Directory of Experts

You are here

Publications by type

Journal article (29) Conference paper (76) Book Book chapter (2) Patent Report (10) Thesis Dataset Teaching resource Image Audio recording Video recording Other

Ettore Merlo (117)

  • Journal articles (29)
    • 2022
      • Journal article
        Tambon, F., Laberge, G., An, L., Nikanjam, A., Mindom, P.S.N., Pequignot, Y., Khomh, F., Antoniol, G., Merlo, E. & Laviolette, F. (2022). How to certify machine learning based safety-critical systems? A systematic literature review. Automated Software Engineering, 29(2). Retrieved from https://doi.org/10.1007/s10515-022-00337-x
    • 2021
      • Journal article
        Laverdière, M.-A., Julien, K. & Merlo, E. (2021). RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications. Information and Software Technology, 139, 21 pages. Retrieved from https://doi.org/10.1016/j.infsof.2021.106630
    • 2020
      • Journal article
        Han, Z., Li, X., Xu, G., Xiong, N., Merlo, E. & Stroulia, E. (2020). An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models. IEEE Transactions on Industrial Informatics, 16(2), 1024-1034. Retrieved from https://doi.org/10.1109/TII.2019.2925422
    • 2017
      • Journal article
        Lavoie, T., Mérineau, M., Merlo, E. & Potvin, P. (2017). A Case Study of TTCN-3 Test Scripts Clone Analysis in an Industrial Telecommunication Setting. Information and Software Technology, 87, 32-45. Retrieved from https://doi.org/10.1016/j.infsof.2017.01.008
    • 2013
      • Journal article
        Arenas, I.A., Tremblay, J., Deslauriers, B., Sandoval, J., Seda, O., Gaudet, D., Merlo, E., Kotchen, T., Cowley, A.W. & Hamet, P. (2013). Dynamic Genetic Linkage of Intermediate Blood Pressure Phenotypes During Postural Adaptations in a Founder Population. Physiological Genomics, 45(4), 138-150. Retrieved from https://doi.org/10.1152/physiolgenomics.00037.2012
    • 2011
      • Journal article
        Arenas, I., Deslauriers, B., Sandoval, J., Seda, O., Merlo, E., Gaudet, D., Tremblay, J., Kotchen, T., Cowley, A. & Hamet, P. (2011). Dynamic Linkage of Blood Pressure Phenotypes. Journal of Hypertension, 29, e42-e43.
    • 2009
      • Journal article
        Nikpay, M., Seda, O., Tremblay, J., Gaudet, D., Merlo, E., Kotchen, T.A., Cowley, A.W. & Hamet, P. (2009). Pathway-Based Genetic Analysis of Habitual Substance Use and Response to Psychological and Physical Stress in French-Canadian Families Reveals Common Pathways of Synaptic Plasticity at Glutamatergic Synapses. Circulation, 119(10), E328. Retrieved from https://doi.org/10.1161/CIRCULATIONAHA.109.191960
    • 2008
      • Journal article
        Del Grosso, C., Antoniol, G., Merlo, E. & Galinier, P. (2008). Detecting Buffer Overflow Via Automatic Test Input Data Generation. Computers & Operations Research, 35(10), 3125-3143. Retrieved from https://doi.org/10.1016/j.cor.2007.01.013
      • Journal article
        Seda, O., Tremblay, J., Gaudet, D., Brunelle, P.L., Gurau, A., Merlo, E., Pilote, L., Orlov, S.N., Boulva, F., Petrovich, M., Kotchen, T.A., Cowley, A.W. & Hamet, P. (2008). Systematic, Genome-Wide, Sex-Specific Linkage of Cardiovascular Traits in French Canadians. Hypertension, 51(4), 1156-1162. Retrieved from https://doi.org/10.1161/HYPERTENSIONAHA.107.105247
    • 2007
      • Journal article
        Bellon, S., Koschke, R., Antoniol, G., Krinke, J. & Merlo, E. (2007). Comparison and Evaluation of Clone Detection Tools. IEEE Transactions on Software Engineering, 33(9), 577-591. Retrieved from https://doi.org/10.1109/TSE.2007.70725
      • Journal article
        Hamet, P., Seda, O., Tremblay, J., Gaudet, D., Brunelle, P.L., Gurau, A., Merlo, E., Gossard, F., Bouchard, G. & Cowley, A. (2007). Genomic Features of Hypertension With and Without Obesity. International Journal of Obesity, 31, S34. Retrieved from https://doi.org/10.1038/sj.ijo.0803594
    • 2005
      • Journal article
        Di Penta, M., Neteler, M., Antoniol, G. & Merlo, E. (2005). A Language-Independent Software Renovation Framework. Journal of Systems and Software, 77(3), 225-240. Retrieved from https://doi.org/10.1016/j.jss.2004.03.033
      • Journal article
        Hamet, P., Seda, O., Merlo, E., Tremblay, J., Broeckel, U., Gaudet, D., Bouchard, G., Gagnon, F., Antoniol, G., Wan, R., Pausova, Z., Gossard, F., Kotchen, T.A., Pintos, J. & Cowley, A.W. (2005). Partitioning of Extra/Intracellular Body Water Plays a Role in Specific Subsets of Hypertension Featuring Metabolic Syndrome and Premature Death. Journal of Hypertension, 23, S264.
      • Journal article
        Hamet, P., Merlo, E., Seda, O., Broeckel, U., Tremblay, J., Kaldunski, M., Gaudet, D., Bouchard, G., Deslauriers, B., Gagnon, F., Antoniol, G., Pausova, Z., Labuda, M., Jomphe, M., Gossard, F., Tremblay, G., Kirova, R., Tonellato, P., Orlov, S.N., Pintos, J., Platko, J., Hudson, T.J., Rioux, J.D., Kotchen, T.A. & Cowley, A.W. (2005). Quantitative founder effect analysis of French-Canadian families identifies specific loci contributing to metabolic phenotypes of hypertension. American Journal on Human Genetics, 76(5), 815-832. Retrieved from https://doi.org/10.1086/430133
      • Journal article
        Seda, O., Tremblay, J., Merlo, E., Gaudet, D., Broeckel, U., Bouchard, G., Antoniol, G., Brunelle, P.L., Gurau, A., Gossard, F., Pintos, J., Kotchen, T.A., Cowley, A.W. & Hamet, P. (2005). The Genomic Signatures of Hypertension. Hypertension, 46(5), 884.
    • 2004
      • Journal article
        Hamet, P., Merlo, E., Seda, O., Broeckel, U., Kaldunski, M.L., Gaudet, D., Bouchard, G., Deslauriers, B., Gagnon, F., Antoniol, G., Kotchen, T.A., Tremblay, J., Pausova, Z., Labuda, M., Jomphe, M., Gossard, F., Kirova, R., Tonellato, P., Orlov, S.N., Pintos, J., Rioux, J.D., Platko, J., Hudson, T.J., Lander, E. & Cowley, A.W. (2004). Quantitative Founder Effect Analysis in French-Canadian Families Identifies Specific Alleles Contributing to Intermediate Phenotypes of Hypertension. Hypertension, 44(4), 510.
      • Journal article
        Hamet, P., Seda, O., Merlo, E., Gaudet, D., Broeckel, U., Gagnon, F., Antoniol, G., Bouchard, G., Kotchen, T.A. & Cowley, A.W. (2004). Resolution of Complex Trait of Hypertension by Linkage, Systematic Allelic Contribution Analysis and Ancestral Data in French-Canadian Families. Journal of Hypertension, 22, S5. Retrieved from https://doi.org/10.1097/00004872-200406002-00009
    • 2003
      • Journal article
        Merlo, E., Seda, O., Antoniol, G., Gaudet, D., Deslauriers, B., Tremblay, J., Cowley, A.W., Bouchard, G. & Hamet, P. (2003). Differential Genetic Contribution Density of Separable Layered Founders in Saguenay (Québec) Population. Journal of Hypertension, 21, S305.
      • Journal article
        Merlo, E., McAdam, I. & De Mori, R. (2003). Feed-forward and recurrent neural networks for source code informal information analysis. Journal of Software Maintenance and Evolution: Research and Practice, 15(4), 205-244. Retrieved from https://doi.org/10.1002/smr.274
      • Journal article
        Hamet, P., Gaudet, D., Tremblay, J., Pausova, Z., Seda, O., Bernard, M., Gossard, F., Wang, R., Broeckel, U., Orlov, S.N., Labuda, M., Tonellato, P.J., Kirova, R., Cheng, Q., Kaldunski, M.L., Rioux, J.D., Platko, J., Kotchen, T.A., Merlo, E., Lander, E., Hudson, T.J. & Cowley, A.W. (2003). Partition of Dyslipidemic and Hypertensive French- Canadians Families Into Distinct Sub-Syndromes May Assist in the Detection of Specific Genomic Determinants. Hypertension, 42(3), 443.
    • 2002
      • Journal article
        Antoniol, G., Villano, U., Merlo, E. & Di Penta, M. (2002). Analyzing Cloning Evolution in the Linux Kernel. Information and Software Technology, 44(13), 755-765. Retrieved from https://doi.org/10.1016/S0950-5849(02)00123-4
      • Journal article
        Antoniol, G., Canfora, G., Casazza, G., Lucia, A.D. & Merlo, E. (2002). Recovering Traceability Links between Code and Documentation. IEEE Transactions on Software Engineering, 28(10), 970-983. Retrieved from https://doi.org/10.1109/TSE.2002.1041053
    • 2000
      • Journal article
        Mayrand, J., Patenaude, J.F., Merlo, E., Dagenais, M. & Lague, B. (2000). Software Assessment Using Metrics: a Comparison across Large C++ and Java Systems. Annals of Software Engineering, 9(1-4), 117-141. Retrieved from https://doi.org/10.1023/A:1018924724621
    • 1999
    • 1995
      • Journal article
        Merlo, E., Girard, J.-F., Hendren, L. & De Mori, R. (1995). Multi-valued constant propagation analysis for user interface reengineering. International Journal of Software Engineering and Knowledge Engineering, 5(1), 5-23. Retrieved from https://doi.org/10.1142/S0218194095000022
      • Journal article
        Merlo, E., Gagné, P.-Y., Girard, J.-F., Kontogiannis, K., Hendren, L., Panangaden, P. & De Mori, R. (1995). Reengineering user interfaces. IEEE Software, 12(1), 64-73. Retrieved from https://doi.org/10.1109/52.363164
    • 1994
      • Journal article
        Buss, E., De Mori, R., Gentreman, W.M., Henshaw, J., Johnson, H., Kontogiannis, K., Merlo, E., Mueller, H.A., Mylopoulos, J., Paul, S., Prakash, A., Stanley, M., Tilley, S.R., Troster, J. & Wong, K. (1994). Investigating reverse engineering technologies for the CAS program understanding project. IBM Systems Journal, 33(3), 477-500. Retrieved from https://doi.org/10.1147/sj.333.0477
  • Conference papers (76)
    • 2022
      • Conference paper
        Merlo, E., Pinciroli, C., Panerati, J., Famelis, M. & Beltrame, G. (2022). Automated extraction and checking of property models from source code for robot swarms. Paper presented at the 4th IEEE/ACM International Workshop on Robotics Software Engineering (RoSE 2022), Pittsburgh, PA, USA (pp. 47-54). Retrieved from https://doi.org/10.1145/3526071.3527516
      • Conference paper
        Marhaba, M., Merlo, E., Khomh, F. & Antoniol, G. (2022). Identification of out-of-distribution cases of CNN using class-based surprise adequacy. Paper presented at the IEEE/ACM 1st International Conference on AI Engineering - Software Engineering for AI (CAIN 2022), Pittsburgh, PA, USA (pp. 39-40).
      • Conference paper
        Merlo, E., Margier, M., Jourdan, G.-V. & Onut, I.-V. (2022). Phishing kits source code similarity distribution: A case study. Paper presented at the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022), Honolulu, HI, USA (pp. 983-994). Retrieved from https://doi.org/10.1109/SANER53432.2022.00116
    • 2018
      • Conference paper
        Beigi-Mohammadi, N., Litoiu, M., Emami-Taba, M., Tahvildari, L., Fokaefs, M., Merlo, E. & Viorel Onut, I. (2018). A DevOps framework for quality-driven self-protection in web software systems. Paper presented at the 28th Annual International Conference on Computer Science and Software Engineering, Markham, Ontario (pp. 270-274). Retrieved from https://dl.acm.org/citation.cfm?id=3291319
      • Conference paper
        Laverdière, M.-A. & Merlo, E. (2018). Detection of protection-impacting changes during software evolution. Paper presented at the 25th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2018), Campobasso, Italy (pp. 434-444). Retrieved from https://doi.org/10.1109/SANER.2018.8330230
      • Conference paper
        Beltrame, G., Merlo, E., Panerati, J. & Pinciroli, C. (2018). Engineering safety in swarm robotics. Paper presented at the 1st ACM/IEEE International Workshop on Robotics Software Engineering (RoSE 2018) and 40th International Conference on Software Engineering (ICSE 2018), Gothenburg, Sweden (pp. 36-39). Retrieved from https://doi.org/10.1145/3196558.3196565
      • Conference paper
        Barrak, A., Laverdière, M.-A., Khomh, F., An, L. & Merlo, E. (2018). Just-in-time Detection of Protection-Impacting Changes on WordPress and MediaWiki. Paper presented at the 28th Annual International Conference on Computer Science and Software Engineering (CASCON 2018), Toronto, Canada (pp. 178-188).
    • 2017
      • Conference paper
        Laverdiere, M.-A. & Merlo, E. (2017). Classification and distribution of RBAC privilege protection changes in WordPress evolution (short paper). Paper presented at the 15th Annual Conference on Privacy, Security and Trust (PST 2017), Calgary, Alb. (pp. 249-254). Retrieved from https://doi.org/10.1109/PST.2017.00048
      • Conference paper
        Laverdiere, M.A. & Merlo, E. (2017). Computing counter-examples for privilege protection losses using security models. Paper presented at the 24th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2017), Klagenfurt, Austria (pp. 240-249). Retrieved from https://doi.org/10.1109/SANER.2017.7884625
    • 2015
      • Conference paper
        Lavoie, T. & Merlo, E. (2015). Performance impact of lazy deletion in metric trees for incremental clone analysis. Paper presented at the 9th IEEE International Workshop on Software Clones (IWSC 2015), Montréal, Québec (pp. 15-18). Retrieved from https://doi.org/10.1109/IWSC.2015.7069884
      • Conference paper
        Laverdiere, M.A., Berger, B.J. & Merloz, E. (2015). Taint analysis of manual service compositions using cross-application call graphs. Paper presented at the 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2015), Montréal, Québec (pp. 585-589). Retrieved from https://doi.org/10.1109/SANER.2015.7081882
    • 2014
      • Conference paper
        Gauthier, F., Merlo, E., Stroulia, E. & Turner, D. (2014). Supporting maintenance and evolution of access control models in web applications. Paper presented at the 30th IEEE International Conference on Software Maintenance and Evolution (ICSME 2014), Victoria, BC, Canada (pp. 506-510). Retrieved from https://doi.org/10.1109/ICSME.2014.83
    • 2013
      • Conference paper
        Lavoie, T. & Merlo, E. (2013). How much really changes? A case study of firefox version evolution using a clone detector. Paper presented at the 7th International Workshop on Software Clones (IWSC 2013), San Francisco, CA, USA (pp. 83-89). Retrieved from https://doi.org/10.1109/iwsc.2013.6613048
      • Conference paper
        Merlo, E., Lavoie, T., Potvin, P. & Busnel, P. (2013). Large scale multi-language clone analysis in a telecommunication industrial setting. Paper presented at the 7th International Workshop on Software Clones (IWSC 2013), San Francisco, CA, USA (pp. 69-75). Retrieved from https://doi.org/10.1109/IWSC.2013.6613046
    • 2012
      • Conference paper
        Sozen, N. & Merlo, E. (2012). Adapting Software Product Lines for complex certifiable avionics software. Paper presented at the 3rd International Workshop on Product LinE Approaches in Software Engineering (PLEASE 2012), Zurich, Switzerland (pp. 21-24). Retrieved from https://doi.org/10.1109/please.2012.6229764
      • Conference paper
        Gauthier, F. & Merlo, E. (2012). Alias-aware propagation of simple pattern-based properties in PHP applications. Paper presented at the 12th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2012), Riva del Garda, Trento, Italy (pp. 44-53). Retrieved from https://doi.org/10.1109/SCAM.2012.19
      • Conference paper
        Lavoie, T. & Merlo, E. (2012). An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance. Paper presented at the 6th International Workshop on Software Clones (IWSC 2012), Zurich, Switzerland (pp. 1-7). Retrieved from https://doi.org/10.1109/IWSC.2012.6227861
      • Conference paper
        Gauthier, F. & Merlo, E. (2012). Fast detection of access control vulnerabilities in PHP applications. Paper presented at the 19th Working Conference on Reverse Engineering (WCRE 2012), Kingston, ON, Canada (pp. 247-256). Retrieved from https://doi.org/10.1109/WCRE.2012.34
      • Conference paper
        Lavoie, T., Khomh, F., Merlo, E. & Zou, Y. (2012). Inferring repository file structure modifications using nearest-neighbor clone detection. Paper presented at the 19th Working Conference on Reverse Engineering (WCRE 2012), Kingston, ON, Canada (pp. 325-334). Retrieved from https://doi.org/10.1109/WCRE.2012.42
      • Conference paper
        Gauthier, F. & Merlo, E. (2012). Investigation of access control models with formal concept analysis: A case study. Paper presented at the 16th European Conference on Software Maintenance and Reengineering (CSMR 2012), Szeged, Hungary (pp. 397-402). Retrieved from https://doi.org/10.1109/CSMR.2012.50
      • Conference paper
        Ouellet, M., Merlo, E. & Sozen, N. (2012). Locating features in dynamically configured avionics software. Paper presented at the 34th International Conference on Software Engineering (ICSE 2012), Zurich, Switzerland (pp. 1453-1454). Retrieved from https://doi.org/10.1109/ICSE.2012.6227068
      • Conference paper
        Letarte, D., Gauthier, F., Merlo, E., Sutyanyong, N. & Zuzarte, C. (2012). Targeted genetic test SQL generation for the DB2 database. Paper presented at the 5th International Workshop on Testing Database Systems (DBTest 2012), Scottsdale, Arizona, USA. Retrieved from https://doi.org/10.1145/2304510.2304517
    • 2011
      • Conference paper
        Lavoie, T. & Merlo, E. (2011). Automated type-3 clone oracle using Levenshtein metric. Paper presented at the 5th International Workshop on Software Clones (IWSC 2011), in conjunction with the 33rd ACM/IEEE International Conference on Software Engineering (ICSE 2011), Waikiki, Honolulu, HI, United states (pp. 34-40). Retrieved from https://doi.org/10.1145/1985404.1985411
      • Conference paper
        Gauthier, F., Letarte, D., Lavoie, T. & Merlo, E. (2011). Extraction and comprehension of moodle's access control model: A case study. Paper presented at the 9th Annual International Conference on Privacy, Security and Trust, Montréal, Québec. Retrieved from https://doi.org/10.1109/PST.2011.5971962
      • Conference paper
        Letarte, D., Gauthier, F. & Merlo, E. (2011). Security model evolution of PHP web applications. Paper presented at the 4th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2011), Berlin, Germany (pp. 289-298). Retrieved from https://doi.org/10.1109/ICST.2011.36
    • 2010
      • Conference paper
        Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (2010). Advanced clone-analysis to support object-oriented system refactoring. Paper presented at the 17th Working Conference on Reverse Engineering (WCRE 2010), Beverly, Massachusetts, USA. Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=5645476
      • Conference paper
        Lavoie, T., Eilers-Smith, M. & Merlo, E. (2010). Challenging cloning related problems with GPU-based algorithms. Paper presented at the 4th International Workshop on Software Clones (IWSC 2010), in conjunction with the 32nd ACM/IEEE International Conference on Software Engineering (ICSE 2010), Cape Town, South africa (pp. 25-32). Retrieved from https://doi.org/10.1145/1808901.1808905
    • 2009
      • Conference paper
        Merlo, E. & Lavoie, T. (2009). Computing structural types of clone syntactic blocks. Paper presented at the 16th Working Conference on Reverse Engineering, Lille, France (pp. 274-278). Retrieved from https://doi.org/10.1109/WCRE.2009.33
      • Conference paper
        Letarte, D. & Merlo, E. (2009). Extraction of inter-procedural simple role privilege models from PHP code. Paper presented at the 16th Working Conference on Reverse Engineering, Lille, France (pp. 187-191). Retrieved from https://doi.org/10.1109/WCRE.2009.32
    • 2007
      • Conference paper
        Merlo, E., Letarte, D. & Antoniol, G. (2007). Automated protection of php applications against SQL-injection attacks. Paper presented at the 11th European Conference on Software Maintenance and Reengineering (CSMR 2007), Amsterdam, Netherlands (pp. 191-200). Retrieved from https://doi.org/10.1109/CSMR.2007.16
      • Conference paper
        Antoniol, G., Guéhéneuc, Y.-G., Merlo, E. & Tonella, P. (2007). Mining the lexicon used by programmers during software evolution. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 2007), Paris, France (pp. 14-23). Retrieved from https://doi.org/10.1109/ICSM.2007.4362614
      • Conference paper
        Merlo, E., Letarte, D. & Antoniol, G. (2007). SQL-injection security evolution analysis in PHP. Paper presented at the 9th IEEE International Symposium on Web Site Evolution (WSE 2007), Paris, France (pp. 45-49). Retrieved from https://doi.org/10.1109/WSE.2007.4380243
    • 2006
      • Conference paper
        Bouktif, S., Antoniol, G., Merlo, E. & Neteler, M. (2006). A feedback based quality assessment to support open source software evolution: the GRASS case study. Paper presented at the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), Philadelphia, PA, USA (pp. 155-165). Retrieved from https://doi.org/10.1109/ICSM.2006.5
      • Conference paper
        Bouktif, S., Antoniol, G., Merlo, E. & Neteler, M. (2006). A novel approach to optimize clone refactoring activity. Paper presented at the 8th Annual Genetic and Evolutionary Computation Conference (GECCO 2006), Seattle, WA, United States (pp. 1885-1892). Retrieved from https://doi.org/10.1145/1143997.1144312
      • Conference paper
        Arenas, I.A., Deslauriers, B., Tremblay, J., Brunelle, P.-L., Gossard, F., Gurau, A., Seda, O., Hamet, P., Kotchen, T.A., Cowley, A.W.J., Gaudet, D., Antoniol, G. & Merlo, E. (2006). Dynamic linkage of 192 candidate genes for blood pressure during orthostatic stress in sibpairs from french-canadian familes ascertained by hypertension. Paper presented at the 21st Scientific Meeting of the International Society of Hypertension.
      • Conference paper
        Seda, O., Tremblay, J., Brunelle, P.-L., Gurau, A., Gossard, F., Hamet, P., Merlo, E., Gaudet, D., Bouchard, G., Jomphe, M., Cowley, A.W., Broeckel, U., Kotchen, T.A., Gagnon, F. & Antoniol, G. (2006). Global haplotype signatures reveal gamma-glutamyl transferase as a genomic marker of hypertension with metalobic syndrome. Paper presented at the 21st Scientific Meeting of the International Society of Hypertension.
      • Conference paper
        Merlo, E., Letarte, D. & Antoniol, G. (2006). Insider and outsider threat-sensitive SQL injection vulnerability analysis in PHP. Paper presented at the 13th Working Conference on Reverse Engineering (WCRE 2006), Benevento, Italy (pp. 147-156). Retrieved from https://doi.org/10.1109/WCRE.2006.33
    • 2005
      • Conference paper
        Seda, O., Merlo, E., Tremblay, J., Broeckel, U., Kaldunski, M., Gaudet, D., Bouchard, G., Gagnon, F., Antoniol, G., Brunelle, P.L., Gurau, A., Gossard, F., Kotchen, T.A., Pausova, Z., Orlov, S.N., Wan, R., Jomphe, M., Pintos, J., Cowley, A.W. & Hamet, P. (2005). Hypertension with and without metabolic syndrome presents as distinct clinical and genetic entities in French-Canadians [Abstract]. Paper presented at the European Human Genetics Conference, Prague, Czech Republic. (Published in European Journal of Human Genetics, 13(S1), 314). Retrieved from https://www.eshg.org/fileadmin/www.eshg.org/abstracts/ESHG2005Abstracts.pdf#page=315
      • Conference paper
        Del Grosso, C., Antoniol, G., Di Penta, M., Galinier, P. & Merlo, E. (2005). Improving network applications security : a new heuristic to generate stress testing data. Paper presented at the 2005 Annual Genetic and Evolutionary Computation Conference (GECCO 2005), Washington, D.C. (pp. 1037-1043). Retrieved from https://doi.org/10.1145/1068009.1068185
      • Conference paper
        Antoniol, G., Merlo, E., Guéhéneuc, Y.-G. & Sahraoui, H. (2005). On feature traceability in object oriented programs. Paper presented at the 3rd international workshop on Traceability in emerging forms of software engineering (TEFSE 2005), Long Beach, California, USA (pp. 73–78). Retrieved from https://doi.org/10.1145/1107656.1107672
    • 2004
      • Conference paper
        Antoniol, G., Penta, M.D. & Merlo, E. (2004). An Automatic Approach to identify Class Evolution Discontinuities. Paper presented at the 7th International Workshop on Principles of Software Evolution (IWPSE 2004), Kyoto, Japan (pp. 31-40). Retrieved from https://doi.org/10.1109/IWPSE.2004.1334766
      • Conference paper
        Merlo, E., Antoniol, G., Penta, M.D. & Rollo, V.F. (2004). Linear complexity object-oriented similarity for clone detection and software evolution analyses. Paper presented at the 20th IEEE International Conference on Software Maintenance (ICSM 2004), Chicago, IL, USA (pp. 412-416). Retrieved from https://doi.org/10.1109/ICSM.2004.1357826
    • 2003
      • Conference paper
        Merlo, E., Antoniol, G. & Brunelle, P.-L. (2003). Fast flow analysis to compute fuzzy estimates of risk levels. Paper presented at the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), Benevento, Italy (pp. 351-360). Retrieved from https://doi.org/10.1109/CSMR.2003.1192443
      • Conference paper
        Brunelle, P.-L., Merlo, E. & Antoniol, G. (2003). Investigating Java Type Analyses for the Receiver-Classes Testing Criterion. Paper presented at the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), Denver, CO, USA (pp. 419-429). Retrieved from https://doi.org/10.1109/ISSRE.2003.1251063
      • Conference paper
        Antoniol, G., Penta, M.D. & Merlo, E. (2003). YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs. Paper presented at the 11th IEEE International Workshop on Program Comprehension (IWPC 2003), Portland, Oregon (pp. 13-22). Retrieved from https://doi.org/10.1109/WPC.2003.1199185
    • 2002
      • Conference paper
        Penta, M.D., Neteler, M., Antoniol, G. & Merlo, E. (2002). Knowledge-Based Library Re-Factoring for an Open Source Project. Paper presented at the 9th Working Conference on Reverse Engineering (WCRE 2002), Richmond, Virginia (pp. 319-328). Retrieved from https://doi.org/10.1109/WCRE.2002.1173089
    • 2001
      • Conference paper
        Antoniol, G., Penta, M.D., Casazza, G. & Merlo, E. (2001). A Method to Re-Organize Legacy Systems via Concept Analysis. Paper presented at the 9th International Workshop on Program Comprehension (IWPC 2001), Toronto, Ontario (pp. 281-290). Retrieved from https://doi.org/10.1109/WPC.2001.921738
      • Conference paper
        Malenfant, B., Antoniol, G., Merlo, E. & Dagenais, M. (2001). Flow analysis to detect blocked statements. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 2001), Florence, Italy (pp. 62-70). Retrieved from https://doi.org/10.1109/ICSM.2001.972712
      • Conference paper
        Antoniol, G., Villano, U., Penta, M.D., Casazza, G. & Merlo, E. (2001). Identifying Clones in the Linux Kernel. Paper presented at the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), Florence, Italy (pp. 92-99). Retrieved from https://doi.org/10.1109/SCAM.2001.10003
      • Conference paper
        Antoniol, G., Casazza, G., Penta, M.D. & Merlo, E. (2001). Modeling clones evolution through time series. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 2001), Florence, Italy (pp. 273-280). Retrieved from https://doi.org/10.1109/ICSM.2001.972740
      • Conference paper
        Penta, M.D., Casazza, G., Antoniol, G. & Merlo, E. (2001). Modeling Web Maintenance Centers through Queue Models. Paper presented at the 5th European Conference on Software Maintenance and Reengineering (CSMR 2001), Lisbon, Portugal (pp. 131-138). Retrieved from https://doi.org/10.1109/.2001.914977
      • Conference paper
        Antoniol, G., Casazza, G., Lucca, G.A.D., Penta, M.D. & Merlo, E. (2001). Predicting Web Site Access: An Application of Time Series. Paper presented at the 3rd International Workshop on Web Site Evolution (WSE 2001), Florence, Italy (pp. 57-61). Retrieved from https://doi.org/10.1109/WSE.2001.988786
    • 2000
      • Conference paper
        Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (2000). Advanced clone-analysis to support object-oriented system refactoring. Paper presented at the 7th Working Conference on Reverse Engineering, Brisbane, Qld., Australia (pp. 98-107). Retrieved from https://doi.org/10.1109/WCRE.2000.891457
      • Conference paper
        Hu, Y., Merlo, E., Dagenais, M. & Lague, B. (2000). C/C++ conditional compilation analysis using symbolic execution. Paper presented at the International Conference on Software Maintenance (ICSM 2000), San Jose, CA, USA (pp. 196-206). Retrieved from https://doi.org/10.1109/ICSM.2000.883045
      • Conference paper
        Antoniol, G., Canfora, G., Lucia, A.D., Casazza, G. & Merlo, E. (2000). Tracing Object-Oriented Code into Functional Requirements. Paper presented at the 8th International Workshop on Program Comprehension (IWPC 2000), Limerick, Ireland (pp. 79-86). Retrieved from https://doi.org/10.1109/WPC.2000.852482
    • 1999
      • Conference paper
        Merlo, E. & Antoniol, G. (1999). A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. Paper presented at the Conference on the Centre for Advanced Studies on Collaborative Research (CASCON 1999), Toronto, Ontario (7 pages). Retrieved from http://dl.acm.org/citation.cfm?id=781995.782002
      • Conference paper
        Lapierre, S., Merlo, E., Savard, G., Antoniol, G., Fiutem, R. & Tonella, P. (1999). Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 1999), Oxford, England (pp. 189-198). Retrieved from https://doi.org/10.1109/ICSM.1999.792607
      • Conference paper
        Patenaude, J.-F., Merlo, E., Dagenais, M. & Lague, B. (1999). Extending software quality assessment techniques to Java systems. Paper presented at the 7th International Workshop on Program Comprehension (IWPC 1999), Pittsburgh, PA, USA (pp. 49-56). Retrieved from https://doi.org/10.1109/WPC.1999.777743
      • Conference paper
        Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (1999). Measuring clone based reengineering opportunities. Paper presented at the 6th International Software Metrics Symposium, Boca Raton, Florida (pp. 292-303). Retrieved from https://doi.org/10.1109/METRIC.1999.809750
      • Conference paper
        Knapen, G., Lague, B., Dagenais, M. & Merlo, E. (1999). Parsing C++ despite missing declarations. Paper presented at the 7th International Workshop on Program Comprehension (IWPC 1999), Pittsburgh, Pennsylvania, USA (pp. 114-125). Retrieved from https://doi.org/10.1109/WPC.1999.777750
      • Conference paper
        Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (1999). Partial redesign of Java software systems based on clone analysis. Paper presented at the 6th Working Conference on Reverse Engineering, Atlanta, Georgia (pp. 326-336). Retrieved from https://doi.org/10.1109/WCRE.1999.806971
      • Conference paper
        Antoniol, G., Canfora, G., Lucia, A.D. & Merlo, E. (1999). Recovering Code to Documentation Links in OO Systems. Paper presented at the 6th Working Conference on Reverse Engineering (wcre 1999), Atlanta, GA (pp. 136-144). Retrieved from https://doi.org/10.1109/WCRE.1999.806954
    • 1998
      • Conference paper
        Dagenais, M.R., Merlo, E.M., Laguë, B. & Proulx, D. (1998). Clones occurence in large object oriented software packages. Paper presented at the Conference of the Centre for Advanced Studies on Collaborative Research (CASCON 1998), Toronto, Canada (pp. 192-200). Retrieved from https://dl.acm.org/doi/10.5555/783160.783170
    • 1997
      • Conference paper
        Tonella, P., Antoniol, G., Fiutem, R. & Merlo, E. (1997). Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing. Paper presented at the 19th international conference on Software engineering (ICSE 1997), Boston, Massachusetts (pp. 433-443). Retrieved from https://doi.org/10.1145/253228.253371
      • Conference paper
        Laguë, B., Leduc, C., Merlo, E.M. & Dagenais, M.R. (1997). Framework for the analysis of layered software achitectures. Paper presented at the International Workshop on Empirical Studies of Software Maintenance (WESS 1997), Bari, Italy (pp. P14).
      • Conference paper
        Tonella, P., Antoniol, G., Fiutem, R. & Merlo, E. (1997). Points-to Analysis for Program Understanding. Paper presented at the 5th International Workshop on Program Comprehension (IWPC 1997), Dearborn, MI (pp. 90-99). Retrieved from https://doi.org/10.1109/WPC.1997.601271
      • Conference paper
        Antoniol, G., Fiutem, R., Lutteri, G., Tonella, P., Zanfei, S. & Merlo, E. (1997). Program Understanding and Maintenance with the CANTO Environment. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 1997), Bari, Italy (pp. 72-81). Retrieved from https://doi.org/10.1109/ICSM.1997.624233
      • Conference paper
        Tonella, P., Antoniol, G., Fiutem, R. & Merlo, E. (1997). Variable precision reaching definitions analysis for software maintenance. Paper presented at the 1st Euromicro Conference on Software Maintenance and Reengineering (EUROMICRO 1997), Berlin, Germany (pp. 60-67). Retrieved from https://doi.org/10.1109/CSMR.1997.583007
    • 1996
      • Conference paper
        Fiutem, R., Tonella, P., Antoniol, G. & Merlo, E. (1996). A Cliche-Based Environment to Support Architectural Reverse Engineering. Paper presented at the 4th Working Conference on Reverse Engineering (WCRE 1996), Monterey, CA (pp. 277-286). Retrieved from https://doi.org/10.1109/WCRE.1996.558936
      • Conference paper
        Fiutem, R., Tonella, P., Antoniol, G. & Merlo, E. (1996). A Cliché-Based Environment to Support Architectural Reverse Engineering. Paper presented at the International Conference on Software Maintenance (ICSM 1996), Monterey, CA (pp. 319-328). Retrieved from https://doi.org/10.1109/ICSM.1996.565035
      • Conference paper
        Tonella, P., Fiutem, R., Antoniol, G. & Merlo, E. (1996). Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic -A Case Study. Paper presented at the 3rd Working Conference on Reverse Engineering (WCRE 1996), Monterey, CA (pp. 198-207). Retrieved from https://doi.org/10.1109/WCRE.1996.558904
      • Conference paper
        Fiutem, R., Merlo, E., Antoniol, G. & Tonella, P. (1996). Understanding the architecture of software systems. Paper presented at the 4th Workshop on Program Comprehension (WPC 1996), Berlin, Germany (pp. 187-196). Retrieved from https://doi.org/10.1109/WPC.1996.501133
    • 1995
      • Conference paper
        Antoniol, G., Fiutem, R., Merlo, E. & Tonella, P. (1995). Application and user interface migration from basic to visual C++. Paper presented at the International Conference on Software Maintenance (ICSM 1995), Nice, France (pp. 76-85). Retrieved from https://doi.org/10.1109/ICSM.1995.526529
      • Conference paper
        Elwahidi, A.R. & Merlo, E. (1995). Generating user interfaces from specifications produced by a reverse engineering process. Paper presented at the 7th International Workshop on Computer-Aided Software Engineering, Toronto, Ont, CAN. Retrieved from https://doi.org/10.1109/CASE.1995.465304
    • 1994
      • Conference paper
        Merlo, E. & De Mori, R. (1994). Artificial neural networks for source code informal information analysis. Paper presented at the International Conference on Artificial Neural Networks, Sorrento, Italy (pp. 895-900).
      • Conference paper
        Merlo, E., Gagné, P.-Y. & Thiboutot, A. (1994). Inference of graphical AUIDL specifications for the reverse engineering of user interfaces. Paper presented at the International Conference on Software Maintenance (ICSM 1994), Victoria, Can (pp. 80-88). Retrieved from https://doi.org/10.1109/ICSM.1994.336787
  • Book chapters (2)
    • 2002
      • Book chapter
        Dagenais, M.R., Patenaude, J.-F., Merlo, E. & Laguë, B. (2002). Clones occurence in Java and Modula-3 software systems. In H. Erdogmus & O. Tanir (Eds.), Advances in software engineering (pp. 95-110). Springer. Retrieved from https://doi.org/10.1007/978-0-387-21599-0_5
    • 2001
      • Book chapter
        Knapen, G., Laguë, B., Dagenais, M.R. & Merlo, E. (2001). Parsing C++ code despite missing declarations (chp. 17). In Advances in Software engineering. Springer. Retrieved from https://doi.org/10.1007/978-0-387-21599-0_17
  • Reports (10)
    • 2012
      • Report
        Ouellet, M., Gauthier, F., Merlo, E., Sozen, N. & Gagnon, M. (2012). Mapping features to source code in dynamically configured avionics software (Report No EPM-RT-2012-02). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2796/
    • 2011
      • Report
        Lavoie, T.M. & Merlo, E. (2011). Levenshtein edit distance-based type III clone detection using metric trees (Report No EPM-RT-2011-01). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2638/
    • 2009
      • Report
        Merlo, E. & Lavoie, T.M. (2009). Detection of redundant clone relations based on clone subsumption (Report No EPM-RT-2009-05). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2646/
    • 2006
      • Report
        Merlo, E., Letarte, D. & Antoniol, G. (2006). Insider threat resistant SQL-injection prevention in PHP (Report No EPM-RT-2006-04). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/3138/
    • 2004
      • Report
        Merlo, E., Desaulniers, B., Antoniol, G., Brunelle, P., Jomphe, M., Bouchard, G., Tremblay, J. & Hamet, P. (2004). Layered founders : a novel approach to investigate the ancestral transmission of complex traits (Report No EPM-RT-2004-05). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2617/
    • 1999
      • Report
        Balazinska, M. & Merlo, E. (1999). Redesigning software systems using clone information : technical report (Report No EPM-RT-99-13). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/10102/
    • 1997
      • Report
        Merlo, E. & Antoniol, G. (1997). Dynamic pointers analysis (Report No EPM-RT-97-07). École Polytechnique de Montréal.
    • 1996
      • Report
        Mayrand, J. & Merlo, E. (1996). Évaluation de la qualité des logiciels (Report No EPM-RT-96-12). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/9856/
    • 1994
      • Report
        Merlo, E. (1994). Analysis, representation, and structural and behavioural abstraction for the reverse engineering of user interfaces (Report No EPM-RT-94-06). École Polytechnique de Montréal.
    • 1993
      • Report
        Merlo, E., McAdam, I. & De Mori, R. (1993). Feed-forward and recurrent neural networks for source code informal information analysis (Report No EPM-RT-93-35). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/9868/