The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael VanHilst: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang
    Defining Security Requirements Through Misuse Actions. [Citation Graph (0, 0)][DBLP]
    IFIP Workshop on Advanced Software Engineering, 2006, pp:123-137 [Conf]
  2. Michael VanHilst, David Notkin
    Using C++ Templates to Implement Role-Based Designs. [Citation Graph (0, 0)][DBLP]
    ISOTAS, 1996, pp:22-37 [Conf]
  3. Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie
    Some Security Issues of Wireless Systems. [Citation Graph (0, 0)][DBLP]
    ISSADS, 2005, pp:388-396 [Conf]
  4. Michael VanHilst, Martin L. Griss
    Goal-Directed Design for Proactive and Intelligent Device Collaboration. [Citation Graph (0, 0)][DBLP]
    KES, 2003, pp:841-848 [Conf]
  5. Michael VanHilst, Pankaj K. Garg, Christopher Lo
    Repository mining and Six Sigma for process improvement. [Citation Graph (0, 0)][DBLP]
    MSR, 2005, pp:1-4 [Conf]
  6. Lewis G. Creary, Michael VanHilst
    "Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations. [Citation Graph (0, 0)][DBLP]
    NLDB, 2001, pp:165-175 [Conf]
  7. Michael VanHilst, David Notkin
    Using Role Components to Implement Collaboration-Based Designs. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1996, pp:359-369 [Conf]
  8. Michael VanHilst, David Notkin
    Decoupling Change from Design. [Citation Graph (0, 0)][DBLP]
    SIGSOFT FSE, 1996, pp:58-69 [Conf]
  9. Shihong Huang, Scott R. Tilley, Michael VanHilst, Damiano Distante
    Adoption-Centric Software Maintenance Process Improvement via Information Integration. [Citation Graph (0, 0)][DBLP]
    STEP, 2005, pp:25-34 [Conf]

  10. Measuring the Level of Security Introduced by Security Patterns. [Citation Graph (, )][DBLP]


  11. Eliciting Security Requirements through Misuse Activities. [Citation Graph (, )][DBLP]


  12. Mining Objective Process Metrics from Repository Data. [Citation Graph (, )][DBLP]


  13. A Multi-Dimensional Classification for Users of Security Patterns. [Citation Graph (, )][DBLP]


  14. The Secure Three-Tier Architecture Pattern. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002