The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Elizabeth A. Unger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. G. Hecker, Elizabeth A. Unger
    A User Interface for Database Creation Use and Maintenance. [Citation Graph (1, 0)][DBLP]
    SIGSMALL/PC, 1988, pp:176-186 [Conf]
  2. Chyuan Samuel Hsieh, Elizabeth A. Unger
    Manifolds: a very high-level conceptual framework of interprocess synchronization and communication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1987, pp:196-204 [Conf]
  3. Chyuan Samuel Hsieh, Elizabeth A. Unger
    Resource scheduling: specification and proof techniques. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1988, pp:429-437 [Conf]
  4. Hossein Saiedian, Elizabeth A. Unger
    ABSL: An Actor-Based Specification Language for Office Automation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1990, pp:252-258 [Conf]
  5. Elizabeth A. Unger, Charles M. Hassett, Constanza Castro
    IS and MIS: a compromise? [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1987, pp:483-489 [Conf]
  6. Hossein Saiedian, Elizabeth A. Unger
    A Formal Specification Tool for Office Systems. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC Symposium, 1990, pp:215-220 [Conf]
  7. Miguel Cabrera, Elizabeth A. Unger
    Dynamic Data as Deterrent to the Tracker. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC Symposium, 1990, pp:31-35 [Conf]
  8. Kok Wai Wong, Elizabeth A. Unger
    Specification and Verification of Active Message Systems. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC Symposium, 1990, pp:24-30 [Conf]
  9. Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger
    A Proposed Mechanism for Implementation of Non-Discretionary Access Controls in a Network Environment. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1994, v:26, n:12, pp:1523-1531 [Journal]
  10. James M. Slack, Elizabeth A. Unger
    Integrity in object-oriented database systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:4, pp:389-404 [Journal]
  11. Rayford B. Vaughn, Hossein Saiedian, Elizabeth A. Unger
    A survey of security issues in office computation and the application of secure computing models to office systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:1, pp:79-97 [Journal]
  12. Chyuan Samuel Hsieh, Elizabeth A. Unger
    On the control structure of a program slice. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1996, v:34, n:2, pp:123-126 [Journal]
  13. C. Samuel Hsieh, Elizabeth A. Unger, Ramón A. Mata-Toledo
    Using program dependence graphs for information flow control. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1992, v:17, n:3, pp:227-232 [Journal]
  14. Ariel Pashtan, Elizabeth A. Unger
    Resource Monitors: A Design Methodology for Operating Systems. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1984, v:14, n:8, pp:791-806 [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002