Search the dblp DataBase
Michael E. Shin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael E. Shin , Fernando Paniagua Self-Management of COTS Component-Based Systems Using Wrappers. [Citation Graph (0, 0)][DBLP ] COMPSAC (2), 2006, pp:33-36 [Conf ] Hassan Gomaa , Michael E. Shin Automated Software Product Line Engineering and Product Derivation. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:285- [Conf ] Hassan Gomaa , Shaoying Liu , Michael E. Shin Integration of the Domain Modeling Method for Families of Systems with the SOFL Formal Specification Language. [Citation Graph (0, 0)][DBLP ] ICECCS, 2000, pp:61-71 [Conf ] Hassan Gomaa , Michael E. Shin Multiple-View Meta-Modeling of Software Product Lines. [Citation Graph (0, 0)][DBLP ] ICECCS, 2002, pp:238-246 [Conf ] Michael E. Shin , Yan Xu Enhanced Anomaly Detection in Self-Healing Components. [Citation Graph (0, 0)][DBLP ] SEKE, 2006, pp:485-488 [Conf ] Michael E. Shin Software Architecture for Self-Healing of Concurrent and Distributed Components. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2004, pp:97-103 [Conf ] Hassan Gomaa , Daniel A. Menascé , Michael E. Shin Reusable component interconnection patterns for distributed software architectures. [Citation Graph (0, 0)][DBLP ] SSR, 2001, pp:69-77 [Conf ] Gail-Joon Ahn , Michael E. Shin Role-Based Authorization Constraints Specification Using Object Constraint Language. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:157-162 [Conf ] Michael E. Shin , Gail-Joon Ahn UML-Based Representation of Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:195-200 [Conf ] Michael E. Shin , Alexander H. Levis , Lee W. Wagenhals , Dae-Sik Kim Analyzing Dynamic Behavior Of Large-Scale Systems Through Model Transformation. [Citation Graph (0, 0)][DBLP ] International Journal of Software Engineering and Knowledge Engineering, 2005, v:15, n:1, pp:35-60 [Journal ] Gail-Joon Ahn , Seng-Phil Hong , Michael E. Shin Reconstructing a formal security model. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2002, v:44, n:11, pp:649-657 [Journal ] Michael E. Shin Self-healing components in robust software architecture for concurrent and distributed systems. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2005, v:57, n:1, pp:27-44 [Journal ] Michael E. Shin , Hassan Gomaa Software requirements and architecture modeling for evolving non-secure applications into secure applications. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2007, v:66, n:1, pp:60-70 [Journal ] Consistency in Self-Reconfiguration of Self-Healing Systems. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs