|
Search the dblp DataBase
Michael VanHilst:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Eduardo B. Fernández, Michael VanHilst, María M. Larrondo-Petrie, Shihong Huang
Defining Security Requirements Through Misuse Actions. [Citation Graph (0, 0)][DBLP] IFIP Workshop on Advanced Software Engineering, 2006, pp:123-137 [Conf]
- Michael VanHilst, David Notkin
Using C++ Templates to Implement Role-Based Designs. [Citation Graph (0, 0)][DBLP] ISOTAS, 1996, pp:22-37 [Conf]
- Eduardo B. Fernández, Saeed Rajput, Michael VanHilst, María M. Larrondo-Petrie
Some Security Issues of Wireless Systems. [Citation Graph (0, 0)][DBLP] ISSADS, 2005, pp:388-396 [Conf]
- Michael VanHilst, Martin L. Griss
Goal-Directed Design for Proactive and Intelligent Device Collaboration. [Citation Graph (0, 0)][DBLP] KES, 2003, pp:841-848 [Conf]
- Michael VanHilst, Pankaj K. Garg, Christopher Lo
Repository mining and Six Sigma for process improvement. [Citation Graph (0, 0)][DBLP] MSR, 2005, pp:1-4 [Conf]
- Lewis G. Creary, Michael VanHilst
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations. [Citation Graph (0, 0)][DBLP] NLDB, 2001, pp:165-175 [Conf]
- Michael VanHilst, David Notkin
Using Role Components to Implement Collaboration-Based Designs. [Citation Graph (0, 0)][DBLP] OOPSLA, 1996, pp:359-369 [Conf]
- Michael VanHilst, David Notkin
Decoupling Change from Design. [Citation Graph (0, 0)][DBLP] SIGSOFT FSE, 1996, pp:58-69 [Conf]
- Shihong Huang, Scott R. Tilley, Michael VanHilst, Damiano Distante
Adoption-Centric Software Maintenance Process Improvement via Information Integration. [Citation Graph (0, 0)][DBLP] STEP, 2005, pp:25-34 [Conf]
Measuring the Level of Security Introduced by Security Patterns. [Citation Graph (, )][DBLP]
Eliciting Security Requirements through Misuse Activities. [Citation Graph (, )][DBLP]
Mining Objective Process Metrics from Repository Data. [Citation Graph (, )][DBLP]
A Multi-Dimensional Classification for Users of Security Patterns. [Citation Graph (, )][DBLP]
The Secure Three-Tier Architecture Pattern. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|