|
Search the dblp DataBase
Elizabeth A. Unger:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- G. Hecker, Elizabeth A. Unger
A User Interface for Database Creation Use and Maintenance. [Citation Graph (1, 0)][DBLP] SIGSMALL/PC, 1988, pp:176-186 [Conf]
- Chyuan Samuel Hsieh, Elizabeth A. Unger
Manifolds: a very high-level conceptual framework of interprocess synchronization and communication. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer Science, 1987, pp:196-204 [Conf]
- Chyuan Samuel Hsieh, Elizabeth A. Unger
Resource scheduling: specification and proof techniques. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer Science, 1988, pp:429-437 [Conf]
- Hossein Saiedian, Elizabeth A. Unger
ABSL: An Actor-Based Specification Language for Office Automation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer Science, 1990, pp:252-258 [Conf]
- Elizabeth A. Unger, Charles M. Hassett, Constanza Castro
IS and MIS: a compromise? [Citation Graph (0, 0)][DBLP] SIGCSE, 1987, pp:483-489 [Conf]
- Hossein Saiedian, Elizabeth A. Unger
A Formal Specification Tool for Office Systems. [Citation Graph (0, 0)][DBLP] SIGSMALL/PC Symposium, 1990, pp:215-220 [Conf]
- Miguel Cabrera, Elizabeth A. Unger
Dynamic Data as Deterrent to the Tracker. [Citation Graph (0, 0)][DBLP] SIGSMALL/PC Symposium, 1990, pp:31-35 [Conf]
- Kok Wai Wong, Elizabeth A. Unger
Specification and Verification of Active Message Systems. [Citation Graph (0, 0)][DBLP] SIGSMALL/PC Symposium, 1990, pp:24-30 [Conf]
- Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger
A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment. [Citation Graph (0, 0)][DBLP] Computer Networks and ISDN Systems, 1994, v:26, n:12, pp:1523-1531 [Journal]
- James M. Slack, Elizabeth A. Unger
Integrity in object-oriented database systems. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:4, pp:389-404 [Journal]
- Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger
A survey of security issues in office computation and the application of secure computing models to office systems. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:1, pp:79-97 [Journal]
- Chyuan Samuel Hsieh, Elizabeth A. Unger
On the control structure of a program slice. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1996, v:34, n:2, pp:123-126 [Journal]
- C. Samuel Hsieh, Elizabeth A. Unger, Ramón A. Mata-Toledo
Using program dependence graphs for information flow control. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1992, v:17, n:3, pp:227-232 [Journal]
- Ariel Pashtan, Elizabeth A. Unger
Resource Monitors: A Design Methodology for Operating Systems. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 1984, v:14, n:8, pp:791-806 [Journal]
Search in 0.014secs, Finished in 0.015secs
|