- [1]
- G. Allon, T. Raviv, and
R. Y. Rubinstein.
Application of the cross entropy method for buffer allocation problem in
simulation based environment.
In Fourth Workshop on Rare Event Simulation and Related Combinatorial
Optimization Problems, RESIM/COP'02, April 2002.
- [2]
- Subramanian Arumugam,
Abdelsalam (Sumi) Helal, and Amar Nalla.
aZIMAS: Web mobile agent system.
In N. Suri, editor, Mobile Agents : 6th International
Conference MA 2002, pages 1–15. Springer-Verlag, October 2002.
Lecture Notes in Computer Science; Vol 2535.
- [3]
- M. Belsi.
Developing an enterprise IT security data model.
Master's thesis, Coventry University, January 2002.
- [4]
- M.A.
Belsis, A.N. Godwin, and L. Smalov.
An enterprise IT security data model.
In 4th International Conference on Enterprise Information Systems, ICEIS
2002, volume 2, pages 885–891. ICEIS Press, 2002.
- [5]
- T. Bohne.
A general intruder for security protocols in MANDE.
Master's thesis, University of Wyoming, 2002.
- [6]
- Gérard Chauvel, Maija
Kuusela, Dominique D'Inverno, and Serge
Lasserre.
Task
based adaptive profiling and debugging.
European Patent 1182556, 2002.
- [7]
- Kefeng Chen.
Methods
and systems for authenticating business partners for secured electronic
transactions.
World Intellectual Property Organization Patent 0206932, 2002.
- [8]
- A. Dolgui, A. Eremeev,
A. Kolokolov, and V. Sigaev.
A genetic algorithm for buffer allocation in production line with unreliable
machines.
Journal of Mathematical Modelling and Algorithms, 1(2):89–104,
2002.
(doi:10.1023/A:1016560109076)
- [9]
- Liu
Dongxi, Li Xiaoyong, and Bai Yingcai.
An attack-finding algorithm for security protocols.
Journal of Computer Science and Technology, 17(4):450–463,
2002.
- [10]
- Myrna C. M dos Santos,
José A. M. Xexéo, and José F.
de Rezende.
Anáalise
formal de protocolos de segurança para redes celulares.
Technical Report GTA-02-26, Universidade Federal do Rio de Janeiro/UFRJ,
2002.
- [11]
- A. J.
D'Souza.
Formal analysis on cryptographic protocols.
Master's thesis, Indian Institute of Technology, Bombay, India, May 2002.
- [12]
- Michael Goedicke and Uwe
Zdun.
Piecemeal
legacy migrating with an architectural pattern language: A case study.
In Journal of Software Maintenance and Evolution: Research and
Practice, 14(1):1–30, 2002.
(doi:10.1002/smr.243)
- [13]
- M. Grechanik, D. Perry, and
D. Batory.
An approach to evolving database dependent systems.
In International Workshop on Principles of Software Evolution
(IWPSE), pages 113–116, 2002.
- [14]
- Mark
Grechanik, Dewayne Perry, and Don Batory.
An
approach to change management of evolving database schemas.
In Seventh International Conference on Software Reuse ICSR 2002—Young
Researchers Workshop, 2002.
- [15]
- Mark Grechanik, Dewayne
Perry, and Don Batory.
An approach to evolving database dependent systems.
In International Conference on Software Engineering: Proceedings of the
International Workshop on Principles of Software Evolution, pages
113–116. ACM Press, 2002.
(doi:10.1145/512035.512061)
- [16]
- K. Haneda, T. Kajima,
T. Koyama, H. Muranaka, H. Dojo,
and Y. Aratani.
Development of quantitative security optimization approach for the picture
archives and carrying system between a clinic and a rehabilitation center.
Proceedings of SPIE — The International Society for Optical
Engineering, 4685:422–429, 2002.
(doi:10.1117/12.467036)
- [17]
- Elliott
Hughes.
How many trivial getter methods does Java have.
SIGPLAN Notices, 37(8):19–24, August 2002.
- [18]
- Jan
Jürjens.
Secure Java development with UML.
In Proceedings of the First INetSec '01 International IFIP TC-11 WG 11.4
Working Conference on Network Security. IFIP, Kluwer, November
2002.
- [19]
- J. Jürjens.
Modelling audit security for smart-card payment schemes with uml-sec.
IFIP TC11 16th International Conference on Information Security, lFIP/Sec
2001, 65:93–107, 2002.
- [20]
- Kazuhiko
Kato and Yoshihiro Oyama.
Softwarepot:
An encapsulated transferable file system for secure software circulation.
In Software Security — Theories and Systems: Proceedings of the
International Symposium on Software Security, pages 112–132.
Springer-Verlag, November 2002.
Lecture Notes in Computer Science; Vol 2609.
- [21]
- Holger M. Kienle, Anke Weber,
Jens Jahnke, and Hausi A. Müller.
Tackling
the adoption problem of domain-specific visual languages.
In 2nd OOPSLA Workshop on Domain Specific Visual Languages,
November 2002.
- [22]
- Victor Kouznetsov, Charles L.
Vigue, Martin Fallenstedt, and Daniel
Melchione.
System
and method to verify trusted status of peer in a peer-to-peer network
environment.
European Patent 1259045, 2002.
- [23]
- Sumit
Kumar, Rajesh Rajamani, and Abhishek Saxena.
Comminst:
Instrumenting process communication, 2002.
Available online http://www.cs.wisc.edu/ raj/comminst/comminstpaper.doc.
- [24]
- Philipp W.
Kutter.
Montages — Engineering in Computer Languages.
PhD thesis, Swiss Federal Institute of Technology, Zurich, CH, 2002.
- [25]
- Philipp W.
Kutter.
Replacing
generation of interpreters with a combination of partial evaluation and
parameterized signatures, leading to a concept for meta-bootstrapping.
In ECOOP'2002 Workshop on Generative Programming, 2002.
- [26]
- G. Liu,
Y. He, Y. Qiu, and J. Yu.
Research on influence of solving quality based on different initializing
solution algorithm in tabu search.
In 1st International Conference on Communications, Circuits and Systems,
ICCCAS 2002, volume 2, pages 1141–1145. Institute of Electrical and
Electronics Engineers Inc., 2002.
(doi:10.1109/ICCCAS.2002.1178986)
- [27]
- C. Löbbecke and
M. Falkenberg.
A framework for assessing market entry opportunities for internet-based TV.
International Journal on Media Management, 4(2), 2002.
- [28]
- S. Lukell and H. Hutchison.
Attack construction analysis of cryptographic protocols within a
multidimentional security protocol engineering framework.
Technical report, Cape Town University, 2002.
- [29]
- David
Mussington.
Concepts
for enhancing critical infrastructure protection : relating Y2K to CIP
research and development.
RAND, Santa Monica, CA, USA, 2002.
- [30]
- E. W. T.
Ngai and F. K. T. Wat.
A literature review and classification of e-commerce research.
Information and Management, 39(5):415–429, March 2002.
- [31]
- Frédéric Oehl and
David Sinclair.
Combining
ISABELLE and Timbuk for cryptographic protocol verification.
In Securité de la Communication sur Intenet: SECI 02, pages
57–67, Tunis, Tunisia, September 2002. INRIA, Le Centre de Calcul El
Khawarizmi.
- [32]
- F. Oehl,
G. Cece, O. Kouchnarenko, and
D. Sinclair.
Automatic approximation
for the verification of cryptographic protocols.
In P. Ryan, editor, Proceedings of the Conference on
Formal Aspects of Security. Springer-Verlag, 2002.
Lecture Notes in Computer Science; Vol 2629.
- [33]
- Yoshihiro
Oyama, Katsunori Kanda, and Kazuhiko Kato.
Design and
implementation of secure software execution system SoftwarePot.
Computer Software, 19(6):2–12, November 2002.
In Japanese.
- [34]
- J. Pang.
Analysis of a security protocol in μcrl.
CWI Technical Report SEN-R0201, Centrum voor Wiskunde en Informatica,
Amsterdam, The Netherlands, January 2002.
- [35]
- M. Panti, L. Spalazzi, and
S. Tacconi.
Attacks
on cryptographic protocols: A survey.
Technical Report TR-2002-10, University of Ancona, 2002.
- [36]
- Dietrich Paulus and Joachim
Hornegger.
Applied Pattern Recognition: A Practical Introduction to Image and Speech
Processing in C++.
Vieweg, fourth edition, 2002.
- [37]
- Radia J.
Perlman.
Efficient
revocation of registration authorities.
World Intellectual Property Organization Patent 02060148, 2002.
- [38]
- Konstantinos
Raptis.
Software
Component Communication Methodologies.
PhD thesis, University of the Aegean, Department of Information and
Communication Systems, Samos, Greece, 2002.
In Greek.
- [39]
- Erik
Riedel, Mahesh Kallahalla, and Ram
Swaminathan.
A
framework for evaluating storage system security.
In Proceedings of the FAST 2002 Conference on FILE and Storage
Technologies. USENIX, USENIX Association, January 2002.
- [40]
- E. Saul and A. Hutchison.
Using GYPSIE, GYNGER and visual GNY to analyze cryptographic protocols in
SPEAR II.
IFIP TC11 WG11.1/WG11.2 8th Annual Working Conference on Information
Security Management and Small Systems Security, 72:73–85, 2002.
- [41]
- A. Schreiner.
Unix tools as visual programming components in a GUI-builder environment.
ACM Computing Reviews, November 2002.
- [42]
- Glenn
Vanderburg.
Using the source: Software archaeology for users of open source software.
Online
http://www.delphis.com/downloads/presentations/java/UsingTheSource_handouts.pdf
(current May 2003), July 2002.
Tutorial presented at the O'Reilly Open Source Convention.
- [43]
- Stefan Voß and David L.
Woodruff, editors.
Optimization Software Class Libraries.
Kluwer Academic Publishers, 2002.
- [44]
- Vytautas Štuikys and
Robertas Damaševičius.
Relationship model of abstractions used for developing domain generators.
Informatica, 13(1):111–128, 2002.
- [45]
- G. Wimmel and J. Jürgens.
Specification-based test generation for security-critical systems using
mutuations.
In Proceedings of the 4th ICFEM2002 International Conference on Formal
Engineering Methods. Springer-Verlag, 2002.
- [46]
- Dong xi Liu and Ying cai Bai.
A study on the proof method of authentication protocols based on Strand
space.
Journal of Software, 13(4), 2002.
- [47]
- F. Xia,
Q. Luo, and M. Yin.
Software implementation of PACS viewer: The use of COM technology.
Proceedings of SPIE — The International Society for Optical
Engineering, 4536:101–107, 2002.
(doi:10.1117/12.462532)
- [48]
- Uwe Zdun.
Language
Support for Dynamic and Evolving Software Architectures.
PhD thesis, University of Essen, Essen, Germany, January 2002.
- [49]
- X. Zhang, D. Li,
X. Zhu, and N. Chen.
Systematic plan of building web geographic information system based on activex
control.
Proceedings of SPIE — The International Society for Optical
Engineering, 4886:307–314, 2002.
(doi:10.1117/12.462322)