default search action
Jean-Pierre Corriveau
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Rahbar Ahsan, Wei Shi, Jean-Pierre Corriveau:
Network intrusion detection using machine learning approaches: Addressing data imbalance. IET Cyper-Phys. Syst.: Theory & Appl. 7(1): 30-39 (2022) - [c44]Macarious Abadeer, Wei Shi, Jean-Pierre Corriveau:
FLightNER: A Federated Learning Approach to Lightweight Named-Entity Recognition. TrustCom 2022: 687-694
2010 – 2019
- 2018
- [c43]Mengfei Peng, Wei Shi, Jean-Pierre Corriveau:
Repairing Faulty Nodes and Locating a Dynamically Spawned Black Hole Search Using Tokens. CNS 2018: 1-9 - 2017
- [j10]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
Comparison of approaches of geographic partitioning for data anonymization. J. Geogr. Syst. 19(3): 221-248 (2017) - [j9]Wei Shi, Michel Barbeau, Jean-Pierre Corriveau, Joaquín García-Alfaro, Meng Yao:
Secure Localization in the Presence of Colluders in WSNs. Sensors 17(8): 1892 (2017) - [c42]Jean-Pierre Corriveau, Leo Lyu, Riham S. Elhabyan, Wei Shi:
MCSA: A multi-criteria shuffling algorithm for the MapReduce framework. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [j8]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
Location-based anonymization: comparison and evaluation of the Voronoi-based aggregation system. Int. J. Geogr. Inf. Sci. 30(11): 2253-2275 (2016) - [j7]Mengfei Peng, Wei Shi, Jean-Pierre Corriveau, Richard W. Pazzi, Yang Wang:
Black hole search in computer networks: State-of-the-art, challenges and future directions. J. Parallel Distributed Comput. 88: 1-15 (2016) - [c41]Andrew Wylie, Wei Shi, Jean-Pierre Corriveau, Yang Wang:
A Scheduling Algorithm for Hadoop MapReduce Workflows with Budget Constraints in the Heterogeneous Cloud. IPDPS Workshops 2016: 1433-1442 - [c40]Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft:
Faulty Node Repair and Dynamically Spawned Black Hole Search. SecureComm 2016: 144-162 - 2015
- [c39]Wei Shi, Yang Wang, Jean-Pierre Corriveau, Boqiang Niu, William Lee Croft, Mengfei Peng:
Smart Shuffling in MapReduce: A Solution to Balance Network Traffic and Workloads. UCC 2015: 35-44 - [i2]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
Geographic Partitioning Techniques for the Anonymization of Health Care Data. CoRR abs/1505.06786 (2015) - [i1]William Lee Croft, Wei Shi, Jörg-Rüdiger Sack, Jean-Pierre Corriveau:
A Novel Geographic Partitioning System for Anonymizing Health Care Data. CoRR abs/1505.06939 (2015) - 2014
- [j6]Wei Shi, Jean-Pierre Corriveau, Jacob Agar:
Dead Reckoning Using Play Patterns in a Simple 2D Multiplayer Online Game. Int. J. Comput. Games Technol. 2014: 138596:1-138596:18 (2014) - [j5]Wei Shi, Joaquín García-Alfaro, Jean-Pierre Corriveau:
Searching for a black hole in interconnected networks using mobile agents and tokens. J. Parallel Distributed Comput. 74(1): 1945-1958 (2014) - 2013
- [c38]Matthew Shelley, Wei Shi, Jean-Pierre Corriveau:
On Preventing Sequence Breaking in Video Games. NetGames 2013: 10:1-10:2 - 2012
- [j4]Wei Shi, Michel Barbeau, Joaquín García-Alfaro, Jean-Pierre Corriveau:
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 17(1-2): 87-102 (2012) - [c37]Wei Shi, Meng Yao, Jean-Pierre Corriveau:
Resilient Secure Localization and Detection of Colluding Attackers in WSNs. ADHOC-NOW 2012: 181-192 - [c36]Jacob Agar, Jean-Pierre Corriveau, Wei Shi:
Play patterns for path prediction in multiplayer online games. CHINACOM 2012: 12-17 - 2011
- [c35]Vojislav D. Radonjic, Soheila Bashardoust-Tajali, Jean-Pierre Corriveau, Dave Arnold:
A scenario and design pattern based tool for modeling and evaluating implementations of event-based reactive systems. DEBS 2011: 383-384 - [c34]Jean-Pierre Corriveau, Soheila Bashardoust-Tajali, Vojislav D. Radonjic:
Requirements verification in the presence of variability. MoDRE 2011: 74-78 - [c33]Soheila Bashardoust-Tajali, Vojislav D. Radonjic, Jean-Pierre Corriveau:
Challenges of Variability in Model-Driven and Transformational Approaches: A Systematic Survey. WICSA 2011: 294-301 - 2010
- [c32]Dave Arnold, Jean-Pierre Corriveau, Wei Shi:
Scenario-Based Validation: Beyond the User Requirements Notation. Australian Software Engineering Conference 2010: 75-84 - [c31]Jean-Pierre Corriveau, Wei Shi:
Teaching strategies to millenial students. Future Play 2010: 143-150 - [c30]Wei Shi, Jean-Pierre Corriveau:
A Comprehensive Review of Sensor Relocation. GreenCom/CPSCom 2010: 780-785 - [c29]David Arnold, Jean-Pierre Corriveau, Wei Shi:
Reconciling Offshore Outsourcing with Model Based Testing. SEAFOOD 2010: 6-22 - [c28]Dave Arnold, Jean-Pierre Corriveau, Wei Shi:
Modeling and Validating Requirements Using Executable Cotnracts and Scenarios. SERA 2010: 311-320 - [c27]Dave Arnold, Jean-Pierre Corriveau, Wei Shi:
Validation Against Actual Behavior: Still a Challenge for Testing Tools. Software Engineering Research and Practice 2010: 212-218 - [c26]Wei Shi, Michel Barbeau, Jean-Pierre Corriveau:
Detection of the Evil ring attack in wireless sensor networks using cross verification. WOWMOM 2010: 1-6
2000 – 2009
- 2009
- [j3]Khaled El Emam, Fida Kamal Dankar, Romeo Issa, Elizabeth Jonker, Daniel Amyot, Elise Cogo, Jean-Pierre Corriveau, Mark Walker, Sadrul Chowdhury, Regis Vaillancourt, Tyson Roffey, Jim Bottomley:
Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data. J. Am. Medical Informatics Assoc. 16(5): 670-682 (2009) - 2008
- [c25]Soheila Bashardoust-Tajali, Jean-Pierre Corriveau:
On Extracting Tests from a Testable Model in the Context of Domain Engineering. ICECCS 2008: 98-107 - [c24]Dave Arnold, Jean-Pierre Corriveau:
Automated Instrumentation of Contracts and Scenarios for Requirements Validation in .NET. AST 2008: 63-66 - [c23]Dave Arnold, Jean-Pierre Corriveau:
Modeling Enhanced Scenarios for Automated Instrumentation. SERA 2008: 290-297 - 2007
- [c22]Hao Chen, Jean-Pierre Corriveau:
Security Features and Technologies for E-business Architecture Design. IMECS 2007: 1150-1156 - [c21]Dave Arnold, Jean-Pierre Corriveau, Vojislav D. Radonjic:
Open framework for conformance testing via scenarios. OOPSLA Companion 2007: 775-776 - [c20]Jean-Pierre Corriveau:
Testable Requirements for Offshore Outsourcing. SEAFOOD 2007: 27-43 - 2005
- [c19]Jean-Pierre Corriveau, Bo Tian, Vojislav D. Radonjic:
On Facilitating the Reuse of C++ Graph Libraries. IASTED Conf. on Software Engineering 2005: 7-12 - [c18]Dave Arnold, Toby McClean, Jean-Pierre Corriveau, Vojislav D. Radonjic:
Constraints in C# using the OCL 2.0. IASTED Conf. on Software Engineering 2005: 325-330 - [c17]Vojislav D. Radonjic, Jean-Pierre Corriveau:
Making Patterns Better Design Tools: Requirements Analysis for a Family of Navigators for Design Pattern Catalogs. IASTED Conf. on Software Engineering 2005: 349-354 - 2004
- [c16]Wei Shi, Jean-Pierre Corriveau:
An Executable Model for a Family of Election Algorithms. IPDPS 2004 - [c15]Wei Shi, Jean-Pierre Corriveau:
System family engineering for leader election in ring topology. Parallel and Distributed Computing and Networks 2004: 398-403 - [c14]Juan Pablo Zamora Zapata, Francis Bordeleau, Jean-Pierre Corriveau:
Validation of Platform Specific Models against Platform Independent Models in the Context of Standard Specifications: A Model Driven Architecture Approach. Software Engineering Research and Practice 2004: 200-206 - 2001
- [j2]Walid S. Saba, Jean-Pierre Corriveau:
Plausible Reasoning and the Resolution of Quantifier Scope Ambiguities. Stud Logica 67(2): 271-289 (2001) - [c13]Francis Bordeleau, Jean-Pierre Corriveau:
On the Importance of Inter-scenario Relationships in Hierarchical State Machine Design. FASE 2001: 156-170 - 2000
- [c12]Francis Bordeleau, Jean-Pierre Corriveau, Bran Selic:
A Scenario-Based Approach to Hierarchical State Machine Design. ISORC 2000: 78-85
1990 – 1999
- 1997
- [c11]Walid S. Saba, Jean-Pierre Corriveau:
A Pragmatic Treatment of Quantification in Natural Language. AAAI/IAAI 1997: 610-615 - [c10]Walid S. Saba, Jean-Pierre Corriveau:
Quantification and Commonsense Reasoning. AAAI/IAAI 1997: 844 - 1996
- [j1]Jean-Pierre Corriveau:
Traceability Process for Large OO Projects. Computer 29(9): 63-68 (1996) - 1995
- [c9]Jean-Pierre Corriveau:
A time-constrained architecture for cognition. HICSS (3) 1995: 13-22 - [c8]Walid S. Saba, Jean-Pierre Corriveau:
Quantification and Cognitive Constraints in Natural Language Understanding. SBIA 1995: 333-342 - 1994
- [c7]Vojislav D. Radonjic, Moshe Krieger, Jean-Pierre Corriveau:
A response oriented paradigm for software engineering. CASCON 1994: 58 - [c6]Jean-Pierre Corriveau, Craig Hayashi:
A Strategy for Realizing Traceability in an Object-Oriented Design Environment. CAST 1994: 191-204 - [c5]Jean-Pierre Corriveau:
On the Design of a Concurrent Object-Oriented Spreading Activation Architecture. HICSS (3) 1994: 73-81 - [c4]Greg Adams, Jean-Pierre Corriveau:
Capturing Object Interactions. TOOLS (13) 1994: 283-292 - 1993
- [c3]Wilf R. LaLonde, John R. Pugh, Paul White, Jean-Pierre Corriveau:
Towards unifying analysis, design, and implementation in object-oriented environments. CASCON 1993: 563-569 - [c2]Jean-Pierre Corriveau, Bill Macready:
On Driving and Monitoring Smalltalk-80 Applications Using Unix Spreadsheets. ICCI 1993: 534-538 - [c1]Jean-Pierre Corriveau, Larry Williams:
On the Evolution of a Framework for the ObjecTime Toolset. TOOLS (11) 1993: 337-349 - 1991
- [b1]Jean-Pierre Corriveau:
Time-constrained memory for reader-based text comprehension. University of Toronto, Canada, 1991
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint