Tambon, F., Laberge, G., An, L., Nikanjam, A., Mindom, P.S.N., Pequignot, Y., Khomh, F., Antoniol, G., Merlo, E. & Laviolette, F. (2022). How to certify machine learning based safety-critical systems? A systematic literature review. Automated Software Engineering, 29(2). Retrieved from https://doi.org/10.1007/s10515-022-00337-x
Directory of Experts
Merlo, Ettore

Directory of Experts
Merlo, Ettore
Directory of Experts
Publications by type
Journal article (29)
Conference paper (76)
Book
Book chapter (2)
Patent
Report (10)
Thesis
Dataset
Teaching resource
Image
Audio recording
Video recording
Other
Ettore Merlo (117)
- Journal articles (29)
- 2022
Journal article
- 2021
Journal article Laverdière, M.-A., Julien, K. & Merlo, E. (2021). RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications. Information and Software Technology, 139, 21 pages. Retrieved from https://doi.org/10.1016/j.infsof.2021.106630
- 2020
Journal article Han, Z., Li, X., Xu, G., Xiong, N., Merlo, E. & Stroulia, E. (2020). An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models. IEEE Transactions on Industrial Informatics, 16(2), 1024-1034. Retrieved from https://doi.org/10.1109/TII.2019.2925422
- 2017
Journal article Lavoie, T., Mérineau, M., Merlo, E. & Potvin, P. (2017). A Case Study of TTCN-3 Test Scripts Clone Analysis in an Industrial Telecommunication Setting. Information and Software Technology, 87, 32-45. Retrieved from https://doi.org/10.1016/j.infsof.2017.01.008
- 2013
Journal article Arenas, I.A., Tremblay, J., Deslauriers, B., Sandoval, J., Seda, O., Gaudet, D., Merlo, E., Kotchen, T., Cowley, A.W. & Hamet, P. (2013). Dynamic Genetic Linkage of Intermediate Blood Pressure Phenotypes During Postural Adaptations in a Founder Population. Physiological Genomics, 45(4), 138-150. Retrieved from https://doi.org/10.1152/physiolgenomics.00037.2012
- 2011
Journal article Arenas, I., Deslauriers, B., Sandoval, J., Seda, O., Merlo, E., Gaudet, D., Tremblay, J., Kotchen, T., Cowley, A. & Hamet, P. (2011). Dynamic Linkage of Blood Pressure Phenotypes. Journal of Hypertension, 29, e42-e43.
- 2009
Journal article Nikpay, M., Seda, O., Tremblay, J., Gaudet, D., Merlo, E., Kotchen, T.A., Cowley, A.W. & Hamet, P. (2009). Pathway-Based Genetic Analysis of Habitual Substance Use and Response to Psychological and Physical Stress in French-Canadian Families Reveals Common Pathways of Synaptic Plasticity at Glutamatergic Synapses. Circulation, 119(10), E328. Retrieved from https://doi.org/10.1161/CIRCULATIONAHA.109.191960
- 2008
Journal article Del Grosso, C., Antoniol, G., Merlo, E. & Galinier, P. (2008). Detecting Buffer Overflow Via Automatic Test Input Data Generation. Computers & Operations Research, 35(10), 3125-3143. Retrieved from https://doi.org/10.1016/j.cor.2007.01.013Journal article Seda, O., Tremblay, J., Gaudet, D., Brunelle, P.L., Gurau, A., Merlo, E., Pilote, L., Orlov, S.N., Boulva, F., Petrovich, M., Kotchen, T.A., Cowley, A.W. & Hamet, P. (2008). Systematic, Genome-Wide, Sex-Specific Linkage of Cardiovascular Traits in French Canadians. Hypertension, 51(4), 1156-1162. Retrieved from https://doi.org/10.1161/HYPERTENSIONAHA.107.105247
- 2007
Journal article Bellon, S., Koschke, R., Antoniol, G., Krinke, J. & Merlo, E. (2007). Comparison and Evaluation of Clone Detection Tools. IEEE Transactions on Software Engineering, 33(9), 577-591. Retrieved from https://doi.org/10.1109/TSE.2007.70725Journal article Hamet, P., Seda, O., Tremblay, J., Gaudet, D., Brunelle, P.L., Gurau, A., Merlo, E., Gossard, F., Bouchard, G. & Cowley, A. (2007). Genomic Features of Hypertension With and Without Obesity. International Journal of Obesity, 31, S34. Retrieved from https://doi.org/10.1038/sj.ijo.0803594
- 2005
Journal article Di Penta, M., Neteler, M., Antoniol, G. & Merlo, E. (2005). A Language-Independent Software Renovation Framework. Journal of Systems and Software, 77(3), 225-240. Retrieved from https://doi.org/10.1016/j.jss.2004.03.033Journal article Hamet, P., Seda, O., Merlo, E., Tremblay, J., Broeckel, U., Gaudet, D., Bouchard, G., Gagnon, F., Antoniol, G., Wan, R., Pausova, Z., Gossard, F., Kotchen, T.A., Pintos, J. & Cowley, A.W. (2005). Partitioning of Extra/Intracellular Body Water Plays a Role in Specific Subsets of Hypertension Featuring Metabolic Syndrome and Premature Death. Journal of Hypertension, 23, S264.Journal article Hamet, P., Merlo, E., Seda, O., Broeckel, U., Tremblay, J., Kaldunski, M., Gaudet, D., Bouchard, G., Deslauriers, B., Gagnon, F., Antoniol, G., Pausova, Z., Labuda, M., Jomphe, M., Gossard, F., Tremblay, G., Kirova, R., Tonellato, P., Orlov, S.N., Pintos, J., Platko, J., Hudson, T.J., Rioux, J.D., Kotchen, T.A. & Cowley, A.W. (2005). Quantitative founder effect analysis of French-Canadian families identifies specific loci contributing to metabolic phenotypes of hypertension. American Journal on Human Genetics, 76(5), 815-832. Retrieved from https://doi.org/10.1086/430133Journal article Seda, O., Tremblay, J., Merlo, E., Gaudet, D., Broeckel, U., Bouchard, G., Antoniol, G., Brunelle, P.L., Gurau, A., Gossard, F., Pintos, J., Kotchen, T.A., Cowley, A.W. & Hamet, P. (2005). The Genomic Signatures of Hypertension. Hypertension, 46(5), 884.
- 2004
Journal article Hamet, P., Merlo, E., Seda, O., Broeckel, U., Kaldunski, M.L., Gaudet, D., Bouchard, G., Deslauriers, B., Gagnon, F., Antoniol, G., Kotchen, T.A., Tremblay, J., Pausova, Z., Labuda, M., Jomphe, M., Gossard, F., Kirova, R., Tonellato, P., Orlov, S.N., Pintos, J., Rioux, J.D., Platko, J., Hudson, T.J., Lander, E. & Cowley, A.W. (2004). Quantitative Founder Effect Analysis in French-Canadian Families Identifies Specific Alleles Contributing to Intermediate Phenotypes of Hypertension. Hypertension, 44(4), 510.Journal article Hamet, P., Seda, O., Merlo, E., Gaudet, D., Broeckel, U., Gagnon, F., Antoniol, G., Bouchard, G., Kotchen, T.A. & Cowley, A.W. (2004). Resolution of Complex Trait of Hypertension by Linkage, Systematic Allelic Contribution Analysis and Ancestral Data in French-Canadian Families. Journal of Hypertension, 22, S5. Retrieved from https://doi.org/10.1097/00004872-200406002-00009
- 2003
Journal article Merlo, E., Seda, O., Antoniol, G., Gaudet, D., Deslauriers, B., Tremblay, J., Cowley, A.W., Bouchard, G. & Hamet, P. (2003). Differential Genetic Contribution Density of Separable Layered Founders in Saguenay (Québec) Population. Journal of Hypertension, 21, S305.Journal article Merlo, E., McAdam, I. & De Mori, R. (2003). Feed-forward and recurrent neural networks for source code informal information analysis. Journal of Software Maintenance and Evolution: Research and Practice, 15(4), 205-244. Retrieved from https://doi.org/10.1002/smr.274Journal article Hamet, P., Gaudet, D., Tremblay, J., Pausova, Z., Seda, O., Bernard, M., Gossard, F., Wang, R., Broeckel, U., Orlov, S.N., Labuda, M., Tonellato, P.J., Kirova, R., Cheng, Q., Kaldunski, M.L., Rioux, J.D., Platko, J., Kotchen, T.A., Merlo, E., Lander, E., Hudson, T.J. & Cowley, A.W. (2003). Partition of Dyslipidemic and Hypertensive French- Canadians Families Into Distinct Sub-Syndromes May Assist in the Detection of Specific Genomic Determinants. Hypertension, 42(3), 443.
- 2002
Journal article Antoniol, G., Villano, U., Merlo, E. & Di Penta, M. (2002). Analyzing Cloning Evolution in the Linux Kernel. Information and Software Technology, 44(13), 755-765. Retrieved from https://doi.org/10.1016/S0950-5849(02)00123-4Journal article Antoniol, G., Canfora, G., Casazza, G., Lucia, A.D. & Merlo, E. (2002). Recovering Traceability Links between Code and Documentation. IEEE Transactions on Software Engineering, 28(10), 970-983. Retrieved from https://doi.org/10.1109/TSE.2002.1041053
- 2000
Journal article Mayrand, J., Patenaude, J.F., Merlo, E., Dagenais, M. & Lague, B. (2000). Software Assessment Using Metrics: a Comparison across Large C++ and Java Systems. Annals of Software Engineering, 9(1-4), 117-141. Retrieved from https://doi.org/10.1023/A:1018924724621
- 1999
Journal article Fiutem, R., Antoniol, G., Tonella, P. & Merlo, E. (1999). Art: an Architectural Reverse Engineering Environment. Journal of Software Maintenance: Research and Practice, 11(5), 339-364. Retrieved from https://doi.org/10.1002/(SICI)1096-908X(199909/10)11:5<339::AID-SMR196>3.0.CO;2-IJournal article Fiutem, R., Tonella, P., Antoniol, G. & Merlo, E. (1999). Points-to Analysis for Program Understanding. Journal of Systems and Software, 44(3), 213-227. Retrieved from https://doi.org/10.1016/S0164-1212(98)10058-4Journal article Tonella, P., Antoniol, G., Fiutem, R. & Merlo, E. (1999). Variable-Precision Reaching Definitions Analysis. Journal of Software Maintenance: Research and Practice, 11(2), 117-142. Retrieved from https://doi.org/10.1002/(SICI)1096-908X(199903/04)11:2<117::AID-SMR185>3.0.CO;2-P
- 1995
Journal article Merlo, E., Girard, J.-F., Hendren, L. & De Mori, R. (1995). Multi-valued constant propagation analysis for user interface reengineering. International Journal of Software Engineering and Knowledge Engineering, 5(1), 5-23. Retrieved from https://doi.org/10.1142/S0218194095000022Journal article Merlo, E., Gagné, P.-Y., Girard, J.-F., Kontogiannis, K., Hendren, L., Panangaden, P. & De Mori, R. (1995). Reengineering user interfaces. IEEE Software, 12(1), 64-73. Retrieved from https://doi.org/10.1109/52.363164
- 1994
Journal article Buss, E., De Mori, R., Gentreman, W.M., Henshaw, J., Johnson, H., Kontogiannis, K., Merlo, E., Mueller, H.A., Mylopoulos, J., Paul, S., Prakash, A., Stanley, M., Tilley, S.R., Troster, J. & Wong, K. (1994). Investigating reverse engineering technologies for the CAS program understanding project. IBM Systems Journal, 33(3), 477-500. Retrieved from https://doi.org/10.1147/sj.333.0477
- 2022
- Conference papers (76)
- 2022
Conference paper Merlo, E., Pinciroli, C., Panerati, J., Famelis, M. & Beltrame, G. (2022). Automated extraction and checking of property models from source code for robot swarms. Paper presented at the 4th IEEE/ACM International Workshop on Robotics Software Engineering (RoSE 2022), Pittsburgh, PA, USA (pp. 47-54). Retrieved from https://doi.org/10.1145/3526071.3527516Conference paper Marhaba, M., Merlo, E., Khomh, F. & Antoniol, G. (2022). Identification of out-of-distribution cases of CNN using class-based surprise adequacy. Paper presented at the IEEE/ACM 1st International Conference on AI Engineering - Software Engineering for AI (CAIN 2022), Pittsburgh, PA, USA (pp. 39-40).Conference paper Merlo, E., Margier, M., Jourdan, G.-V. & Onut, I.-V. (2022). Phishing kits source code similarity distribution: A case study. Paper presented at the IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2022), Honolulu, HI, USA (pp. 983-994). Retrieved from https://doi.org/10.1109/SANER53432.2022.00116
- 2018
Conference paper Beigi-Mohammadi, N., Litoiu, M., Emami-Taba, M., Tahvildari, L., Fokaefs, M., Merlo, E. & Viorel Onut, I. (2018). A DevOps framework for quality-driven self-protection in web software systems. Paper presented at the 28th Annual International Conference on Computer Science and Software Engineering, Markham, Ontario (pp. 270-274). Retrieved from https://dl.acm.org/citation.cfm?id=3291319Conference paper Laverdière, M.-A. & Merlo, E. (2018). Detection of protection-impacting changes during software evolution. Paper presented at the 25th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2018), Campobasso, Italy (pp. 434-444). Retrieved from https://doi.org/10.1109/SANER.2018.8330230Conference paper Beltrame, G., Merlo, E., Panerati, J. & Pinciroli, C. (2018). Engineering safety in swarm robotics. Paper presented at the 1st ACM/IEEE International Workshop on Robotics Software Engineering (RoSE 2018) and 40th International Conference on Software Engineering (ICSE 2018), Gothenburg, Sweden (pp. 36-39). Retrieved from https://doi.org/10.1145/3196558.3196565Conference paper Barrak, A., Laverdière, M.-A., Khomh, F., An, L. & Merlo, E. (2018). Just-in-time Detection of Protection-Impacting Changes on WordPress and MediaWiki. Paper presented at the 28th Annual International Conference on Computer Science and Software Engineering (CASCON 2018), Toronto, Canada (pp. 178-188).
- 2017
Conference paper Laverdiere, M.-A. & Merlo, E. (2017). Classification and distribution of RBAC privilege protection changes in WordPress evolution (short paper). Paper presented at the 15th Annual Conference on Privacy, Security and Trust (PST 2017), Calgary, Alb. (pp. 249-254). Retrieved from https://doi.org/10.1109/PST.2017.00048Conference paper Laverdiere, M.A. & Merlo, E. (2017). Computing counter-examples for privilege protection losses using security models. Paper presented at the 24th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2017), Klagenfurt, Austria (pp. 240-249). Retrieved from https://doi.org/10.1109/SANER.2017.7884625
- 2015
Conference paper Lavoie, T. & Merlo, E. (2015). Performance impact of lazy deletion in metric trees for incremental clone analysis. Paper presented at the 9th IEEE International Workshop on Software Clones (IWSC 2015), Montréal, Québec (pp. 15-18). Retrieved from https://doi.org/10.1109/IWSC.2015.7069884Conference paper Laverdiere, M.A., Berger, B.J. & Merloz, E. (2015). Taint analysis of manual service compositions using cross-application call graphs. Paper presented at the 22nd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2015), Montréal, Québec (pp. 585-589). Retrieved from https://doi.org/10.1109/SANER.2015.7081882
- 2014
Conference paper Gauthier, F., Merlo, E., Stroulia, E. & Turner, D. (2014). Supporting maintenance and evolution of access control models in web applications. Paper presented at the 30th IEEE International Conference on Software Maintenance and Evolution (ICSME 2014), Victoria, BC, Canada (pp. 506-510). Retrieved from https://doi.org/10.1109/ICSME.2014.83
- 2013
Conference paper Lavoie, T. & Merlo, E. (2013). How much really changes? A case study of firefox version evolution using a clone detector. Paper presented at the 7th International Workshop on Software Clones (IWSC 2013), San Francisco, CA, USA (pp. 83-89). Retrieved from https://doi.org/10.1109/iwsc.2013.6613048Conference paper Merlo, E., Lavoie, T., Potvin, P. & Busnel, P. (2013). Large scale multi-language clone analysis in a telecommunication industrial setting. Paper presented at the 7th International Workshop on Software Clones (IWSC 2013), San Francisco, CA, USA (pp. 69-75). Retrieved from https://doi.org/10.1109/IWSC.2013.6613046
- 2012
Conference paper Sozen, N. & Merlo, E. (2012). Adapting Software Product Lines for complex certifiable avionics software. Paper presented at the 3rd International Workshop on Product LinE Approaches in Software Engineering (PLEASE 2012), Zurich, Switzerland (pp. 21-24). Retrieved from https://doi.org/10.1109/please.2012.6229764Conference paper Gauthier, F. & Merlo, E. (2012). Alias-aware propagation of simple pattern-based properties in PHP applications. Paper presented at the 12th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2012), Riva del Garda, Trento, Italy (pp. 44-53). Retrieved from https://doi.org/10.1109/SCAM.2012.19Conference paper Lavoie, T. & Merlo, E. (2012). An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance. Paper presented at the 6th International Workshop on Software Clones (IWSC 2012), Zurich, Switzerland (pp. 1-7). Retrieved from https://doi.org/10.1109/IWSC.2012.6227861Conference paper Gauthier, F. & Merlo, E. (2012). Fast detection of access control vulnerabilities in PHP applications. Paper presented at the 19th Working Conference on Reverse Engineering (WCRE 2012), Kingston, ON, Canada (pp. 247-256). Retrieved from https://doi.org/10.1109/WCRE.2012.34Conference paper Lavoie, T., Khomh, F., Merlo, E. & Zou, Y. (2012). Inferring repository file structure modifications using nearest-neighbor clone detection. Paper presented at the 19th Working Conference on Reverse Engineering (WCRE 2012), Kingston, ON, Canada (pp. 325-334). Retrieved from https://doi.org/10.1109/WCRE.2012.42Conference paper Gauthier, F. & Merlo, E. (2012). Investigation of access control models with formal concept analysis: A case study. Paper presented at the 16th European Conference on Software Maintenance and Reengineering (CSMR 2012), Szeged, Hungary (pp. 397-402). Retrieved from https://doi.org/10.1109/CSMR.2012.50Conference paper Ouellet, M., Merlo, E. & Sozen, N. (2012). Locating features in dynamically configured avionics software. Paper presented at the 34th International Conference on Software Engineering (ICSE 2012), Zurich, Switzerland (pp. 1453-1454). Retrieved from https://doi.org/10.1109/ICSE.2012.6227068Conference paper Letarte, D., Gauthier, F., Merlo, E., Sutyanyong, N. & Zuzarte, C. (2012). Targeted genetic test SQL generation for the DB2 database. Paper presented at the 5th International Workshop on Testing Database Systems (DBTest 2012), Scottsdale, Arizona, USA. Retrieved from https://doi.org/10.1145/2304510.2304517
- 2011
Conference paper Lavoie, T. & Merlo, E. (2011). Automated type-3 clone oracle using Levenshtein metric. Paper presented at the 5th International Workshop on Software Clones (IWSC 2011), in conjunction with the 33rd ACM/IEEE International Conference on Software Engineering (ICSE 2011), Waikiki, Honolulu, HI, United states (pp. 34-40). Retrieved from https://doi.org/10.1145/1985404.1985411Conference paper Gauthier, F., Letarte, D., Lavoie, T. & Merlo, E. (2011). Extraction and comprehension of moodle's access control model: A case study. Paper presented at the 9th Annual International Conference on Privacy, Security and Trust, Montréal, Québec. Retrieved from https://doi.org/10.1109/PST.2011.5971962Conference paper Letarte, D., Gauthier, F. & Merlo, E. (2011). Security model evolution of PHP web applications. Paper presented at the 4th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2011), Berlin, Germany (pp. 289-298). Retrieved from https://doi.org/10.1109/ICST.2011.36
- 2010
Conference paper Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (2010). Advanced clone-analysis to support object-oriented system refactoring. Paper presented at the 17th Working Conference on Reverse Engineering (WCRE 2010), Beverly, Massachusetts, USA. Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=%26arnumber=5645476Conference paper Lavoie, T., Eilers-Smith, M. & Merlo, E. (2010). Challenging cloning related problems with GPU-based algorithms. Paper presented at the 4th International Workshop on Software Clones (IWSC 2010), in conjunction with the 32nd ACM/IEEE International Conference on Software Engineering (ICSE 2010), Cape Town, South africa (pp. 25-32). Retrieved from https://doi.org/10.1145/1808901.1808905
- 2009
Conference paper Merlo, E. & Lavoie, T. (2009). Computing structural types of clone syntactic blocks. Paper presented at the 16th Working Conference on Reverse Engineering, Lille, France (pp. 274-278). Retrieved from https://doi.org/10.1109/WCRE.2009.33Conference paper Letarte, D. & Merlo, E. (2009). Extraction of inter-procedural simple role privilege models from PHP code. Paper presented at the 16th Working Conference on Reverse Engineering, Lille, France (pp. 187-191). Retrieved from https://doi.org/10.1109/WCRE.2009.32
- 2007
Conference paper Merlo, E., Letarte, D. & Antoniol, G. (2007). Automated protection of php applications against SQL-injection attacks. Paper presented at the 11th European Conference on Software Maintenance and Reengineering (CSMR 2007), Amsterdam, Netherlands (pp. 191-200). Retrieved from https://doi.org/10.1109/CSMR.2007.16Conference paper Antoniol, G., Guéhéneuc, Y.-G., Merlo, E. & Tonella, P. (2007). Mining the lexicon used by programmers during software evolution. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 2007), Paris, France (pp. 14-23). Retrieved from https://doi.org/10.1109/ICSM.2007.4362614Conference paper Merlo, E., Letarte, D. & Antoniol, G. (2007). SQL-injection security evolution analysis in PHP. Paper presented at the 9th IEEE International Symposium on Web Site Evolution (WSE 2007), Paris, France (pp. 45-49). Retrieved from https://doi.org/10.1109/WSE.2007.4380243
- 2006
Conference paper Bouktif, S., Antoniol, G., Merlo, E. & Neteler, M. (2006). A feedback based quality assessment to support open source software evolution: the GRASS case study. Paper presented at the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), Philadelphia, PA, USA (pp. 155-165). Retrieved from https://doi.org/10.1109/ICSM.2006.5Conference paper Bouktif, S., Antoniol, G., Merlo, E. & Neteler, M. (2006). A novel approach to optimize clone refactoring activity. Paper presented at the 8th Annual Genetic and Evolutionary Computation Conference (GECCO 2006), Seattle, WA, United States (pp. 1885-1892). Retrieved from https://doi.org/10.1145/1143997.1144312Conference paper Arenas, I.A., Deslauriers, B., Tremblay, J., Brunelle, P.-L., Gossard, F., Gurau, A., Seda, O., Hamet, P., Kotchen, T.A., Cowley, A.W.J., Gaudet, D., Antoniol, G. & Merlo, E. (2006). Dynamic linkage of 192 candidate genes for blood pressure during orthostatic stress in sibpairs from french-canadian familes ascertained by hypertension. Paper presented at the 21st Scientific Meeting of the International Society of Hypertension.Conference paper Seda, O., Tremblay, J., Brunelle, P.-L., Gurau, A., Gossard, F., Hamet, P., Merlo, E., Gaudet, D., Bouchard, G., Jomphe, M., Cowley, A.W., Broeckel, U., Kotchen, T.A., Gagnon, F. & Antoniol, G. (2006). Global haplotype signatures reveal gamma-glutamyl transferase as a genomic marker of hypertension with metalobic syndrome. Paper presented at the 21st Scientific Meeting of the International Society of Hypertension.Conference paper Merlo, E., Letarte, D. & Antoniol, G. (2006). Insider and outsider threat-sensitive SQL injection vulnerability analysis in PHP. Paper presented at the 13th Working Conference on Reverse Engineering (WCRE 2006), Benevento, Italy (pp. 147-156). Retrieved from https://doi.org/10.1109/WCRE.2006.33
- 2005
Conference paper Seda, O., Merlo, E., Tremblay, J., Broeckel, U., Kaldunski, M., Gaudet, D., Bouchard, G., Gagnon, F., Antoniol, G., Brunelle, P.L., Gurau, A., Gossard, F., Kotchen, T.A., Pausova, Z., Orlov, S.N., Wan, R., Jomphe, M., Pintos, J., Cowley, A.W. & Hamet, P. (2005). Hypertension with and without metabolic syndrome presents as distinct clinical and genetic entities in French-Canadians [Abstract]. Paper presented at the European Human Genetics Conference, Prague, Czech Republic. (Published in European Journal of Human Genetics, 13(S1), 314). Retrieved from https://www.eshg.org/fileadmin/www.eshg.org/abstracts/ESHG2005Abstracts.pdf#page=315Conference paper Del Grosso, C., Antoniol, G., Di Penta, M., Galinier, P. & Merlo, E. (2005). Improving network applications security : a new heuristic to generate stress testing data. Paper presented at the 2005 Annual Genetic and Evolutionary Computation Conference (GECCO 2005), Washington, D.C. (pp. 1037-1043). Retrieved from https://doi.org/10.1145/1068009.1068185Conference paper Antoniol, G., Merlo, E., Guéhéneuc, Y.-G. & Sahraoui, H. (2005). On feature traceability in object oriented programs. Paper presented at the 3rd international workshop on Traceability in emerging forms of software engineering (TEFSE 2005), Long Beach, California, USA (pp. 73–78). Retrieved from https://doi.org/10.1145/1107656.1107672
- 2004
Conference paper Antoniol, G., Penta, M.D. & Merlo, E. (2004). An Automatic Approach to identify Class Evolution Discontinuities. Paper presented at the 7th International Workshop on Principles of Software Evolution (IWPSE 2004), Kyoto, Japan (pp. 31-40). Retrieved from https://doi.org/10.1109/IWPSE.2004.1334766Conference paper Merlo, E., Antoniol, G., Penta, M.D. & Rollo, V.F. (2004). Linear complexity object-oriented similarity for clone detection and software evolution analyses. Paper presented at the 20th IEEE International Conference on Software Maintenance (ICSM 2004), Chicago, IL, USA (pp. 412-416). Retrieved from https://doi.org/10.1109/ICSM.2004.1357826
- 2003
Conference paper Merlo, E., Antoniol, G. & Brunelle, P.-L. (2003). Fast flow analysis to compute fuzzy estimates of risk levels. Paper presented at the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), Benevento, Italy (pp. 351-360). Retrieved from https://doi.org/10.1109/CSMR.2003.1192443Conference paper Brunelle, P.-L., Merlo, E. & Antoniol, G. (2003). Investigating Java Type Analyses for the Receiver-Classes Testing Criterion. Paper presented at the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), Denver, CO, USA (pp. 419-429). Retrieved from https://doi.org/10.1109/ISSRE.2003.1251063Conference paper Antoniol, G., Penta, M.D. & Merlo, E. (2003). YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs. Paper presented at the 11th IEEE International Workshop on Program Comprehension (IWPC 2003), Portland, Oregon (pp. 13-22). Retrieved from https://doi.org/10.1109/WPC.2003.1199185
- 2002
Conference paper Penta, M.D., Neteler, M., Antoniol, G. & Merlo, E. (2002). Knowledge-Based Library Re-Factoring for an Open Source Project. Paper presented at the 9th Working Conference on Reverse Engineering (WCRE 2002), Richmond, Virginia (pp. 319-328). Retrieved from https://doi.org/10.1109/WCRE.2002.1173089
- 2001
Conference paper Antoniol, G., Penta, M.D., Casazza, G. & Merlo, E. (2001). A Method to Re-Organize Legacy Systems via Concept Analysis. Paper presented at the 9th International Workshop on Program Comprehension (IWPC 2001), Toronto, Ontario (pp. 281-290). Retrieved from https://doi.org/10.1109/WPC.2001.921738Conference paper Malenfant, B., Antoniol, G., Merlo, E. & Dagenais, M. (2001). Flow analysis to detect blocked statements. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 2001), Florence, Italy (pp. 62-70). Retrieved from https://doi.org/10.1109/ICSM.2001.972712Conference paper Antoniol, G., Villano, U., Penta, M.D., Casazza, G. & Merlo, E. (2001). Identifying Clones in the Linux Kernel. Paper presented at the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), Florence, Italy (pp. 92-99). Retrieved from https://doi.org/10.1109/SCAM.2001.10003Conference paper Antoniol, G., Casazza, G., Penta, M.D. & Merlo, E. (2001). Modeling clones evolution through time series. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 2001), Florence, Italy (pp. 273-280). Retrieved from https://doi.org/10.1109/ICSM.2001.972740Conference paper Penta, M.D., Casazza, G., Antoniol, G. & Merlo, E. (2001). Modeling Web Maintenance Centers through Queue Models. Paper presented at the 5th European Conference on Software Maintenance and Reengineering (CSMR 2001), Lisbon, Portugal (pp. 131-138). Retrieved from https://doi.org/10.1109/.2001.914977Conference paper Antoniol, G., Casazza, G., Lucca, G.A.D., Penta, M.D. & Merlo, E. (2001). Predicting Web Site Access: An Application of Time Series. Paper presented at the 3rd International Workshop on Web Site Evolution (WSE 2001), Florence, Italy (pp. 57-61). Retrieved from https://doi.org/10.1109/WSE.2001.988786
- 2000
Conference paper Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (2000). Advanced clone-analysis to support object-oriented system refactoring. Paper presented at the 7th Working Conference on Reverse Engineering, Brisbane, Qld., Australia (pp. 98-107). Retrieved from https://doi.org/10.1109/WCRE.2000.891457Conference paper Hu, Y., Merlo, E., Dagenais, M. & Lague, B. (2000). C/C++ conditional compilation analysis using symbolic execution. Paper presented at the International Conference on Software Maintenance (ICSM 2000), San Jose, CA, USA (pp. 196-206). Retrieved from https://doi.org/10.1109/ICSM.2000.883045Conference paper Antoniol, G., Canfora, G., Lucia, A.D., Casazza, G. & Merlo, E. (2000). Tracing Object-Oriented Code into Functional Requirements. Paper presented at the 8th International Workshop on Program Comprehension (IWPC 2000), Limerick, Ireland (pp. 79-86). Retrieved from https://doi.org/10.1109/WPC.2000.852482
- 1999
Conference paper Merlo, E. & Antoniol, G. (1999). A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. Paper presented at the Conference on the Centre for Advanced Studies on Collaborative Research (CASCON 1999), Toronto, Ontario (7 pages). Retrieved from http://dl.acm.org/citation.cfm?id=781995.782002Conference paper Lapierre, S., Merlo, E., Savard, G., Antoniol, G., Fiutem, R. & Tonella, P. (1999). Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 1999), Oxford, England (pp. 189-198). Retrieved from https://doi.org/10.1109/ICSM.1999.792607Conference paper Patenaude, J.-F., Merlo, E., Dagenais, M. & Lague, B. (1999). Extending software quality assessment techniques to Java systems. Paper presented at the 7th International Workshop on Program Comprehension (IWPC 1999), Pittsburgh, PA, USA (pp. 49-56). Retrieved from https://doi.org/10.1109/WPC.1999.777743Conference paper Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (1999). Measuring clone based reengineering opportunities. Paper presented at the 6th International Software Metrics Symposium, Boca Raton, Florida (pp. 292-303). Retrieved from https://doi.org/10.1109/METRIC.1999.809750Conference paper Knapen, G., Lague, B., Dagenais, M. & Merlo, E. (1999). Parsing C++ despite missing declarations. Paper presented at the 7th International Workshop on Program Comprehension (IWPC 1999), Pittsburgh, Pennsylvania, USA (pp. 114-125). Retrieved from https://doi.org/10.1109/WPC.1999.777750Conference paper Balazinska, M., Merlo, E., Dagenais, M., Lague, B. & Kontogiannis, K. (1999). Partial redesign of Java software systems based on clone analysis. Paper presented at the 6th Working Conference on Reverse Engineering, Atlanta, Georgia (pp. 326-336). Retrieved from https://doi.org/10.1109/WCRE.1999.806971Conference paper Antoniol, G., Canfora, G., Lucia, A.D. & Merlo, E. (1999). Recovering Code to Documentation Links in OO Systems. Paper presented at the 6th Working Conference on Reverse Engineering (wcre 1999), Atlanta, GA (pp. 136-144). Retrieved from https://doi.org/10.1109/WCRE.1999.806954
- 1998
Conference paper Dagenais, M.R., Merlo, E.M., Laguë, B. & Proulx, D. (1998). Clones occurence in large object oriented software packages. Paper presented at the Conference of the Centre for Advanced Studies on Collaborative Research (CASCON 1998), Toronto, Canada (pp. 192-200). Retrieved from https://dl.acm.org/doi/10.5555/783160.783170
- 1997
Conference paper Tonella, P., Antoniol, G., Fiutem, R. & Merlo, E. (1997). Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing. Paper presented at the 19th international conference on Software engineering (ICSE 1997), Boston, Massachusetts (pp. 433-443). Retrieved from https://doi.org/10.1145/253228.253371Conference paper Laguë, B., Leduc, C., Merlo, E.M. & Dagenais, M.R. (1997). Framework for the analysis of layered software achitectures. Paper presented at the International Workshop on Empirical Studies of Software Maintenance (WESS 1997), Bari, Italy (pp. P14).Conference paper Tonella, P., Antoniol, G., Fiutem, R. & Merlo, E. (1997). Points-to Analysis for Program Understanding. Paper presented at the 5th International Workshop on Program Comprehension (IWPC 1997), Dearborn, MI (pp. 90-99). Retrieved from https://doi.org/10.1109/WPC.1997.601271Conference paper Antoniol, G., Fiutem, R., Lutteri, G., Tonella, P., Zanfei, S. & Merlo, E. (1997). Program Understanding and Maintenance with the CANTO Environment. Paper presented at the IEEE International Conference on Software Maintenance (ICSM 1997), Bari, Italy (pp. 72-81). Retrieved from https://doi.org/10.1109/ICSM.1997.624233Conference paper Tonella, P., Antoniol, G., Fiutem, R. & Merlo, E. (1997). Variable precision reaching definitions analysis for software maintenance. Paper presented at the 1st Euromicro Conference on Software Maintenance and Reengineering (EUROMICRO 1997), Berlin, Germany (pp. 60-67). Retrieved from https://doi.org/10.1109/CSMR.1997.583007
- 1996
Conference paper Fiutem, R., Tonella, P., Antoniol, G. & Merlo, E. (1996). A Cliche-Based Environment to Support Architectural Reverse Engineering. Paper presented at the 4th Working Conference on Reverse Engineering (WCRE 1996), Monterey, CA (pp. 277-286). Retrieved from https://doi.org/10.1109/WCRE.1996.558936Conference paper Fiutem, R., Tonella, P., Antoniol, G. & Merlo, E. (1996). A Cliché-Based Environment to Support Architectural Reverse Engineering. Paper presented at the International Conference on Software Maintenance (ICSM 1996), Monterey, CA (pp. 319-328). Retrieved from https://doi.org/10.1109/ICSM.1996.565035Conference paper Tonella, P., Fiutem, R., Antoniol, G. & Merlo, E. (1996). Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic -A Case Study. Paper presented at the 3rd Working Conference on Reverse Engineering (WCRE 1996), Monterey, CA (pp. 198-207). Retrieved from https://doi.org/10.1109/WCRE.1996.558904Conference paper Fiutem, R., Merlo, E., Antoniol, G. & Tonella, P. (1996). Understanding the architecture of software systems. Paper presented at the 4th Workshop on Program Comprehension (WPC 1996), Berlin, Germany (pp. 187-196). Retrieved from https://doi.org/10.1109/WPC.1996.501133
- 1995
Conference paper Antoniol, G., Fiutem, R., Merlo, E. & Tonella, P. (1995). Application and user interface migration from basic to visual C++. Paper presented at the International Conference on Software Maintenance (ICSM 1995), Nice, France (pp. 76-85). Retrieved from https://doi.org/10.1109/ICSM.1995.526529Conference paper Elwahidi, A.R. & Merlo, E. (1995). Generating user interfaces from specifications produced by a reverse engineering process. Paper presented at the 7th International Workshop on Computer-Aided Software Engineering, Toronto, Ont, CAN. Retrieved from https://doi.org/10.1109/CASE.1995.465304
- 1994
Conference paper Merlo, E. & De Mori, R. (1994). Artificial neural networks for source code informal information analysis. Paper presented at the International Conference on Artificial Neural Networks, Sorrento, Italy (pp. 895-900).Conference paper Merlo, E., Gagné, P.-Y. & Thiboutot, A. (1994). Inference of graphical AUIDL specifications for the reverse engineering of user interfaces. Paper presented at the International Conference on Software Maintenance (ICSM 1994), Victoria, Can (pp. 80-88). Retrieved from https://doi.org/10.1109/ICSM.1994.336787
- 2022
- Book chapters (2)
- 2002
Book chapter Dagenais, M.R., Patenaude, J.-F., Merlo, E. & Laguë, B. (2002). Clones occurence in Java and Modula-3 software systems. In H. Erdogmus & O. Tanir (Eds.), Advances in software engineering (pp. 95-110). Springer. Retrieved from https://doi.org/10.1007/978-0-387-21599-0_5
- 2001
Book chapter Knapen, G., Laguë, B., Dagenais, M.R. & Merlo, E. (2001). Parsing C++ code despite missing declarations (chp. 17). In Advances in Software engineering. Springer. Retrieved from https://doi.org/10.1007/978-0-387-21599-0_17
- 2002
- Reports (10)
- 2012
Report Ouellet, M., Gauthier, F., Merlo, E., Sozen, N. & Gagnon, M. (2012). Mapping features to source code in dynamically configured avionics software (Report No EPM-RT-2012-02). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2796/
- 2011
Report Lavoie, T.M. & Merlo, E. (2011). Levenshtein edit distance-based type III clone detection using metric trees (Report No EPM-RT-2011-01). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2638/
- 2009
Report Merlo, E. & Lavoie, T.M. (2009). Detection of redundant clone relations based on clone subsumption (Report No EPM-RT-2009-05). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2646/
- 2006
Report Merlo, E., Letarte, D. & Antoniol, G. (2006). Insider threat resistant SQL-injection prevention in PHP (Report No EPM-RT-2006-04). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/3138/
- 2004
Report Merlo, E., Desaulniers, B., Antoniol, G., Brunelle, P., Jomphe, M., Bouchard, G., Tremblay, J. & Hamet, P. (2004). Layered founders : a novel approach to investigate the ancestral transmission of complex traits (Report No EPM-RT-2004-05). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/2617/
- 1999
Report Balazinska, M. & Merlo, E. (1999). Redesigning software systems using clone information : technical report (Report No EPM-RT-99-13). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/10102/
- 1997
Report Merlo, E. & Antoniol, G. (1997). Dynamic pointers analysis (Report No EPM-RT-97-07). École Polytechnique de Montréal.
- 1996
Report Mayrand, J. & Merlo, E. (1996). Évaluation de la qualité des logiciels (Report No EPM-RT-96-12). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/9856/
- 1994
Report Merlo, E. (1994). Analysis, representation, and structural and behavioural abstraction for the reverse engineering of user interfaces (Report No EPM-RT-94-06). École Polytechnique de Montréal.
- 1993
Report Merlo, E., McAdam, I. & De Mori, R. (1993). Feed-forward and recurrent neural networks for source code informal information analysis (Report No EPM-RT-93-35). École Polytechnique de Montréal. Retrieved from https://publications.polymtl.ca/9868/
- 2012