default search action
R. Geoff Dromey
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j25]Lian Wen, David Tuffley, R. Geoff Dromey:
Formalizing the transition from requirements' change to design change using an evolutionary traceability model. Innov. Syst. Softw. Eng. 10(3): 181-202 (2014) - 2011
- [j24]Toby Myers, R. Geoff Dromey, Peter Fritzson:
Comodeling: From Requirements to an Integrated Software/Hardware Model. Computer 44(4): 62-70 (2011)
2000 – 2009
- 2009
- [j23]Lian Wen, R. Geoff Dromey, Diana Kirk:
Software Engineering and Scale-Free Networks. IEEE Trans. Syst. Man Cybern. Part B 39(3): 648-657 (2009) - [j22]Lian Wen, R. Geoff Dromey, Diana Kirk:
Software Engineering and Scale-Free Networks. IEEE Trans. Syst. Man Cybern. Part B 39(4): 845-854 (2009) - [c29]Toby Myers, R. Geoff Dromey:
From Requirements to Embedded Software - Formalising the Key Steps. Australian Software Engineering Conference 2009: 23-33 - [c28]Kirsten Winter, Robert Colvin, R. Geoff Dromey:
Dynamic Relational Behaviour for Large-Scale Systems. Australian Software Engineering Conference 2009: 173-182 - 2008
- [c27]Toby Myers, Peter Fritzson, R. Geoff Dromey:
Seamlessly Integrating Software & Hardware Modelling for Large-Scale Systems. EOOLT 2008: 5-15 - 2007
- [c26]Lian Wen, Diana Kirk, R. Geoff Dromey:
Software Systems as Complex Networks. IEEE ICCI 2007: 106-115 - [c25]Saad Zafar, Robert Colvin, Kirsten Winter, Nisansala Yatapanage, R. Geoff Dromey:
Early Validation and Verification of a Distributed Role-Based Access Control Model. APSEC 2007: 430-437 - [c24]R. Geoff Dromey:
Engineering Large-Scale Software-Intensive Systems. ASWEC 2007: 4-6 - [c23]Lian Wen, Robert Colvin, Kai Lin, John Seagrott, Nisansala Yatapanage, R. Geoff Dromey:
"Integrare", a Collaborative Environment for Behavior-Oriented Design. CDVE 2007: 122-131 - [c22]Kai Lin, David Chen, Chengzheng Sun, R. Geoff Dromey:
Leveraging Single-User Microsoft Visio for Multi-user Real-Time Collaboration. CDVE 2007: 353-360 - [c21]Kai Lin, David Chen, R. Geoff Dromey, Steven Xia, Chengzheng Sun:
API design recommendations for facilitating conversion of single-user applications into collaborative applications. CollaborateCom 2007: 309-317 - [c20]Kai Lin, David Chen, R. Geoff Dromey, Chengzheng Sun:
Maintaining constraints expressed as formulas in collaborative systems. CollaborateCom 2007: 318-327 - [c19]Lian Wen, Diana Kirk, R. Geoff Dromey:
A tool to visualize behavior and design evolution. IWPSE 2007: 114-115 - 2006
- [j21]R. Geoff Dromey:
Climbing over the "No Silver Bullet" Brick Wall. IEEE Softw. 23(2): 118-120 (2006) - [c18]Kai Lin, David Chen, R. Geoff Dromey, Chengzheng Sun:
Multi-way Dataflow Constraint Propagation in Real-time Collaborative Systems. CollaborateCom 2006 - 2005
- [c17]Saad Zafar, R. Geoff Dromey:
Integrating Safety and Security Requirements into Design of an Embedded System. APSEC 2005: 629-636 - [c16]Kai Lin, David Chen, Chengzheng Sun, R. Geoff Dromey:
A Constraint Maintenance Strategy and Applications in Real-Time Collaborative Environments. CDVE 2005: 103-110 - [c15]Kai Lin, David Chen, R. Geoff Dromey, Chengzheng Sun:
Maintaining multi-way dataflow constraints in collaborative systems. CollaborateCom 2005 - [c14]Kai Lin, David Chen, Chengzheng Sun, R. Geoff Dromey:
Maintaining Constraints in Collaborative Graphic Systems: the CoGSE Approach. ECSCW 2005: 185-204 - [c13]Cesar Gonzalez-Perez, Brian Henderson-Sellers, R. Geoff Dromey:
A Metamodel for the Behavior Trees Modelling Technique. ICITA (1) 2005: 35-39 - [c12]Lian Wen, R. Geoff Dromey:
Architecture Normalization for Component-based Systems. FACS 2005: 335-348 - 2004
- [c11]Cameron Smith, Kirsten Winter, Ian J. Hayes, R. Geoff Dromey, Peter A. Lindsay, David A. Carrington:
An Environment for Building a System out of its Requirements. ASE 2004: 398-399 - [c10]Lian Wen, R. Geoff Dromey:
From Requirements Change to Design Change: A Formal Path. SEFM 2004: 104-113 - 2003
- [j20]R. Geoff Dromey:
Software Quality-Prevention versus Cure? Softw. Qual. J. 11(3): 197-210 (2003) - [c9]R. Geoff Dromey:
Genetic Design: Amplifying Our Ability to Deal With Requirements Complexity. Scenarios: Models, Transformations and Tools 2003: 95-108 - [c8]R. Geoff Dromey:
Architecture as an Emergent Property of Requirements Integration. STRAW 2003: 77-84 - [c7]R. Geoff Dromey:
From Requirements to Design: Formalizing the Key Steps. SEFM 2003: 2- - 2002
- [c6]Zoran Milosevic, R. Geoff Dromey:
On Expressing and Monitoring Behaviour in Contracts. EDOC 2002: 3-14
1990 – 1999
- 1998
- [c5]R. Geoff Dromey:
Software Design: In Search of Method. Australian Software Engineering Conference 1998: 32-45 - 1996
- [j19]Si Pan, R. Geoff Dromey:
Re-engineering Loops. Comput. J. 39(3): 184-202 (1996) - [j18]Si Pan, R. Geoff Dromey:
A Formal Basis for Removing Goto Statements. Comput. J. 39(3): 203-214 (1996) - [j17]David Billington, R. Geoff Dromey:
The Co-invariant Generator: An Aid in Deriving Loop Bodies. Formal Aspects Comput. 8(1): 108-126 (1996) - [j16]R. Geoff Dromey:
Cornering the Chimera. IEEE Softw. 13(1): 33-43 (1996) - [c4]Si Pan, R. Geoff Dromey:
Beyond Structured Programming. ICSE 1996: 268-277 - 1995
- [j15]R. Geoff Dromey:
A Model for Software Product Quality. IEEE Trans. Software Eng. 21(2): 146-162 (1995) - 1994
- [c3]R. Geoff Dromey:
Software Quality and Productivity Improvement. Software Quality and Productivity 1994: 10-26 - [c2]B. K. Oliver, R. Geoff Dromey:
SAFE: A Programming Language for Software Quality. Software Quality and Productivity 1994: 227-230 - [c1]Si Pan, R. Geoff Dromey:
Using Strongest Postconditions to Improve Software Quality. Software Quality and Productivity 1994: 235-240 - 1990
- [j14]R. Geoff Dromey, T. A. Chorvat:
Structure Clashes - An Alternative to Program Inversion. Comput. J. 33(2): 126-132 (1990)
1980 – 1989
- 1989
- [b1]R. Geoff Dromey:
Program derivation - the development of programs from specifications. International computer science series, Addison-Wesley 1989, ISBN 978-0-201-41624-4, pp. I-XVI, 1-630 - 1988
- [j13]R. Geoff Dromey:
Systematic Program Development. IEEE Trans. Software Eng. 14(1): 12-29 (1988) - 1987
- [j12]R. Geoff Dromey:
Derivation of Sorting Algorithms from a Specification. Comput. J. 30(6): 512-518 (1987) - 1986
- [j11]R. Geoff Dromey:
An Algorithm for The Selection Problem. Softw. Pract. Exp. 16(11): 981-986 (1986) - 1985
- [j10]R. Geoff Dromey:
Program Development by Inductive Stepwise Refinement. Softw. Pract. Exp. 15(1): 1-28 (1985) - [j9]R. Geoff Dromey:
Forced Termination of Loops. Softw. Pract. Exp. 15(1): 29-39 (1985) - 1984
- [j8]R. Geoff Dromey:
Exploiting Partial Order with Quicksort. Softw. Pract. Exp. 14(6): 509-518 (1984) - 1980
- [j7]Thomas A. Bailey, R. Geoff Dromey:
Fast String Searching by Finding Subkeys in Subtext. Inf. Process. Lett. 11(3): 130-133 (1980)
1970 – 1979
- 1979
- [j6]R. Geoff Dromey:
A Fast Algorithm for Text Comparison. Aust. Comput. J. 11(2): 63-67 (1979) - [j5]R. Geoff Dromey:
A Linked-Path Connection Table with Substructural Atom-Ordering. J. Chem. Inf. Comput. Sci. 19(1): 37-42 (1979) - 1978
- [j4]R. Geoff Dromey:
A Compact Free-Keyword File Structure for Author-Title-Keyword Searching. An Application to an NMR Bibliographic Database. J. Chem. Inf. Comput. Sci. 18(3): 160-162 (1978) - [j3]R. Geoff Dromey:
A Structural Molecular Formula for Flexible and Efficient Substructure Searching of Large Databases. J. Chem. Inf. Comput. Sci. 18(3): 163-168 (1978) - [j2]R. Geoff Dromey:
A Compact and Efficient File Structure for Searching Large Generic-Keyed Databases. An Application to Mass Spectral Data. J. Chem. Inf. Comput. Sci. 18(4): 222-225 (1978) - [j1]R. Geoff Dromey:
A Simple Tree-Structured Line Formula Notation for Representing Molecular Topology. J. Chem. Inf. Comput. Sci. 18(4): 225-234 (1978)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint