The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wouter Joosen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen
    Uniform Application-level Access Control Enforcement of Organizationwide Policies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:431-440 [Conf]
  2. Davy Preuveneers, Julien Pauty, Dimitri Van Landuyt, Yolande Berbers, Wouter Joosen
    Comparative Evaluation of Converged Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:989-994 [Conf]
  3. Yolande Berbers, Bert Robben, Wouter Joosen, Kris Hermans
    Event System Providing a Service for Filtering and Correlating Events. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 1999, pp:289-292 [Conf]
  4. Mathieu Braem, Kris Verlaenen, Niels Joncheere, Wim Vanderperren, Ragnhild Van Der Straeten, Eddy Truyen, Wouter Joosen, Viviane Jonckers
    Isolating Process-Level Concerns Using Padus. [Citation Graph (0, 0)][DBLP]
    Business Process Management, 2006, pp:113-128 [Conf]
  5. Bert Lagaisse, Wouter Joosen
    Component-Based Open Middleware Supporting Aspect-Oriented Software Composition. [Citation Graph (0, 0)][DBLP]
    CBSE, 2005, pp:139-154 [Conf]
  6. Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
    Bridging the gap between web application firewalls and web applications. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:67-77 [Conf]
  7. Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen
    Assessment of Palm OS Susceptibility to Malicious Code Threats. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:240-249 [Conf]
  8. Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen
    Adaptable Access Control Policies for Medical Information Systems. [Citation Graph (0, 0)][DBLP]
    DAIS, 2003, pp:133-140 [Conf]
  9. Sam Michiels, Kristof Verslype, Wouter Joosen, Bart De Decker
    Towards a software architecture for DRM. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:65-74 [Conf]
  10. Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
    A Reflective Invocation Scheme to Realise Advanced Object Management. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshop, 1993, pp:139-151 [Conf]
  11. Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
    Sender-Initated and Receiver-Initated Coordination in a Global Object Space. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshop, 1994, pp:14-28 [Conf]
  12. Peter Kenens, Sam Michiels, Frank Matthijs, Bert Robben, Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten
    An AOP Case with Static and Dynamic Aspects. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:428-430 [Conf]
  13. Bo Nørregaard Jørgensen, Wouter Joosen
    Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:503-506 [Conf]
  14. Bo Nørregaard Jørgensen, Wouter Joosen
    Standardizing Component Interaction Patterns in Product-Lines Architectures. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:197- [Conf]
  15. Frank Matthijs, Wouter Joosen, Bert Robben, Bart Vanhaute, Pierre Verbaeten
    Multi-level Patterns. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1997, pp:112-115 [Conf]
  16. Bert Robben, Wouter Joosen, Frank Matthijs, Bart Vanhaute, Pierre Verbaeten
    Components for Non-Functional Requirements. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:151-152 [Conf]
  17. Bert Robben, Wouter Joosen, Frank Matthijs, Bart Vanhaute, Pierre Verbaeten
    A Metaobject Protocol for Correlate. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:367-368 [Conf]
  18. Eddy Truyen, Bert Robben, Peter Kenens, Frank Matthijs, Sam Michiels, Wouter Joosen, Pierre Verbaeten
    Open Implementation of a Mobile Communication System. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:315-316 [Conf]
  19. Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
    Observation of a Global Object Space on a Distributed Memory Machine. [Citation Graph (0, 0)][DBLP]
    HICSS (2), 1994, pp:615-624 [Conf]
  20. Kris Verlaenen, Wouter Joosen, Pierre Verbaeten
    Arriclides: An Architecture Integrating Clinical Decision Support Models. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:135- [Conf]
  21. Robert Bywater, Wouter Joosen, Stijn Bijnens, Pierre Verbaeten, Thomas Larsen, John W. Perram
    Object-Oriented Simulation Software for Drug Design. [Citation Graph (0, 0)][DBLP]
    HPCN, 1994, pp:189-196 [Conf]
  22. Wouter Joosen, Stijn Bijnens, Johan Van Oeyen, Bert Robben, Frank Matthijs, Pierre Verbaeten, John W. Perram
    Affordable Overhead in CORRELATE: Comparing two MD Simulators. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 1996, pp:219-227 [Conf]
  23. Wouter Joosen, Stijn Bijnens, Bert Robben, Johan Van Oeyen, Pierre Verbaeten
    Flexible load balancing software for parallel applications in a time-sharing environment. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 1995, pp:398-406 [Conf]
  24. Romain Slootmaekers, Henk Van Wulpen, Wouter Joosen
    Modelling Genetic Search Agents with a Concurrent Object-Oriented Language. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 1998, pp:843-853 [Conf]
  25. Sam Michiels, Nico Janssens, Wouter Joosen, Pierre Verbaeten
    Decentralized cooperative management: a bottom-up approach. [Citation Graph (0, 0)][DBLP]
    IADIS AC, 2005, pp:401-408 [Conf]
  26. Yves Younan, Wouter Joosen, Frank Piessens
    Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:379-398 [Conf]
  27. Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo Nørregaard Jørgensen
    Dynamic and Selective Combination of Extensions in Component-Based Applications. [Citation Graph (0, 0)][DBLP]
    ICSE, 2001, pp:233-242 [Conf]
  28. Eddy Truyen, Wouter Joosen, Pierre Verbaeten
    Consistency Management in the Presence of Simultaneous Client-Specific Views. [Citation Graph (0, 0)][DBLP]
    ICSM, 2002, pp:501-510 [Conf]
  29. Wouter Joosen, Bert Robben, Henk Van Wulpen, Pierre Verbaeten
    Experiences with an Object-Oriented Parallel Language: The CORRELATE Project. [Citation Graph (0, 0)][DBLP]
    ISCOPE, 1997, pp:73-80 [Conf]
  30. Yves Younan, Wouter Joosen, Frank Piessens
    A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:3-20 [Conf]
  31. Eddy Truyen, Bert Robben, Bart Vanhaute, Tim Coninx, Wouter Joosen, Pierre Verbaeten
    Portable Support for Transparent Thread Migration in Java. [Citation Graph (0, 0)][DBLP]
    ASA/MA, 2000, pp:29-43 [Conf]
  32. Stijn Bijnens, Wouter Joosen, Pierre Verbaeten
    Language Constructs for Coordination in an Agent Space. [Citation Graph (0, 0)][DBLP]
    MAAMAW, 1994, pp:90-105 [Conf]
  33. Wouter Joosen, Stijn Bijnens, Frank Matthijs, Bert Robben, Johan Van Oeyen, Pierre Verbaeten
    Building Multi-Agent Systems with CORRELATE. [Citation Graph (0, 0)][DBLP]
    MAAMAW, 1997, pp:197-209 [Conf]
  34. Bo Nørregaard Jørgensen, Eddy Truyen, Frank Matthijs, Wouter Joosen
    Customization of Object Request Brokers by Application Specific Policies. [Citation Graph (0, 0)][DBLP]
    Middleware, 2000, pp:144-163 [Conf]
  35. Bert Lagaisse, Wouter Joosen
    True and Transparent Distributed Composition of Aspect-Components. [Citation Graph (0, 0)][DBLP]
    Middleware, 2006, pp:42-61 [Conf]
  36. Thomas Larsen, Wouter Joosen, John W. Perram
    The Object-Oriented Development of a Parallel Application in Polymer Dynamics. [Citation Graph (0, 0)][DBLP]
    PARA, 1994, pp:344-348 [Conf]
  37. Yolande Berbers, Bart De Decker, Wouter Joosen, Frank Matthijs, Bert Robben
    Management of Events in a multi-agent system. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1997, pp:1141-1150 [Conf]
  38. Frank Matthijs, Peter Kenens, Wouter Joosen, Pierre Verbaeten
    Networking and Reflection: A Strong Combination. [Citation Graph (0, 0)][DBLP]
    Reflection, 1999, pp:141-143 [Conf]
  39. Bert Robben, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten
    Non-functional Policies. [Citation Graph (0, 0)][DBLP]
    Reflection, 1999, pp:74-92 [Conf]
  40. Aram Hovsepyan, Stefan Van Baelen, Bert Vanhooff, Wouter Joosen, Yolande Berbers
    Key Research Challenges for Successfully Applying MDD Within Real-Time Embedded Software Development. [Citation Graph (0, 0)][DBLP]
    SAMOS, 2006, pp:49-58 [Conf]
  41. Bert Vanhooff, Stefan Van Baelen, Aram Hovsepyan, Wouter Joosen, Yolande Berbers
    Towards a Transformation Chain Modeling Language. [Citation Graph (0, 0)][DBLP]
    SAMOS, 2006, pp:39-48 [Conf]
  42. Bart De Win, Jan Van den Bergh 0002, Frank Matthijs, Bart De Decker, Wouter Joosen
    A Security Architecture for Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:491-500 [Conf]
  43. Yolande Berbers, Bart De Decker, Wouter Joosen
    Infrastructure for mobile agents. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:173-180 [Conf]
  44. Yolande Berbers, Wouter Joosen, Pierre Verbaeten
    A general purpose distributed operating system for a hypercube. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1988, pp:- [Conf]
  45. Yolande Berbers, Wouter Joosen, Pierre Verbaeten
    On the use of load balancing mechanisms for fault tolerance support. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1990, pp:- [Conf]
  46. Yolande Berbers, Wouter Joosen, Pierre Verbaeten
    Object-orientation as an appropriate paradigm for high-performance environments for scientific computing. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1992, pp:- [Conf]
  47. Thomas Heyman, Bart De Win, Christophe Huygens, Wouter Joosen
    Improving Intrusion Detection through Alert Verification. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:207-216 [Conf]
  48. Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
    Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. [Citation Graph (0, 0)][DBLP]
    Software Composition, 2006, pp:34-49 [Conf]
  49. Sam Michiels, Lieven Desmet, Wouter Joosen, Pierre Verbaeten
    The DiPS+ Software Architecture for Self-healing Protocol Stacks. [Citation Graph (0, 0)][DBLP]
    WICSA, 2004, pp:233-242 [Conf]
  50. Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten
    Towards preserving correctness in self-managed software systems. [Citation Graph (0, 0)][DBLP]
    WOSS, 2004, pp:34-38 [Conf]
  51. Maarten Bynens, Bart De Win, Wouter Joosen, Bart Theeten
    Ontology-Based Discovery of Data-Driven Services. [Citation Graph (0, 0)][DBLP]
    SOSE, 2006, pp:175-178 [Conf]
  52. Bo Nørregaard Jørgensen, Eddy Truyen, Wouter Joosen
    Customization of Component-Based Object Request Brokers through Dynamic Reconfiguration. [Citation Graph (0, 0)][DBLP]
    TOOLS (33), 2000, pp:181-194 [Conf]
  53. Bo Nørregaard Jørgensen, Wouter Joosen
    Classifying Component Interaction in Product-Line Architectures. [Citation Graph (0, 0)][DBLP]
    TOOLS (32), 1999, pp:66-77 [Conf]
  54. Nico Janssens, Wouter Joosen, Pierre Verbaeten
    NeCoMan: Middleware for Safe Distributed-Service Adaptation in Programmable Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2005, v:6, n:7, pp:- [Journal]
  55. Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen
    A Modular Access Control Service for Supporting Application-Specific Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2006, v:7, n:6, pp:- [Journal]
  56. Frank Piessens, Bart Jacobs 0002, Wouter Joosen
    Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 2003, v:150, n:5, pp:303-307 [Journal]
  57. Frank Piessens, Bart Jacobs 0002, Eddy Truyen, Wouter Joosen
    Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2004, v:3, n:2, pp:27-35 [Journal]
  58. Eddy Truyen, Wouter Joosen
    Run-Time and Atomic Weaving of Distributed Aspects. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:147-181 [Journal]
  59. Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen
    Extended Protection against Stack Smashing Attacks without Performance Loss. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:429-438 [Conf]
  60. Koen Buyens, Riccardo Scandariato, Wouter Joosen
    Process Activities Supporting Security Principles. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:281-292 [Conf]
  61. Tom Goovaerts, Bart De Win, Wouter Joosen
    A Flexible Architecture for Enforcing and Composing Policies in a Service-Oriented Environment. [Citation Graph (0, 0)][DBLP]
    DAIS, 2007, pp:253-266 [Conf]
  62. Frans Sanen, Eddy Truyen, Wouter Joosen
    Managing Concern Interactions in Middleware. [Citation Graph (0, 0)][DBLP]
    DAIS, 2007, pp:267-283 [Conf]
  63. Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre Verbaeten, Bo Nørregaard Jørgensen
    A Dynamic Customization Model for Distributed Component-Based Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2001, pp:147-156 [Conf]
  64. Kris Verlaenen, Bart De Win, Wouter Joosen
    Towards simplified specification of policies in different domains. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:20-29 [Conf]
  65. Bert Vanhooff, Dhouha Ayed, Stefan Van Baelen, Wouter Joosen, Yolande Berbers
    UniTI: A Unified Transformation Infrastructure. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2007, pp:31-45 [Conf]
  66. Bert Lagaisse, Eddy Truyen, Wouter Joosen
    Multi-stage Aspect-Oriented Composition of Component-Based Applications. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (1), 2007, pp:630-647 [Conf]
  67. Kris Verlaenen, Bart De Win, Wouter Joosen
    Policy Analysis Using a Hybrid Semantic Reasoning Engine. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:193-200 [Conf]

  68. Empirical and statistical analysis of risk analysis-driven techniques for threat management. [Citation Graph (, )][DBLP]


  69. Using Security Patterns to Combine Security Metrics. [Citation Graph (, )][DBLP]


  70. Hardening XDS-Based Architectures. [Citation Graph (, )][DBLP]


  71. Transforming Security Requirements into Architecture. [Citation Graph (, )][DBLP]


  72. Linking Privacy Solutions to Developer Goals. [Citation Graph (, )][DBLP]


  73. Risk-Driven Architectural Decomposition. [Citation Graph (, )][DBLP]


  74. Identifying and Resolving Least Privilege Violations in Software Architectures. [Citation Graph (, )][DBLP]


  75. Protecting Global and Static Variables from Buffer Overflow Attacks. [Citation Graph (, )][DBLP]


  76. Support for distributed adaptations in aspect-oriented middleware. [Citation Graph (, )][DBLP]


  77. Domain-driven discovery of stable abstractions for pointcut interfaces. [Citation Graph (, )][DBLP]


  78. A generic and reflective debugging architecture to support runtime visibility and traceability of aspects. [Citation Graph (, )][DBLP]


  79. From aspect-oriented models to aspect-oriented code?: the maintenance perspective. [Citation Graph (, )][DBLP]


  80. A permission system for secure AOP. [Citation Graph (, )][DBLP]


  81. A sensor middleware and agent-based communication platform for supply-chain management. [Citation Graph (, )][DBLP]


  82. A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP]


  83. Towards a measuring framework for security properties of software. [Citation Graph (, )][DBLP]


  84. Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP]


  85. PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]


  86. Dynamic Composition of Cross-Organizational Features in Distributed Software Systems. [Citation Graph (, )][DBLP]


  87. HProxy: Client-Side Detection of SSL Stripping Attacks. [Citation Graph (, )][DBLP]


  88. Generic Reusable Concern Compositions. [Citation Graph (, )][DBLP]


  89. Modeling Context-Dependent Aspect Interference Using Default Logics. [Citation Graph (, )][DBLP]


  90. Mapping problem-space to solution-space features: a feature interaction approach. [Citation Graph (, )][DBLP]


  91. Using Multi-Level Security Annotations to Improve Software Assurance. [Citation Graph (, )][DBLP]


  92. Using AADL to Model a Protocol Stack. [Citation Graph (, )][DBLP]


  93. An object-oriented approach to datatype-generic programming. [Citation Graph (, )][DBLP]


  94. Managing Real-World System Configurations with Constraints. [Citation Graph (, )][DBLP]


  95. A formal model for self-adaptive and self-healing organizations. [Citation Graph (, )][DBLP]


  96. A MVC Framework for Policy-Based Adaptation of Workflow Processes: A Case Study on Confidentiality. [Citation Graph (, )][DBLP]


  97. QARI: Quality Aware Software Deployment for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  98. Federated and Shared Use of Sensor Networks through Security Middleware. [Citation Graph (, )][DBLP]


  99. Managing your content with CIMPLE - a content-centric storage interface. [Citation Graph (, )][DBLP]


  100. PoDIM: A Language for High-Level Configuration Management. [Citation Graph (, )][DBLP]


  101. Federated Access Control and Workflow Enforcement in Systems Configuration. [Citation Graph (, )][DBLP]


  102. On the integration of sensor networks and general purpose IT infrastructure. [Citation Graph (, )][DBLP]


  103. The case for aspect-oriented reflective middleware. [Citation Graph (, )][DBLP]


  104. Dynamic reconfiguration using template based web service composition. [Citation Graph (, )][DBLP]


  105. Towards policy-based management of sensor networks. [Citation Graph (, )][DBLP]


  106. A comparison of two approaches for achieving flexible and adaptive security middleware. [Citation Graph (, )][DBLP]


  107. DAViM: a dynamically adaptable virtual machine for sensor networks. [Citation Graph (, )][DBLP]


  108. Towards fine-grained and application-centric access control for wireless sensor networks. [Citation Graph (, )][DBLP]


  109. A Credential-Based System for the Anonymous Delegation of Rights. [Citation Graph (, )][DBLP]


  110. Fine-Grained Tailoring of Component Behaviour for Embedded Systems. [Citation Graph (, )][DBLP]


  111. Improving Least Privilege in Software Architecture by Guided Automated Compartmentalization. [Citation Graph (, )][DBLP]


  112. A Reflective Framework for Fine-Grained Adaptation of Aspect-Oriented Compositions. [Citation Graph (, )][DBLP]


  113. Weaving the Fabric of the Control Loop through Aspects. [Citation Graph (, )][DBLP]


  114. Specifying and Composing Concerns Expressed in Domain-Specific Modeling Languages. [Citation Graph (, )][DBLP]


  115. Adding dynamic reconfiguration support to JBoss AOP. [Citation Graph (, )][DBLP]


  116. Hierarchical Organizations and a Supporting Software Architecture for Floating Car Data. [Citation Graph (, )][DBLP]


  117. Automated Detection of Least Privilege Violations in Software Architectures. [Citation Graph (, )][DBLP]


  118. Measuring the interplay of security principles in software architectures. [Citation Graph (, )][DBLP]


  119. LooCI: a loosely-coupled component infrastructure for networked embedded systems. [Citation Graph (, )][DBLP]


  120. Tracking and tracing containers through distributed sensor middleware. [Citation Graph (, )][DBLP]


  121. Managing Agent Interactions with Context-Driven Dynamic Organizations. [Citation Graph (, )][DBLP]


  122. BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. [Citation Graph (, )][DBLP]


  123. CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. [Citation Graph (, )][DBLP]


  124. Extending middleware frameworks for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  125. A Graph Based Approach to Supporting Reconfiguration in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  126. Aspect-Oriented Software Development in Practice: Tales from AOSD-Europe. [Citation Graph (, )][DBLP]


  127. DAVIM: Adaptable Middleware for Sensor Networks. [Citation Graph (, )][DBLP]


  128. Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies. [Citation Graph (, )][DBLP]


  129. The S3MS.NET Run Time Monitor: Tool Demonstration. [Citation Graph (, )][DBLP]


Search in 0.285secs, Finished in 0.290secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002