The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael E. Shin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael E. Shin, Fernando Paniagua
    Self-Management of COTS Component-Based Systems Using Wrappers. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2006, pp:33-36 [Conf]
  2. Hassan Gomaa, Michael E. Shin
    Automated Software Product Line Engineering and Product Derivation. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:285- [Conf]
  3. Hassan Gomaa, Shaoying Liu, Michael E. Shin
    Integration of the Domain Modeling Method for Families of Systems with the SOFL Formal Specification Language. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2000, pp:61-71 [Conf]
  4. Hassan Gomaa, Michael E. Shin
    Multiple-View Meta-Modeling of Software Product Lines. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2002, pp:238-246 [Conf]
  5. Michael E. Shin, Yan Xu
    Enhanced Anomaly Detection in Self-Healing Components. [Citation Graph (0, 0)][DBLP]
    SEKE, 2006, pp:485-488 [Conf]
  6. Michael E. Shin
    Software Architecture for Self-Healing of Concurrent and Distributed Components. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2004, pp:97-103 [Conf]
  7. Hassan Gomaa, Daniel A. Menascé, Michael E. Shin
    Reusable component interconnection patterns for distributed software architectures. [Citation Graph (0, 0)][DBLP]
    SSR, 2001, pp:69-77 [Conf]
  8. Gail-Joon Ahn, Michael E. Shin
    Role-Based Authorization Constraints Specification Using Object Constraint Language. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:157-162 [Conf]
  9. Michael E. Shin, Gail-Joon Ahn
    UML-Based Representation of Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:195-200 [Conf]
  10. Michael E. Shin, Alexander H. Levis, Lee W. Wagenhals, Dae-Sik Kim
    Analyzing Dynamic Behavior Of Large-Scale Systems Through Model Transformation. [Citation Graph (0, 0)][DBLP]
    International Journal of Software Engineering and Knowledge Engineering, 2005, v:15, n:1, pp:35-60 [Journal]
  11. Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin
    Reconstructing a formal security model. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:11, pp:649-657 [Journal]
  12. Michael E. Shin
    Self-healing components in robust software architecture for concurrent and distributed systems. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2005, v:57, n:1, pp:27-44 [Journal]
  13. Michael E. Shin, Hassan Gomaa
    Software requirements and architecture modeling for evolving non-secure applications into secure applications. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:66, n:1, pp:60-70 [Journal]

  14. Consistency in Self-Reconfiguration of Self-Healing Systems. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002