• Publications
  • Influence
Feature Interactions in Electronic Mail
  • 82
  • 13
Feature combination and interaction detection via foreground/background models
  • R. J. Hall
  • Computer Science
  • Comput. Networks
  • 1 April 2000
Abstract One approach to building complex software product families is to partition the possible functions of the system into conceptual chunks called features. Ideally, system instances are rapidlyExpand
  • 47
  • 7
Fundamental Nonmodularity in Electronic Mail
  • R. J. Hall
  • Computer Science
  • Automated Software Engineering
  • 2004
Electronic mail (email) systems have grown in complexity to the point where their reliability and usability are coming into question. The authors of individual email components are widely distributedExpand
  • 42
  • 7
An Internet of Drones
  • R. J. Hall
  • Computer Science
  • IEEE Internet Computing
  • 5 May 2016
The safe operation of drones for commercial and public use presents communication and computational challenges. This article overviews these challenges and describes a prototype system (the GeocastExpand
  • 71
  • 6
  • PDF
An Improved Geocast for Mobile Ad Hoc Networks
  • R. J. Hall
  • Computer Science
  • IEEE Transactions on Mobile Computing
  • 1 February 2011
Geographic addressing of packets within mobile ad hoc networks enables novel applications, including hard real-time engagement simulation in military training systems, geographic command and controlExpand
  • 54
  • 6
How to avoid unwanted email
U nwanted communication ranges from nuisance (junk mail) to annoyance (telemarketing) to dangerous to the very medium conveying the message (junk fax, obscene or harassing telephone calls). TheExpand
  • 80
  • 4
Automatic extraction of executable program subsets by simultaneous dynamic program slicing
  • R. J. Hall
  • Computer Science
  • Automated Software Engineering
  • 1 March 1995
Developers of software product families and maintainers of “legacy” software can benefit from the ability to automatically extract a correctly functioning subset of the code of a system that performsExpand
  • 58
  • 3
Generalized behavior-based retrieval
The user of a large reuse library faces the formidable discovey problem of searching for all and only those components useful in solving the current progmmming task. This paper describes a retrievalExpand
  • 66
  • 2
Call Path Profiling of Monotonic Program Resources in UNIX
Practical performance improvement of a complex program must be guided by empirical measurements of its resource usage. Essentially, the programmer wants to know where in the source code the programExpand
  • 30
  • 2