-291 - [c29]Safurah Binti Abdul Jalil, Beryl Plimmer, Ian Warren, Andrew Luxton-Reilly:
Design eye: an interactive learning environment based on the solo taxonomy. ITiCSE 2013: 22-27 - 2011
- [j2]Darren Palmer, Ian Warren, Peter Miller:
ID Scanners in the Australian Night-Time Economy. IEEE Technol. Soc. Mag. 30(3): 18-24 (2011) - [c28]Andrew Meads, Ian Warren:
OdinTools-Model-Driven Development of Intelligent Mobile Services. IEEE SCC 2011: 448-455 - [c27]Adam Roughton, John Downs, Beryl Plimmer, Ian Warren:
The Crowd in the Cloud: Moving Beyond Traditional Boundaries for Large Scale Experiences in the Cloud. AUIC 2011: 29-38 - [c26]Syed Adeel Ali, Partha S. Roop, Ian Warren, Zeeshan Ejaz Bhatti:
Unified management of control flow and data mismatches in web service composition. SOSE 2011: 93-101 - [c25]Ian Warren, Thiranjith Weerasinghe, Ralph Maddison, Y. Wang:
OdinTelehealth: A Mobile Service Platform for Telehealth. ANT/MobiWIS 2011: 681-688 - 2010
- [c24]Daniel Brooker, Thomas Carey, Ian Warren:
Middleware for Social Networking on Mobile Devices. Australian Software Engineering Conference 2010: 202-211 - [c23]Darren Palmer, Ian Warren, Peter Miller:
ID scanners in the night time economy. ISTAS 2010: 234-241 - [c22]Thiranjith Weerasinghe, Ian Warren:
Odin: Context-Aware Middleware for Mobile Services. SERVICES 2010: 661-666
2000 – 2009
- 2009
- [c21]Thiranjith Weerasinghe, Ian Warren:
Empowering intermediary-based infrastructure for mobile service provisioning. APSCC 2009: 414-421 - [c20]Sakura She, Sasindran Sivapalan, Ian Warren:
Hermes: A Tool for Testing Mobile Device Applications. Australian Software Engineering Conference 2009: 121-130 - [c19]Hye-young Paik, Karl M. Göschka, Aad P. A. van Moorsel, Raymond K. Wong, Ian Warren:
Introduction to the proceedings of the EDOC 2009 workshop Middleware for Web Services (MWS) 2009. EDOCW 2009: 72-73 - [c18]Andrew Meads, Adam Roughton, Ian Warren, Thiranjith Weerasinghe:
Mobile Service Provisioning Middleware for Multihomed Devices. WiMob 2009: 67-72 - 2008
- [c17]Simon Baker, Fiora Au, Gillian Dobbie, Ian Warren:
Automated Usability Testing Using HUI Analyzer. Australian Software Engineering Conference 2008: 579-588 - [c16]Fiora Au, Simon Baker, Ian Warren, Gillian Dobbie:
Automated Usability Testing Framework. AUIC 2008: 55-64 - [c15]Vladimir Tosic, Karl M. Göschka, Aad P. A. van Moorsel, Ian Warren, Raymond K. Wong:
Introduction to the Proceedings of the EDOC 2008 Workshop Middleware for Web Services (MWS) 2008. EDOCW 2008: 338-342 - [c14]Stephen Wong, Jing Sun, Ian Warren, Jun Sun:
A Scalable Approach to Multi-style Architectural Modeling and Verification. ICECCS 2008: 25-34 - [c13]Zhi Quan Lee, Yuan Qin Zhu, Ian Warren:
Jini++: A Framework for Developing Pervasive and Wireless Distributed Applications. ICECCS 2008: 121-130 - 2006
- [j1]Adrian Mackenzie, Michael Pidd, John Rooksby, Ian Sommerville, Ian Warren, Mark Westcombe:
Wisdom, decision support and paradigms of decision making. Eur. J. Oper. Res. 170(1): 156-171 (2006) - [c12]Zheng Yu, Ian Warren, Bruce A. MacDonald:
Dynamic Reconfiguration for Robot Software. CASE 2006: 292-297 - [c11]Ian Warren, Jing Sun, Sanjev Krishnamohan, Thiranjith Weerasinghe:
An Automated Formal Approach to Managing Dynamic Reconfiguration. ASE 2006: 37-46 - 2005
- [c10]Ian Warren:
Teaching Patterns and Software Design. ACE 2005: 39-49 - 2004
- [c9]Daniel Hughes, Ian Warren, Geoff Coulson:
Improving QoS for Peer-to-Peer Applications through Adaptation. FTDCS 2004: 178-183 - [c8]Jamie Hillman, Ian Warren:
Meta-Adaptation in Autonomic Systems. FTDCS 2004: 292-298 - [c7]Jamie Hillman, Ian Warren:
An Open Framework for Dynamic Reconfiguration. ICSE 2004: 594-603 - [c6]Daniel Hughes, Geoff Coulson, Ian Warren:
A Framework for Developing Reflective and Dynamic P2P Networks (RaDP2P). Peer-to-Peer Computing 2004: 282-283 - 2003
- [c5]Daniel Hughes, Ian Warren, Geoff Coulson:
AGnuS: The Altruistic Gnutella Server. Peer-to-Peer Computing 2003: 202-203 - 2002
- [c4]Ian Warren, Jane Ransom:
Renaissance: A Method to Support Software System Evolution. COMPSAC 2002: 415-420 - 2001
- [b1]Ian Warren:
A model for dynamic configuration which preserves application integrity. Lancaster University, UK, 2001
1990 – 1999
- 1998
- [c3]Jane Ransom, Ian Sommerville, Ian Warren:
A Method for Assessing Legacy Systems for Evolution. CSMR 1998: 128-134 - 1996
- [c2]Ian Warren, Ian Sommerville:
A model for dynamic configuration which preserves application integrity. CDS 1996: 81-88 - 1995
- [c1]Ian Warren, Ian Sommerville:
Dynamic Configuration Abstraction. ESEC 1995: 173-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint