default search action
Dimitri Van Landuyt
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Dimitri Van Landuyt, Vincent Wijshoff, Wouter Joosen:
A study of NoSQL query injection in Neo4j. Comput. Secur. 137: 103590 (2024) - [c83]Dimitri Van Landuyt, Marie Levrau, Vincent Reniers, Wouter Joosen:
An E-Commerce Benchmark for Evaluating Performance Trade-Offs in Document Stores. DaWaK 2024: 284-290 - [c82]Nicolas Boltz, Sinem Getir Yaman, Paola Inverardi, Rogério de Lemos, Dimitri Van Landuyt, Andrea Zisman:
Human empowerment in self-adaptive socio-technical systems. SEAMS@ICSE 2024: 200-206 - [c81]Dimitri Van Landuyt, David Halasz, Stef Verreydt, Danny Weyns:
Towards Understanding Trust in Self-adaptive Systems. SEAMS@ICSE 2024: 207-213 - [c80]Dimitri Van Landuyt, Laurens Sion, Walewein Philips, Wouter Joosen:
From automation to CI/CD: a comparative evaluation of threat modeling tools. SecDev 2024: 35-45 - 2023
- [c79]Konstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis, Antonio F. Skarmeta, Jesús Garcia, Angel Palomares, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis, Sokratis Vavilis:
An inclusive Lifecycle Approach for IoT Devices Trust and Identity Management. ARES 2023: 98:1-98:6 - [c78]Michiel Provoost, Danny Weyns, Dimitri Van Landuyt, Sam Michiels, Tomás Bures:
Joint Learning: A Pattern for Reliable and Efficient Decision-Making in Self-Adaptive Internet of Things. EuroPLoP 2023: 9:1-9:9 - [c77]Laurens Sion, Dimitri Van Landuyt, Pierre Dewitte, Peggy Valcke, Wouter Joosen:
Demonstration of the DPMF for Data Protection Analysis. MoDELS (Companion) 2023: 75-79 - [c76]Dimitri Van Landuyt, Julien Benaouda, Vincent Reniers, Ansar Rafique, Wouter Joosen:
A Comparative Performance Evaluation of Multi-Model NoSQL Databases and Polyglot Persistence. SAC 2023: 286-293 - [c75]Stef Verreydt, Dimitri Van Landuyt, Wouter Joosen:
Expressive and Systematic Risk Assessments with Instance-Centric Threat Models. SAC 2023: 1450-1457 - [c74]Omid Mirzamohammadi, Kristof Jannes, Laurens Sion, Dimitri Van Landuyt, Aysajan Abidin, Dave Singelée:
Security and Privacy Threat Analysis for Solid. SecDev 2023: 196-206 - 2022
- [j17]Dimitri Van Landuyt, Wouter Joosen:
A descriptive study of assumptions in STRIDE security threat modeling. Softw. Syst. Model. 21(6): 2311-2328 (2022) - [c73]Dimitri Van Landuyt, Wouter Joosen:
A Systematic Survey of Architectural Approaches and Trade-Offs in Data De-identification. ECSA 2022: 66-82 - [c72]Konstantinos Loupos, Christos Kalogirou, Harris Niavis, Antonio F. Skarmeta, Elena Torroglosa-García, Angel Palomares, Hui Song, Paul-Emmanuel Brun, Francesca Giampaolo, Dimitri Van Landuyt, Sam Michiels, Blaz Podgorelec, Christos Xenakis, Michail Bampatsikos, Konstantinos Krilakis:
A Holistic Approach for IoT Networks' Identity and Trust Management - The ERATOSTHENES Project. GIOTS 2022: 338-347 - 2021
- [j16]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Thread-level resource consumption control of tenant custom code in a shared JVM for multi-tenant SaaS. Future Gener. Comput. Syst. 115: 351-364 (2021) - [j15]Ansar Rafique, Dimitri Van Landuyt, Emad Heydari Beni, Bert Lagaisse, Wouter Joosen:
CryptDICE: Distributed data protection system for secure cloud data storage and computation. Inf. Syst. 96: 101671 (2021) - [c71]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
An Overview of Runtime Data Protection Enforcement Approaches. EuroS&P Workshops 2021: 351-358 - [c70]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Shared memory protection in a multi-tenant JVM. MPLR 2021: 1-15 - [c69]Dimitri Van Landuyt, Liliana Pasquale, Laurens Sion, Wouter Joosen:
Threat modeling at run time: the case for reflective and adaptive threat management (NIER track). SEAMS@ICSE 2021: 203-209 - [c68]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Stef Verreydt, Wouter Joosen:
Automated Threat Analysis and Management in a Continuous Integration Pipeline. SecDev 2021: 30-37 - [c67]Oleksandr Tomashchuk, Dimitri Van Landuyt, Wouter Joosen:
The architectural divergence problem in security and privacy of eHealth IoT product lines. SPLC (A) 2021: 114-119 - [c66]Casper Claesen, Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
A YCSB Workload for Benchmarking Hotspot Object Behaviour in NoSQL Databases. TPCTC 2021: 1-16 - 2020
- [j14]Eddy Truyen, Nane Kratzke, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Managing Feature Compatibility in Kubernetes: Vendor Comparison and Analysis. IEEE Access 8: 228420-228439 (2020) - [j13]Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Peggy Valcke, Wouter Joosen:
DPMF: A Modeling Framework for Data Protection by Design. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 15: 10:1-10:53 (2020) - [c65]Oleksandr Tomashchuk, Yuan Li, Dimitri Van Landuyt, Wouter Joosen:
Operationalization of Privacy and Security Requirements for eHealth IoT Applications in the Context of GDPR and CSL. APF 2020: 143-160 - [c64]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
A Workload-Driven Document Database Schema Recommender (DBSR). ER 2020: 471-484 - [c63]Dimitri Van Landuyt, Laurens Sion, Pierre Dewitte, Wouter Joosen:
The Bigger Picture: Approaches to Inter-organizational Data Protection Impact Assessment. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 283-293 - [c62]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
The Never-Ending Story: On the Need for Continuous Privacy Impact Assessment. EuroS&P Workshops 2020: 314-317 - [c61]Koen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen:
Threat modeling: from infancy to maturity. ICSE (NIER) 2020: 9-12 - [c60]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Alexander van Den Berghe, Wouter Joosen:
Security Threat Modeling: Are Data Flow Diagrams Enough? ICSE (Workshops) 2020: 254-257 - [c59]Vincent Reniers, Yuan Gao, Ren Zhang, Paolo Viviani, Akash Madhusudan, Bert Lagaisse, Svetla Nikova, Dimitri Van Landuyt, Riccardo Lombardi, Bart Preneel, Wouter Joosen:
Authenticated and auditable data sharing via smart contract. SAC 2020: 324-331 - [c58]Dimitri Van Landuyt, Wouter Joosen:
A descriptive study of assumptions made in LINDDUN privacy threat elicitation. SAC 2020: 1280-1287 - [i1]Eddy Truyen, Dimitri Van Landuyt, Davy Preuveneers, Bert Lagaisse, Wouter Joosen:
A Comprehensive Feature Comparison Study of Open-Source Container Orchestration Frameworks. CoRR abs/2002.02806 (2020)
2010 – 2019
- 2019
- [j12]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
Object to NoSQL Database Mappers (ONDM): A systematic survey and comparison of frameworks. Inf. Syst. 85: 1-20 (2019) - [j11]Ansar Rafique, Dimitri Van Landuyt, Eddy Truyen, Vincent Reniers, Wouter Joosen:
SCOPE: self-adaptive and policy-based data management middleware for federated clouds. J. Internet Serv. Appl. 10(1): 2:1-2:19 (2019) - [c57]Dimitri Van Landuyt, Luuk Raaijmakers, Ansar Rafique, Wouter Joosen:
Continuous and Client-centric Trust Monitoring in Multi-cloud Storage. CLOSER 2019: 100-110 - [c56]Dimitri Van Landuyt, Laurens Sion, Emiel Vandeloo, Wouter Joosen:
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 195-203 - [c55]Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Ivo Emanuilov, Peggy Valcke, Wouter Joosen:
An Architectural View for Data Protection by Design. ICSA 2019: 11-20 - [c54]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Thread-Level CPU and Memory Usage Control of Custom Code in Multi-tenant SaaS. ICSOC 2019: 267-282 - [c53]Eddy Truyen, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Performance overhead of container orchestration frameworks for management of multi-tenant database deployments. SAC 2019: 156-159 - [c52]Vincent Reniers, Dimitri Van Landuyt, Paolo Viviani, Bert Lagaisse, Riccardo Lombardi, Wouter Joosen:
Analysis of architectural variants for auditable blockchain-based private data sharing. SAC 2019: 346-354 - [c51]Pierre Dewitte, Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Ivo Emanuilov, Peggy Valcke, Wouter Joosen:
A comparison of system description models for data protection by design. SAC 2019: 1512-1515 - [c50]Laurens Sion, Dimitri Van Landuyt, Kim Wuyts, Wouter Joosen:
Privacy Risk Assessment for Data Subject-Aware Threat Modeling. IEEE Symposium on Security and Privacy Workshops 2019: 64-71 - [c49]Kim Wuyts, Laurens Sion, Dimitri Van Landuyt, Wouter Joosen:
Knowledge is Power: Systematic Reuse of Privacy Knowledge for Threat Elicitation. IEEE Symposium on Security and Privacy Workshops 2019: 80-83 - [c48]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Journal first presentation of a comparative study of workflow customization strategies: quality implications for multi-tenant SaaS. SPLC (A) 2019: 7:1 - [c47]Oleksandr Tomashchuk, Dimitri Van Landuyt, Daniel Pletea, Kim Wuyts, Wouter Joosen:
A Data Utility-Driven Benchmark for De-identification Methods. TrustBus 2019: 63-77 - 2018
- [j10]Wito Delnat, Thomas Heyman, Wouter Joosen, Davy Preuveneers, Ansar Rafique, Eddy Truyen, Dimitri Van Landuyt:
K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact). Dagstuhl Artifacts Ser. 4(1): 03:1-03:6 (2018) - [j9]Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
PERSIST: Policy-Based Data Management Middleware for Multi-Tenant SaaS Leveraging Federated Cloud Storage. J. Grid Comput. 16(2): 165-194 (2018) - [j8]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
A comparative study of workflow customization strategies: Quality implications for multi-tenant SaaS. J. Syst. Softw. 144: 423-438 (2018) - [j7]Ansar Rafique, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the Performance Impact of Data Access Middleware for NoSQL Data Stores A Study of the Trade-Off between Performance and Migration Cost. IEEE Trans. Cloud Comput. 6(3): 843-856 (2018) - [c46]Eddy Truyen, Matt Bruzek, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Evaluation of Container Orchestration Systems for Deploying and Managing NoSQL Database Clusters. IEEE CLOUD 2018: 468-475 - [c45]Laurens Sion, Kim Wuyts, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Interaction-Based Privacy Threat Elicitation. EuroS&P Workshops 2018: 79-86 - [c44]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment. ICSA Companion 2018: 89-92 - [c43]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Risk-based design security analysis. SEAD@ICSE 2018: 11-18 - [c42]Wito Delnat, Eddy Truyen, Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
K8-scalar: a workbench to compare autoscalers for container-orchestrated database clusters. SEAMS@ICSE 2018: 33-39 - [c41]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. ICSE (Companion Volume) 2018: 290-291 - [c40]Majid Makki, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen, Nick Hofstede:
Transparent IO access control for application-level tenant isolation. SAC 2018: 143-150 - [c39]Kim Wuyts, Dimitri Van Landuyt, Aram Hovsepyan, Wouter Joosen:
Effective and efficient privacy threat modeling through domain refinements. SAC 2018: 1175-1178 - [c38]Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Solution-aware data flow diagrams for security threat modeling. SAC 2018: 1425-1432 - 2017
- [j6]Vincent Reniers, Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
Object-NoSQL Database Mappers: a benchmark study on the performance overhead. J. Internet Serv. Appl. 8(1): 1:1-1:16 (2017) - [c37]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
Schema design support for semi-structured data: Finding the sweet spot between NF and De-NF. IEEE BigData 2017: 2921-2930 - [c36]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Towards PaaS Offering of BPMN 2.0 Engines: A Proposal for Service-Level Tenant Isolation. ESOCC Workshops 2017: 5-19 - [c35]Ansar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen:
Towards an Adaptive Middleware for Efficient Multi-Cloud Data Storage. CCB@EuroSys 2017: 4:1-4:6 - [c34]Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Towards a Platform for Empirical Software Design Studies. ECASE@ICSE 2017: 3-7 - [c33]Dimitri Van Landuyt, Fatih Gey, Eddy Truyen, Wouter Joosen:
Middleware for Dynamic Upgrade Activation and Compensations in Multi-tenant SaaS. ICSOC 2017: 340-348 - [c32]Ansar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen:
Towards scalable and dynamic data encryption for multi-tenant SaaS. SAC 2017: 411-416 - [c31]Ansar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen:
Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaS. TrustCom/BigDataSE/ICESS 2017: 885-892 - [c30]Vincent Reniers, Dimitri Van Landuyt, Ansar Rafique, Wouter Joosen:
On the State of NoSQL Benchmarks. ICPE Companion 2017: 107-112 - 2016
- [c29]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Automated regression testing of BPMN 2.0 processes: a capture and replay framework for continuous delivery. GPCE 2016: 178-189 - [c28]Fatih Gey, Dimitri Van Landuyt, Wouter Joosen:
Evolving multi-tenant SaaS applications through self-adaptive upgrade enactment and tenant mediation. SEAMS@ICSE 2016: 151-157 - [c27]Eddy Truyen, Dimitri Van Landuyt, Vincent Reniers, Ansar Rafique, Bert Lagaisse, Wouter Joosen:
Towards a container-based architecture for multi-tenant SaaS applications. ARM@Middleware 2016: 6:1-6:6 - [c26]Majid Makki, Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Scalable and manageable customization of workflows in multi-tenant SaaS offerings. SAC 2016: 432-439 - [c25]Majid Makki, Dimitri Van Landuyt, Wouter Joosen:
Automated workflow regression testing for multi-tenant SaaS: integrated support in self-service configuration dashboard. A-TEST@SIGSOFT FSE 2016: 70-73 - [c24]Laurens Sion, Dimitri Van Landuyt, Wouter Joosen, Gjalt de Jong:
Systematic quality trade-off support in the software product-line configuration process. SPLC 2016: 164-173 - [c23]Laurens Sion, Dimitri Van Landuyt, Koen Yskout, Wouter Joosen:
Towards systematically addressing security variability in software product lines. SPLC 2016: 342-343 - 2015
- [j5]Stefan Walraven, Dimitri Van Landuyt, Ansar Rafique, Bert Lagaisse, Wouter Joosen:
PaaSHopper: Policy-driven middleware for multi-PaaS environments. J. Internet Serv. Appl. 6(1): 2:1-2:14 (2015) - [c22]Ansar Rafique, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
Policy-Driven Data Management Middleware for Multi-cloud Storage in Multi-tenant SaaS. BDC 2015: 78-84 - [c21]Maarten Decat, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the Need for Federated Authorization in Cross-organizational e-Health Platforms. HEALTHINF 2015: 540-545 - [c20]Dimitri Van Landuyt, Wouter Joosen:
On the Role of Early Architectural Assumptions in Quality Attribute Scenarios: A Qualitative and Quantitative Study. TwinPeaks@ICSE 2015: 9-15 - [c19]Fatih Gey, Dimitri Van Landuyt, Wouter Joosen, Viviane Jonckers:
Continuous Evolution of Multi-tenant SaaS Applications: A Customizable Dynamic Adaptation Approach. PESOS@ICSE 2015: 10-16 - [c18]Arnaud Schoonjans, Dimitri Van Landuyt, Bert Lagaisse, Wouter Joosen:
On the suitability of black-box performance monitoring for SLA-driven cloud provisioning scenarios. ARM@Middleware 2015: 6:1-6:6 - [c17]Aram Hovsepyan, Dimitri Van Landuyt:
Prototizer: Agile on Steroids. FlexMDE@MoDELS 2015: 51-60 - [c16]Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Variability middleware for multi-tenant SaaS applications: a research roadmap for service lines. SPLC 2015: 211-215 - [c15]Ansar Rafique, Dimitri Van Landuyt, Wouter Joosen:
Expressive Data Storage Policies for Multi-cloud Storage Configurations. SYNASC 2015: 329-336 - [c14]Fatih Gey, Dimitri Van Landuyt, Wouter Joosen:
Middleware for Customizable Multi-staged Dynamic Upgrades of Multi-tenant SaaS Applications. UCC 2015: 102-111 - [c13]Stefan Walraven, Wouter De Borger, Bart Van Brabant, Bert Lagaisse, Dimitri Van Landuyt, Wouter Joosen:
Adaptive Performance Isolation Middleware for Multi-tenant SaaS. UCC 2015: 112-121 - 2014
- [j4]Stefan Walraven, Dimitri Van Landuyt, Eddy Truyen, Koen Handekyn, Wouter Joosen:
Efficient customization of multi-tenant Software-as-a-Service applications with service lines. J. Syst. Softw. 91: 48-62 (2014) - [c12]Dimitri Van Landuyt, Wouter Joosen:
Modularizing Early Architectural Assumptions in Scenario-Based Requirements. FASE 2014: 170-184 - [c11]Fatih Gey, Dimitri Van Landuyt, Stefan Walraven, Wouter Joosen:
Feature Models at Run Time: Feature Middleware for Multi-tenant SaaS applications. Models@run.time 2014: 21-30 - [c10]Aram Hovsepyan, Dimitri Van Landuyt, Steven Op de beeck, Sam Michiels, Wouter Joosen, Gustavo Rangel, Javier Fernandez Briones, Jan Depauw:
Model-Driven Software Development of Safety-Critical Avionics Systems: an Experience Report. MD2P2@MoDELS 2014: 28-37 - [c9]Dimitri Van Landuyt, Steven Op de beeck, Aram Hovsepyan, Sam Michiels, Wouter Joosen, Sven Meynckens, Gjalt de Jong, Olivier Barais, Mathieu Acher:
Towards managing variability in the safety design of an automotive hall effect sensor. SPLC 2014: 304-309 - 2013
- [c8]Maarten Decat, Bert Lagaisse, Dimitri Van Landuyt, Bruno Crispo, Wouter Joosen:
Federated Authorization for Software-as-a-Service Applications. OTM Conferences 2013: 342-359 - [c7]Fatih Gey, Stefan Walraven, Dimitri Van Landuyt, Wouter Joosen:
Building a Customizable Business-Process-as-a-Service Application with Current State-of-Practice. SC@STAF 2013: 113-127 - [e1]Walter Cazzola, Sebastián González, Dimitri Van Landuyt, Philippe Lahire:
Proceedings of the 4th international workshop on Variability & composition, VariComp@AOSD 2013, Fukuoka, Japan, March 26, 2013. ACM 2013, ISBN 978-1-4503-1867-9 [contents] - 2012
- [j3]Dimitri Van Landuyt, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-Driven Discovery of Stable Abstractions for Pointcut Interfaces. LNCS Trans. Aspect Oriented Softw. Dev. 9: 1-52 (2012) - [c6]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
On the modularity impact of architectural assumptions. NEMARA@AOSD 2012: 13-16 - [c5]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
Documenting Early Architectural Assumptions in Scenario-Based Requirements. WICSA/ECSA 2012: 329-333 - 2011
- [b1]Dimitri Van Landuyt:
On Robust and Reusable Interfaces in Aspect-Oriented Software Architectures (Robuuste en herbruikbare interfaces in aspectgeoriënteerde architecturen). Katholieke Universiteit Leuven, Belgium, 2011 - [j2]Dimitri Van Landuyt, Steven Op de beeck, Eddy Truyen, Pierre Verbaeten:
Building a Digital Publishing Platform Using AOSD - Experiences and Lessons Learned. LNCS Trans. Aspect Oriented Softw. Dev. 8: 163-195 (2011) - 2010
- [j1]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
Discovery of Stable Abstractions for Aspect-Oriented Composition in the Car Crash Management Domain. LNCS Trans. Aspect Oriented Softw. Dev. 7: 375-422 (2010)
2000 – 2009
- 2009
- [c4]Dimitri Van Landuyt, Steven Op de beeck, Eddy Truyen, Wouter Joosen:
Domain-driven discovery of stable abstractions for pointcut interfaces. AOSD 2009: 75-86 - [c3]Dimitri Van Landuyt, Eddy Truyen, Wouter Joosen:
Automating the discovery of stable domain abstractions for reusable aspects. EA@ICSE 2009: 1-7 - 2008
- [c2]Steven Op de beeck, Dimitri Van Landuyt, Eddy Truyen, Pierre Verbaeten:
A domain-specific middleware layer using AOSD: next-generation digital news publishing. Middleware (Companion) 2008: 78-81 - 2007
- [c1]Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt, Yolande Berbers, Wouter Joosen:
Comparative Evaluation of Converged Service-Oriented Architectures. AINA Workshops (1) 2007: 989-994
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint