2008 |
13 | EE | Eduardo B. Fernández,
Mihai Fonoage,
Michael VanHilst,
Mirela Marta:
The Secure Three-Tier Architecture Pattern.
CISIS 2008: 555-560 |
12 | EE | Fabrício A. Braz,
Eduardo B. Fernández,
Michael VanHilst:
Eliciting Security Requirements through Misuse Activities.
DEXA Workshops 2008: 328-333 |
11 | | Michael VanHilst,
Eduardo B. Fernández,
Fabrício A. Braz:
A Multi-Dimensional Classification for Users of Security Patterns.
WOSIS 2008: 89-98 |
2006 |
10 | EE | Eduardo B. Fernández,
Michael VanHilst,
María M. Larrondo-Petrie,
Shihong Huang:
Defining Security Requirements Through Misuse Actions.
IFIP Workshop on Advanced Software Engineering 2006: 123-137 |
2005 |
9 | EE | Eduardo B. Fernández,
Saeed Rajput,
Michael VanHilst,
María M. Larrondo-Petrie:
Some Security Issues of Wireless Systems.
ISSADS 2005: 388-396 |
8 | EE | Michael VanHilst,
Pankaj K. Garg,
Christopher Lo:
Repository mining and Six Sigma for process improvement.
MSR 2005: 1-4 |
7 | EE | Shihong Huang,
Scott R. Tilley,
Michael VanHilst,
Damiano Distante:
Adoption-Centric Software Maintenance Process Improvement via Information Integration.
STEP 2005: 25-34 |
6 | EE | Michael VanHilst,
Pankaj K. Garg,
Christopher Lo:
Repository mining and Six Sigma for process improvement.
ACM SIGSOFT Software Engineering Notes 30(4): 1-4 (2005) |
2003 |
5 | EE | Michael VanHilst,
Martin L. Griss:
Goal-Directed Design for Proactive and Intelligent Device Collaboration.
KES 2003: 841-848 |
2001 |
4 | | Lewis G. Creary,
Michael VanHilst:
"Where Are the Christmas Decorations?": A Memory Assistant for Storage Locations.
NLDB 2001: 165-175 |
1996 |
3 | | Michael VanHilst,
David Notkin:
Using C++ Templates to Implement Role-Based Designs.
ISOTAS 1996: 22-37 |
2 | | Michael VanHilst,
David Notkin:
Using Role Components to Implement Collaboration-Based Designs.
OOPSLA 1996: 359-369 |
1 | EE | Michael VanHilst,
David Notkin:
Decoupling Change from Design.
SIGSOFT FSE 1996: 58-69 |