default search action
Victor L. Winter
Person information
- affiliation: University of Nebraska Omaha, NE, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c42]Michèlle Friend, Andrew W. Swift, Betty Love, Victor Winter:
A Wolf in Lamb's Clothing: Computer Science in a Mathematics Course. SIGCSE (1) 2023: 256-262 - 2022
- [c41]Victor Winter:
Computational Science 101 - Towards a Computationally Informed Citizenry. ICCS (4) 2022: 671-677 - 2020
- [c40]Victor L. Winter, Judith Monarrez Diaz-Kelsey:
In Pursuit of CS-based Educational Content Suitable for Broader Audiences. SIGITE 2020: 62-67 - [c39]Kate Sherwin, Victor L. Winter:
Filling an Educational Void with Spatial Thinking in the Online Age of Pandemics. SIGITE 2020: 350 - [c38]Victor L. Winter, Kate Sherwin:
The Kessel Run - A Gamification of Visual, Spatial, and Computational Thinking. SIGITE 2020: 426-427
2010 – 2019
- 2019
- [c37]Victor L. Winter, Michèlle Friend, Michael Matthews, Betty Love, Sanghamithra Vasireddy:
Using Visualization to Reduce the Cognitive Load of Threshold Concepts in Computer Programming. FIE 2019: 1-9 - 2018
- [j11]Victor L. Winter, Betty Love, Cindy Corritore:
The art of the Wunderlich cube and the development of spatial abilities. Int. J. Child Comput. Interact. 18: 1-7 (2018) - [c36]Michèlle Friend, Michael Matthews, Victor L. Winter, Betty Love, Deanna Moisset, Ian Goodwin:
Bricklayer: Elementary Students Learn Math through Programming and Art. SIGCSE 2018: 628-633 - 2017
- [c35]Victor L. Winter, Betty Love, Chris Harris:
Delphi: A Source-code Analysis and Manipulation System for Bricklayer. SEKE 2017: 456-461 - [c34]Victor L. Winter, Betty Love:
Two Birds: Teaching Coding and Math in Primary Schools and Beyond (Abstract Only). SIGCSE 2017: 743 - 2016
- [j10]Victor L. Winter, Carl Reinke, Jonathan Guerrero:
Certifying a java type resolution function using program transformation, annotation, and reflection. Softw. Qual. J. 24(1): 115-135 (2016) - [c33]Betty Love, Victor L. Winter, Cindy Corritore, Davina Faimon:
Creating an Environment in which Elementary Educators Can Teach Coding. IDC 2016: 643-648 - [c32]Victor L. Winter, Betty Love, Cindy Corritore:
The Bricklayer Ecosystem - Art, Math, and Code. TFPIE 2016: 47-61 - 2015
- [c31]Victor L. Winter, Shiraz Hussain:
Verilog Synthesis in the Higher-Order Transformation Framework of TL. HASE 2015: 26-35 - 2014
- [c30]Victor L. Winter, Carl Reinke, Jonathan Guerrero:
Using Program Transformation, Annotation, and Reflection to Certify a Java Type Resolution Function. HASE 2014: 137-145 - [c29]Victor L. Winter:
Bricklayer: An Authentic Introduction to the Functional Programming Language SML. TFPIE 2014: 33-49 - 2013
- [j9]Victor L. Winter, Bojan Cukic, Taghi M. Khoshgoftaar, Kinji Mori, Raymond A. Paul, Carlos Pérez Leguízamo, Sahra Sedigh Sarvestani, John C. Sloan, Mladen A. Vouk, I-Ling Yen:
High Consequence Systems and Semantic Computing. Int. J. Semantic Comput. 7(3): 291-324 (2013) - [c28]Victor L. Winter, Carl Reinke, Jonathan Guerrero:
Sextant: A tool to specify and visualize software metrics for Java source-code. WETSoM 2013: 49-55 - 2012
- [c27]Victor L. Winter, Jonathan Guerrero, Alexander James, Carl Reinke:
Linking Syntactic and Semantic Models of Java Source Code within a Program Transformation System. HASE 2012: 122-129 - 2011
- [j8]Victor L. Winter, James T. Perry, Harvey P. Siy, Satish Mahadevan Srinivasan, Ben Farkas, James A. McCoy:
The Tyranny of the Vital Few: The Pareto Principle in Language Design. J. Softw. Eng. Appl. 4(3): 146-155 (2011) - [c26]Victor L. Winter, Jonathan Guerrero, Carl Reinke, James T. Perry:
Monarch: A High-Assurance Java-to-Java (J2j) Source-Code Migrator. HASE 2011: 152-156 - [c25]Azamatbek Mametjanov, Victor L. Winter, Ralf Lämmel:
More precise typing of rewrite strategies. LDTA 2011: 3
2000 – 2009
- 2009
- [j7]R. Daniel Resler, Victor L. Winter:
A higher-order strategy for eliminating common subexpressions. Comput. Lang. Syst. Struct. 35(4): 341-364 (2009) - [j6]Günter Kniesel, Victor L. Winter, Harvey P. Siy, Mansour Zand:
Making aspect-orientation accessible through syntax-based language composition. IET Softw. 3(3): 219-237 (2009) - 2008
- [p3]Victor L. Winter:
Program Transformation: What, How, and Why. Wiley Encyclopedia of Computer Science and Engineering 2008 - [e1]Joost Visser, Victor Winter:
Proceedings of the Eighth International Workshop on Rule Based Programming, RULE@RDP 2007, Paris, France, June 29, 2007. Electronic Notes in Theoretical Computer Science 219, Elsevier 2008 [contents] - 2007
- [c24]William L. Sousan, Victor L. Winter, Mansour Zand, Harvey P. Siy:
ERTSAL: a prototype of a domain-specific aspect language for analysis of embedded real-time systems. DSAL@AOSD 2007: 1 - [c23]Victor L. Winter, Azamatbek Mametjanov:
Generative programming techniques for Java library migration. GPCE 2007: 185-196 - [c22]Victor L. Winter, Azamatbek Mametjanov, Steven E. Morrison, James A. McCoy, Gregory L. Wickstrom:
Transformation-Based Library Adaptation for Embedded Systems. HASE 2007: 209-218 - [c21]Yan Wu, Harvey P. Siy, Mansour Zand, Victor L. Winter:
Construction of Ontology-Based Software Repositories by Text Mining. International Conference on Computational Science (3) 2007: 790-797 - [c20]Harvey P. Siy, Prasanna Aryal, Victor L. Winter, Mansour Zand:
Aspectual Support for Specifying Requirements in Software Product Lines. EA@ICSE 2007: 2 - [c19]Joost Visser, Victor L. Winter:
Preface. RULE@RDP 2007: 1-2 - 2006
- [j5]Victor L. Winter, Jason Beranek, Fares Fraij, Steve Roach, Gregory L. Wickstrom:
A transformational perspective into the core of an abstract class loader for the SSP. ACM Trans. Embed. Comput. Syst. 5(4): 773-818 (2006) - [c18]Victor L. Winter:
Model-driven Transformation-based Generation of Java Stress Tests. RULE@FLoC 2006: 99-114 - 2005
- [c17]Victor L. Winter, Jason Beranek:
Program Transformation Using HATS 1.84. GTTSE 2005: 378-396 - [c16]Victor L. Winter, Deepak Kapur:
Towards Dynamic Partitioning of Reactive System Behavior: A Train Controller Case Study. Monterey Workshop 2005: 47-69 - [c15]Victor L. Winter, Jason Beranek, Azamatbek Mametjanov, Fares Fraij, Steve Roach:
A Transformational Overview of the Core Functionality of an Abstract Class Loader for the SSP. WORDS 2005: 301-311 - 2004
- [j4]Victor L. Winter, Mahadevan Subramaniam:
The transient combinator, higher-order strategies, and the distributed data problem. Sci. Comput. Program. 52: 165-212 (2004) - [c14]Gregory L. Wickstrom, Jared Davis, Steven E. Morrison, Steve Roach, Victor L. Winter:
The SSP: An Example of High-Assurance Systems Engineering. HASE 2004: 167-177 - [c13]Victor L. Winter, Steve Roach, Fares Fraij:
Higher-order strategic programming: A road to software assurance. IASTED Conf. on Software Engineering and Applications 2004: 350-355 - [c12]Victor L. Winter:
Strategy Construction in the Higher-Order Framework of TL. RULE@RDP 2004: 149-170 - [p2]Victor L. Winter, Fabrice Kordon, Michel Lemoine:
The BART Case Study. Formal Methods for Embedded Distributed Systems 2004: 3-22 - [p1]Victor L. Winter, Deepak Kapur, G. Fuehrer:
Formal Specifcation and Refinement of a Safe Train Control Function. Formal Methods for Embedded Distributed Systems 2004: 25-64 - 2003
- [j3]Victor L. Winter, Steve Roach, Gregory L. Wickstrom:
Transformation-oriented programming: A development methodology for high assurance software. Adv. Comput. 58: 47-116 (2003) - 2001
- [c11]Allen P. Nikora, Raphael R. Some, Jeffrey M. Voas, Victor L. Winter, Jie Xu:
Software Dependability in Distributed and Mobile Computing Environments. HASE 2001: 7-10 - [c10]Adriaan de Groot, Jozef Hooman, Fabrice Kordon, Emmanuel Paviot-Adet, Isabelle Vernier-Mounier, Michel Lemoine, Gervais Gaudiére, Victor L. Winter, Deepak Kapur:
A Survey: Applying Formal Methods to a Software Intensive System. HASE 2001: 55-64 - [c9]Victor L. Winter, Dejan Desovski, Bojan Cukic:
Virtual Environment Modeling for Requirements Validation of High Consequence Systems. RE 2001: 23-30 - [c8]Deepak Kapur, Victor L. Winter, Raymond Berg:
Designing a Controller for a Multi-Train Multi-Track System. ATMOS 2001: 65-79
1990 – 1999
- 1999
- [j2]James M. Boyle, R. Daniel Resler, Victor L. Winter:
Do You Trust Your Compiler? Computer 32(5): 65-73 (1999) - [c7]Victor L. Winter:
A Synchronous Paradigm for Modeling Stable Reactive Systems. HASE 1999: 257-268 - [c6]Victor L. Winter, Raymond Berg:
Software Systems: Consequence versus Functionality. HASE 1999: 269-270 - 1998
- [j1]I-Ling Yen, Raymond A. Paul, Victor L. Winter, John M. Covan, Larry J. Dalton, Leon Alkalai, Ann T. Tai, Rick Harper, Barry Flahive, Wei-Tek Tsai, Ramin Mojdehbakhsh, Sanjai Rayadurgam, Kinji Mori, Michael R. Lowry:
Key Applications for High-Assurance Systems. Computer 31(4): 35-45 (1998) - [c5]Raymond Berg, Victor L. Winter:
Risk Assessment and Integrity in System Design. ICECCS 1998: 115-120 - 1997
- [c4]James M. Boyle, R. Daniel Resler, Victor L. Winter:
Do You Trust Your Compiler? Applying Formal Methods to Constructing High-Assurance Compilers. HASE 1997: 14-31 - 1996
- [c3]Victor L. Winter:
Software on the edge. HASE 1996: 57-59 - [c2]Victor L. Winter, James M. Boyle:
Proving refinement transformations for deriving high-assurance software. HASE 1996: 68-77 - [c1]James M. Boyle, Terence J. Harmer, Victor L. Winter:
The TAMPR Program Transformation System: Simplifying the Development of Numerical Software. SciTools 1996: 353-372
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint