default search action
Malcolm Munro
Person information
- affiliation: Durham University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c100]Abdullah Sheikh, Malcolm Munro, David Budgen:
Cost and Effect of Using Scheduling Security Model in a Cloud Environment. CSCloud/EdgeCom 2019: 95-101 - 2018
- [j45]Samer Hanna, Malcolm Munro:
Test case generation for semantic-based user input validation of web applications. Int. J. Web Eng. Technol. 13(3): 225-254 (2018) - [c99]Abdullah Sheikh, Malcolm Munro, David Budgen:
SSM: Scheduling Security Model for a Cloud Environment. ICCBDC 2018: 11-15 - 2014
- [c98]Mohammed Basheri, Malcolm Munro:
Enhancing the quality of software design through multi-touch interfaces. FIE 2014: 1-7 - 2013
- [c97]Mohammed Basheri, Liz Burd, Malcolm Munro, Nilufar Baghaei:
Enhancing Engagement and Collaborative Learning Skills in Multi-touch Software for UML Diagramming. CSCL (2) 2013: 223-224 - 2012
- [j44]Ling Liu, Malcolm Munro:
Systematic analysis of centralized online reputation systems. Decis. Support Syst. 52(2): 438-449 (2012) - 2011
- [j43]Xiaofeng Du, Malcolm Munro, William Song:
CbSSDF: A Two-Layer Conceptual Graph Approach to Web Services Description and Composition - A Scenario Based Solution Analysis and Comparison with OWL-S. Int. J. Inf. Syst. Model. Des. 2(4): 82-103 (2011) - [j42]Gerardo Canfora, Darren Dalcher, David Raffo, Victor R. Basili, Juan Fernández-Ramil, Václav Rajlich, Keith H. Bennett, Liz Burd, Malcolm Munro, Sophia Drossopoulou, Barry W. Boehm, Susan Eisenbach, Greg Michaelson, Peter Ross, Paul Wernick, Dewayne E. Perry:
In memory of Manny Lehman, 'Father of Software Evolution'. J. Softw. Maintenance Res. Pract. 23(3): 137-144 (2011) - [c96]Shengchao Qin, Aziem Chawdhary, Wei Xiong, Malcolm Munro, Zongyan Qiu, Huibiao Zhu:
Towards an Axiomatic Verification System for JavaScript. TASE 2011: 133-141 - 2010
- [j41]William Song, Xiaofeng Du, Malcolm Munro:
A conceptual graph approach to semantic similarity computation method for e-service discovery. Int. J. Knowl. Eng. Data Min. 1(1): 50-68 (2010) - [c95]Mohammad Abdallah, Malcolm Munro, Keith B. Gallagher:
Certifying software robustness using program slicing. ICSM 2010: 1-2 - [c94]Deren Chen, S. Han, Malcolm Munro, Aijaz Soomro, William Song:
An Analytic Model of Atomic Service for Services Descriptions. ICSS 2010: 197-202 - [c93]Ling Liu, Malcolm Munro, William Song:
Evaluation of Collecting Reviews in Centralized Online Reputation Systems. WEBIST (2) 2010: 281-286
2000 – 2009
- 2009
- [j40]Abdullah M. Alnajim, Malcolm Munro:
Detecting Phishing Websites: On the Effectiveness of Users' Tips. J. Digit. Inf. Manag. 7(5): 277-282 (2009) - [c92]Abdullah M. Alnajim, Malcolm Munro:
An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection. INCoS 2009: 105-112 - [c91]Xiaofeng Du, William Wei Song, Malcolm Munro:
CbSSDF and OWL-S: A Scenario-Based Solution Analysis and Comparison. ISD 2009: 3-14 - [c90]Abdullah M. Alnajim, Malcolm Munro:
An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. ITNG 2009: 405-410 - 2008
- [j39]Keith B. Gallagher, Andrew Hatch, Malcolm Munro:
Software Architecture Visualization: An Evaluation Framework and Its Application. IEEE Trans. Software Eng. 34(2): 260-270 (2008) - [c89]Abdullah M. Alnajim, Malcolm Munro:
An evaluation of users' tips effectiveness for Phishing websites detection. ICDIM 2008: 63-68 - [c88]Xiaofeng Du, William Song, Malcolm Munro:
A Method for Transforming Existing Web Service Descriptions into an Enhanced Semantic Web Service Framework. ISD 2008: 217-226 - [c87]Samer Hanna, Malcolm Munro:
Fault-Based Web Services Testing. ITNG 2008: 471-476 - [c86]Abdullah M. S. Alaraj, Malcolm Munro:
An Efficient e-Commerce Fair Exchange Protocol That Encourages Customer and Merchant to Be Honest. SAFECOMP 2008: 193-206 - 2007
- [j38]Nik Looker, Jie Xu, Malcolm Munro:
Determining the dependability of Service-Oriented Architectures. Int. J. Simul. Process. Model. 3(1/2): 88-97 (2007) - [c85]Samer Hanna, Malcolm Munro:
An Approach for Specification-based Test Case Generation for Web Services. AICCSA 2007: 16-23 - [c84]Abdullah M. S. Alaraj, Malcolm Munro:
An efficient fair exchange protocol that enforces the merchant to be honest. CollaborateCom 2007: 196-202 - [c83]Abdullah M. S. Alaraj, Malcolm Munro:
An e-Commerce fair exchange protocol for exchanging digital products and payments. ICDIM 2007: 248-253 - [c82]Xiaofeng Du, William Song, Malcolm Munro:
Semantic Service Description Framework for Address. ISD (2) 2007: 1033-1045 - [c81]Samer Hanna, Malcolm Munro:
An Approach for WSDL-Based Automated Robustness Testing of Web Services. ISD (2) 2007: 1093-1104 - 2006
- [j37]Sid L. Huff, P. Michael Maher, Malcolm Munro:
Information Technology and the Board of Directors: Is There an IT Attention Deficit? MIS Q. Executive 5(2): 3 (2006) - [c80]Xiaofeng Du, William Song, Malcolm Munro:
Semantics Recognition in Service Composition Using Conceptual Graph. IAT Workshops 2006: 295-298 - [c79]Suhaimi Ibrahim, Norbik Bashah Idris, Malcolm Munro, Aziz Deraman:
A Software Traceability Validation For Change Impact Analysis of Object Oriented Software. Software Engineering Research and Practice 2006: 453-459 - 2005
- [j36]Suhaimi Ibrahim, Norbik Bashah Idris, Malcolm Munro, Aziz Deraman:
Integrating Software Traceability for Change Impact Analysis. Int. Arab J. Inf. Technol. 2(4): 301-308 (2005) - [c78]Nik Looker, Malcolm Munro, Jie Xu:
Increasing Web Service Dependability Through Consensus Voting. COMPSAC (2) 2005: 66-69 - [c77]Nik Looker, Malcolm Munro, Jie Xu:
A Comparison of Network Level Fault Injection with Code Insertion. COMPSAC (1) 2005: 479-484 - [c76]Suhaimi Ibrahim, Norbik Bashah Idris, Malcolm Munro, Aziz Deraman:
Implementing a Document-based Requirements Traceability: A Case Study. IASTED Conf. on Software Engineering 2005: 124-131 - [c75]Nik Looker, Liz Burd, S. Drummond, Jie Xu, Malcolm Munro:
Pedagogic data as a basis for Web service fault models. SOSE 2005: 117-125 - [c74]Keith B. Gallagher, Andrew Hatch, Malcolm Munro:
A Framework for Software Architecture Visualization Assessment. VISSOFT 2005: 76-81 - [c73]Michael Philip Smith, Malcolm Munro:
Identifying Structural Features of Java Programs by Analysing the Interaction of Classes at Runtime. VISSOFT 2005: 108-113 - [c72]Nik Looker, Malcolm Munro, Binka Gwynne, Jie Xu:
An Ontology-Based Approach for Determining the Dependability of Service-Oriented Architectures. WORDS 2005: 171-178 - 2004
- [j35]Mark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang, David W. Binkley, Sebastian Danicic, Mohammed Daoudi, Lahcen Ouarbya:
Syntax-Directed Amorphous Slicing. Autom. Softw. Eng. 11(1): 27-61 (2004) - [j34]Robert M. Davison, Malcolm Munro, Detmar W. Straub:
Introduction to the AIS Code of Research Conduct. Commun. Assoc. Inf. Syst. 13: 1 (2004) - [j33]Nicolas Gold, Claire Knight, Andrew Mohan, Malcolm Munro:
Understanding Service-Oriented Software. IEEE Softw. 21(2): 71-77 (2004) - [c71]Nik Looker, Malcolm Munro, Jie Xu:
WS-FIT: A Tool for Dependability Analysis of Web Services. COMPSAC Workshops 2004: 120-123 - 2003
- [j32]Joey F. George, Robert M. Davison, Jon Heales, Malcolm Munro:
Report of the Ad Hoc Committee on Member Misconduct to the AIS Council. Commun. Assoc. Inf. Syst. 11: 2 (2003) - [j31]Simon C. Shaw, Michael Goldstein, Malcolm Munro, Elizabeth Burd:
Moral Dominance Relations for Program Comprehension. IEEE Trans. Software Eng. 29(9): 851-863 (2003) - [c70]Stuart M. Charters, Nigel Thomas, Malcolm Munro:
The end of the line for Software Visualisation? VISSOFT 2003: 110-112 - 2002
- [j30]Mark Harman, Malcolm Munro, Lin Hu, Xingyuan Zhang:
Source code analysis and manipulation. Inf. Softw. Technol. 44(13): 717-720 (2002) - [c69]Keith H. Bennett, Malcolm Munro, Jie Xu, Nicolas Gold, Paul J. Layzell, Nikolay Mehandjiev, David Budgen, Pearl Brereton:
Prototype Implementations of an Architectural Model for Service-Based Flexible Software. HICSS 2002: 76 - [c68]Mark Harman, Lin Hu, Robert M. Hierons, Malcolm Munro, Xingyuan Zhang, José Javier Dolado, Mari Carmen Otero, Joachim Wegener:
A Post-Placement Side-Effect Removal Algorithm. ICSM 2002: 2-11 - [c67]Paul Townend, Jie Xu, Malcolm Munro:
Building Embedded Fault-Tolerant Systems for Critical Applications: An Experimental Study. DIPES 2002: 101-112 - [c66]Claire Knight, Malcolm Munro:
Program Comprehension Experiences with GXL; Comprehension for Comprehension. IWPC 2002: 147-156 - [c65]Xingyuan Zhang, Malcolm Munro, Mark Harman, Lin Hu:
Mechanized Operational Semantics of WSL. SCAM 2002: 73-82 - [c64]Mark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang, Sebastian Danicic, Mohammed Daoudi, Lahcen Ouarbya:
An Interprocedural Amorphous Slicer for WSL. SCAM 2002: 105-114 - [c63]Stuart M. Charters, Claire Knight, Nigel Thomas, Malcolm Munro:
Visualisation for informed decision making; from code to components. SEKE 2002: 765-772 - [c62]Xingyuan Zhang, Malcolm Munro, Mark Harman, Lin Hu:
Weakest Precondition for General Recursive Programs Formalized in Coq. TPHOLs 2002: 332-348 - [c61]Christopher M. B. Taylor, Malcolm Munro:
Revision Towers. VISSOFT 2002: 43-50 - [c60]Michael Philip Smith, Malcolm Munro:
Runtime Visualisation of Object Oriented Software. VISSOFT 2002: 81 - 2001
- [j29]Frank P. A. Coolen, Michael Goldstein, Malcolm Munro:
Generalized partition testing via Bayes linear methods. Inf. Softw. Technol. 43(13): 783-793 (2001) - [j28]Yoon Kyu Jang, Malcolm Munro, Yong Rae Kwon:
An improved method of selecting regression tests for C++ programs. J. Softw. Maintenance Res. Pract. 13(5): 331-350 (2001) - [c59]Keith H. Bennett, Jie Xu, Malcolm Munro, Zhuang Hong, Paul J. Layzell, Nicolas Gold, David Budgen, Pearl Brereton:
An Architectural Model for Service-Based Flexible Software. COMPSAC 2001: 137-142 - [c58]Claire Knight, Malcolm Munro:
Towards automatic adaptation of data interfaces. HCI 2001: 78-82 - [c57]Claire Knight, Malcolm Munro:
Visualisations; Functionality and Interaction. International Conference on Computational Science (2) 2001: 470-475 - [c56]Keith H. Bennett, Malcolm Munro, Nicolas Gold, Paul J. Layzell, David Budgen, Pearl Brereton:
An Architectural Model for Service-Based Software with Ultra Rapid Evolution. ICSM 2001: 292-300 - [c55]Claire Knight, Malcolm Munro:
Mediating Diverse Visualisations for Comprehension. IWPC 2001: 18-25 - [c54]Mark Harman, Malcolm Munro, Lin Hu, Xingyuan Zhang:
Side-Effect Removal Transformation. IWPC 2001: 310-319 - [c53]Claire Knight, Malcolm Munro:
Organisational Trails through Software Systems. IWPSE 2001: 150-153 - [c52]Mark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang:
GUSTT: An Amorphous Slicing System which Combines Slicing and Transformation. WCRE 2001: 271-280 - [c51]Paul Townend, Jie Xu, Malcolm Munro:
Building Dependable Software for Critical Applications: Multi-Version Software versus One Good Version. WORDS 2001: 103-110 - 2000
- [j27]Elizabeth Burd, Malcolm Munro:
Supporting program comprehension using dominance trees. Ann. Softw. Eng. 9: 193-213 (2000) - [j26]Barbara L. Marcolin, Deborah Compeau, Malcolm Munro, Sid L. Huff:
Assessing User Competence: Conceptualization and Measurement. Inf. Syst. Res. 11(1): 37-60 (2000) - [j25]Elizabeth Burd, Malcolm Munro:
Using evolution to evaluate reverse engineering technologies: mapping the process of software change. J. Syst. Softw. 53(1): 43-51 (2000) - [c50]Keith H. Bennett, Paul J. Layzell, David Budgen, Pearl Brereton, Linda A. Macaulay, Malcolm Munro:
Service-based software: the future for flexible software. APSEC 2000: 214-221 - [c49]Claire Knight, Malcolm Munro:
Virtual but Visible Software. IV 2000: 198-205 - [c48]Claire Knight, Malcolm Munro:
Should Users Inhabit Visualizations? WETICE 2000: 43-50 - [c47]Nigel Thomas, Malcolm Munro, Peter J. B. King, Rob Pooley:
Visual representation of stochastic process algebra models. Workshop on Software and Performance 2000: 18-19
1990 – 1999
- 1999
- [j24]Pearl Brereton, David Budgen, Keith H. Bennett, Malcolm Munro, Paul J. Layzell, Linda A. Macaulay, David Griffiths, Charles Stannett:
The Future of Software. Commun. ACM 42(12): 78-84 (1999) - [j23]Keith H. Bennett, Magnus Ramage, Malcolm Munro:
Decision model for legacy systems. IEE Proc. Softw. 146(3): 153-159 (1999) - [j22]Ishbel Duncan, Dave Robson, Malcolm Munro:
Test-Case Development During OO Lifecycle and Evolution. J. Object Oriented Program. 11(9): 36-40, 44 (1999) - [c46]Oh-Cheon Kwon, Gyu-Sang Shin, Cornelia Boldyreff, Malcolm Munro:
Maintenance with Reuse: An Integrated Approach Based on Software Configuration Management. APSEC 1999: 507-515 - [c45]Elizabeth Burd, Malcolm Munro:
Evaluating the Use of Dominance Trees for C and COBOL. ICSM 1999: 401-410 - [c44]Claire Knight, Malcolm Munro:
Comprehension with[in] Virtual Environment Visualisations. IWPC 1999: 4-11 - [c43]Paul Warren, Cornelia Boldyreff, Malcolm Munro:
The Evolution of Websites. IWPC 1999: 178-185 - [c42]Elizabeth Burd, Malcolm Munro:
An Initial Approach towards Measuring and Characterizing Software Evolution. WCRE 1999: 168-174 - [p1]Peter Young, Malcolm Munro:
3D Software Visualisation. Visual Representations and Interpretations 1999: 341-350 - 1998
- [j21]Oh-Cheon Kwon, Cornelia Boldyreff, Malcolm Munro:
Software Configuration Management for a Reusable Software Library within a Software Maintenance Environment. Int. J. Softw. Eng. Knowl. Eng. 8(4): 483-515 (1998) - [j20]Gerardo Canfora, Andrea De Lucia, Malcolm Munro:
An integrated environment for reuse reengineering C code. J. Syst. Softw. 42(2): 153-164 (1998) - [j19]Elizabeth Burd, Malcolm Munro:
A method for the identification of reusable units through the reengineering of legacy code. J. Syst. Softw. 44(2): 121-134 (1998) - [j18]Peter R. Newsted, Sid L. Huff, Malcolm Munro:
Survey Instruments in Information Systems. MIS Q. 22(4) (1998) - [c41]Elizabeth Burd, Malcolm Munro:
Reengineering Support for Software Evolution: An Evaluation through Case Study. COMPSAC 1998: 212-217 - [c40]James Ingham, Malcolm Munro:
Applying a Domain Specific Language Approach to Component Oriented Programming. ECOOP Workshops 1998: 161-162 - [c39]Elizabeth Burd, Malcolm Munro:
Investigating Component-Based Maintenance and the Effect of Software Evolution: A Reengineering Approach Using Data Clustering. ICSM 1998: 199-207 - [c38]Peter Young, Malcolm Munro:
Visualizing Software in Virtual Reality. IWPC 1998: 19-26 - [c37]Elizabeth Burd, Malcolm Munro:
Assisting Human Understanding to Aid the Targeting of Necessary Reengineering Work. WCRE 1998: 2-9 - 1997
- [j17]Malcolm Munro, Sid L. Huff, Barbara L. Marcolin, Deborah Compeau:
Understanding and measuring user competence. Inf. Manag. 33(1): 45-57 (1997) - [c36]Elizabeth Burd, Malcolm Munro:
Investigating the Maintenance Implications of the Replication of Code. ICSM 1997: 322- - [c35]Elizabeth Burd, Malcolm Munro:
Enriching Program Comprehension for Software Reuse. WPC 1997: 130-137 - [c34]Pui-Shan Chan, Malcolm Munro:
PUI: A Tool to Support Program Understanding. WPC 1997: 192-198 - [c33]Elizabeth Burd, Malcolm Munro:
The Implications of Non-Functional Requirements for the Reengineering of Legacy Code. WCRE 1997: 215- - 1996
- [j16]Aniello Cimitile, Andrea De Lucia, Malcolm Munro:
A Specification Driven Slicing Process for Identifying Reusable Functions. J. Softw. Maintenance Res. Pract. 8(3): 145-178 (1996) - [j15]Aniello Cimitile, Malcolm Munro:
An Improved Algorithm for Identifying Objects in Code. Softw. Pract. Exp. 26(1): 25-48 (1996) - [c32]In Sang Chung, Malcolm Munro, Wan Kwon Lee, Yong Rae Kwon:
Applying Conventional Testing Techniques for Class Testing. COMPSAC 1996: 447-454 - [c31]Elizabeth Burd, Malcolm Munro, Clazien D. Wezeman:
Analysing Large COBOL Programs: the extraction of reusable modules. ICSM 1996: 238-243 - [c30]Malcolm Munro, Paul J. Layzell, David Griffiths, Pearl Brereton:
Software Maintenance for 2005. ICSM 1996: 370- - [c29]Andrea De Lucia, Anna Rita Fasolino, Malcolm Munro:
Understanding Function Behaviors through Program Slicing. WPC 1996: 9-10 - [c28]Cornelia Boldyreff, Elizabeth Burd, R. M. Hather, Malcolm Munro, E. J. Younger:
Greater Understanding Through Maintainer Driven Traceability. WPC 1996: 100- - [c27]Gerardo Canfora, Andrea De Lucia, Malcolm Munro:
An Integrated Environment for Reuse Reengineering C Code. SEKE 1996: 214-221 - [c26]Elizabeth Burd, Malcolm Munro, Clazien D. Wezeman:
Extracting Reusable Modules from Legacy Code: Considering the Issues of Module Granularity. WCRE 1996: 189- - 1995
- [c25]Aniello Cimitile, Andrea De Lucia, Malcolm Munro:
Identifying reusable functions using specification driven program slicing: a case study. ICSM 1995: 124-133 - [c24]Cornelia Boldyreff, Elizabeth Burd, R. M. Hather, Richard Eric Mortimer, Malcolm Munro, E. J. Younger:
The AMES approach to application understanding: a case study. ICSM 1995: 182-191 - [c23]Aniello Cimitile, Andrea De Lucia, Malcolm Munro:
Qualifying Reusable Functions Using Symbolic Execution. WCRE 1995 - [c22]Helen M. Edwards, Malcolm Munro:
Deriving a Logical Data Model for a System Using the RECAST Method. WCRE 1995 - 1994
- [j14]Miriam A. M. Capretz, Malcolm Munro:
Software configuration management issues in the maintenance of existing systems. J. Softw. Maintenance Res. Pract. 6(1): 1-14 (1994) - [j13]Richard J. Turver, Malcolm Munro:
An early impact analysis technique for software maintenance. J. Softw. Maintenance Res. Pract. 6(1): 35-52 (1994) - [j12]Gerardo Canfora, Aniello Cimitile, Malcolm Munro:
RE2: Reverse-engineering and reuse re-engineering. J. Softw. Maintenance Res. Pract. 6(2): 53-72 (1994) - [c21]David A. Kinloch, Malcolm Munro:
Understanding C Programs Using the Combined C Graph Representation. ICSM 1994: 172-180 - [c20]Jean-Pierre Queille, Jean-Francois Voidrot, Norman Wilde, Malcolm Munro:
The Impact Analysis Task in Software Maintenance: A Model and a Case Study. ICSM 1994: 234-242 - [c19]Gerardo Canfora, Aniello Cimitile, Maria Tortorella, Malcolm Munro:
A Precise Method for Identifying Reusable Abstract Data Types in Code. ICSM 1994: 404-413 - [c18]Aniello Cimitile, Maria Tortorella, Malcolm Munro:
Program comprehension through the identification of abstract data types. WPC 1994: 12-19 - [e1]Janice I. DeGross, Sid L. Huff, Malcolm Munro:
Proceedings of the Fifteenth International Conference on Information Systems, Vancouver, British Columbia, Canada, December 14-17, 1994. Association for Information Systems 1994 [contents] - 1993
- [c17]Helen M. Edwards, Malcolm Munro:
RECAST: Reverse Engineering from COBOL to SSADM Specification. ICSE 1993: 499-508 - [c16]Helen M. Edwards, Malcolm Munro:
Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method. ICSM 1993: 162-171 - [c15]Gerardo Canfora, Aniello Cimitile, Malcolm Munro, C. J. Taylor:
Extracting Abstract Data Types from C Programs: A Case Study. ICSM 1993: 200-209 - [c14]Gerardo Canfora, Aniello Cimitile, Malcolm Munro, Maria Tortorella:
Experiments in identifying reusable abstract data types in program code. WPC 1993: 36-45 - [c13]David A. Kinloch, Malcolm Munro:
A combined representation for the maintenance of C programs. WPC 1993: 119-127 - [c12]Helen M. Edwards, Malcolm Munro:
RECAST: Reverse Engineering from COBOL to SSADM Specifications. WCRE 1993: 44-53 - [c11]Gerardo Canfora, Aniello Cimitile, Malcolm Munro:
A Reverse Engineering Method for Identifying Reusable Abstract Data Types. WCRE 1993: 73-82 - 1992
- [c10]Robert M. Freeman, Malcolm Munro:
Redocumentation for the maintenance of software. ACM Southeast Regional Conference 1992: 413-416 - [c9]Miriam A. M. Capretz, Malcolm Munro:
COMFORM-a software maintenance method based on the software configuration management discipline. ICSM 1992: 183-192 - [c8]Sid L. Huff, Malcolm Munro, Barbara L. Marcolin:
Modelling and measuring end user sophistication. SIGCPR 1992: 1-10 - 1991
- [j11]D. J. Robson, Keith H. Bennett, Barry J. Cornelius, Malcolm Munro:
Approaches to program comprehension. J. Syst. Softw. 14(2): 79-84 (1991) - [j10]Rachel J. Kenning, Simon D. Cooper, Robert M. Freeman, David S. Hinley, Malcolm Munro:
Report on the fourth European software maintenance workshop. J. Softw. Maintenance Res. Pract. 3(1): 45-56 (1991) - 1990
- [c7]Rachel J. Kenning, Malcolm Munro:
Understanding the configurations of operational systems. ICSM 1990: 20-27
1980 – 1989
- 1989
- [j9]Barry J. Cornelius, Malcolm Munro, D. J. Robson:
An approach to software maintenance education. Softw. Eng. J. 4(4): 233-236 (1989) - [j8]Simon D. Cooper, Rachel J. Kenning, Frank W. Calliss, Malcolm Munro:
Report on 2nd UK software maintenance workshop. ACM SIGSOFT Softw. Eng. Notes 14(5): 124-127 (1989) - [c6]Barry J. Cornelius, Malcolm Munro, D. J. Robson:
Project Work in Software Maintenance Education. CSEE 1989: 16-25 - [c5]Simon D. Cooper, Malcolm Munro:
Software change information for maintenance management. ICSM 1989: 279-287 - [c4]Martin Ward, Frank W. Calliss, Malcolm Munro:
The Maintainer's Assistant [software tool]. ICSM 1989: 307-315 - 1988
- [j7]Sid L. Huff, Malcolm Munro, Barbara H. Martin:
Growth Stages of End User Computing. Commun. ACM 31(5): 542-550 (1988) - [j6]Malcolm Munro, Sid L. Huff, Gary Moore:
Expansion and Control of End-User Computing. J. Manag. Inf. Syst. 4(3): 5-27 (1988) - [j5]Frank W. Calliss, Malcolm Munro:
The first UK software maintenance workshop. ACM SIGSOFT Softw. Eng. Notes 13(3): 52-53 (1988) - [c3]Nigel T. Fletton, Malcolm Munro:
Redocumenting software systems using hypertext technology. ICSM 1988: 54-59 - [c2]Frank W. Calliss, M. Khalil, Malcolm Munro, Martin Ward:
A knowledge-based system for software maintenance. ICSM 1988: 319-324 - 1985
- [j4]Sid L. Huff, Malcolm Munro:
Information Technology Assessment and Adoption: A Field Study. MIS Q. 9(4): 327-340 (1985) - [c1]Malcolm Munro, Sid L. Huff:
Information technology assessment and adoption: understanding the information centre role. SIGCPR 1985: 29-37 - 1981
- [j3]Niv Ahituv, Malcolm Munro, Yair Wand:
The value of information in information analysis. Inf. Manag. 4(3): 143-150 (1981) - 1980
- [j2]Malcolm Munro, Basil R. Wheeler:
Planning, Critical Success Factors, and Management's Information Requirements. MIS Q. 4(4): 27-38 (1980)
1970 – 1979
- 1977
- [j1]Malcolm Munro, Gordon B. Davis:
Determining Management Information Needs: A Comparison of Methods. MIS Q. 1(2): 55-67 (1977)
Coauthor Index
aka: Liz Burd
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint