- [1]
- S. Arumugam.
AZIMAS: Web mobile agent system.
Master's thesis, University of Florida, FL, USA, 2003.
- [2]
- (Author names in Chinese).
Survey on the theories
and methods of formal analyses for security protocols.
Journal of the Graduate School of the Chinese Academy of Sciences,
20(4):389–405, 2003.
In Chinese.
- [3]
- M.A.
Belsis and L. Smalov.
Building an enterprise IT security management system.
IFIP TC11 18th International Conference on Information Security, SEC
2003, 122:181–192, 2003.
(doi:10.1007/978-0-387-35691-4_16)
- [4]
- Stefano Bistarelli, Simon N.
Foley, and Barry O'Sullivan.
A
constraint-based framework for the cascade vulnerability problem.
In ICLP2003 Workshop on Constraint and Logic Programming in Security
(COLOPS2003), 2003.
- [5]
- Terry
Bollinger.
Software cooperatives:
Infrastructure in the internet era, October 2003.
Available online http://www.terrybollinger.com/swcoops/swcoops/.
- [6]
- R. Breu,
K. Burger, M. Hafner,
J. Jürgens, G. Popp,
G. Wimmel, and V. Lotz.
Key
issues of a formally based process model for security engineering.
In 16th International Conference Software and Systems Engineering and
their Applications, December 2003.
- [7]
- Terrence A.
Brooks.
Web search: how the
Web has changed information retrieval.
Information Research, 8(3), April 2003.
Paper no. 154.
- [8]
- Jeff
Carver, Forrest Shull, and Victor Basili.
Observational studies to accelerate process experience in classroom studies: An
evaluation.
In Proceedings of 2003 ACM-IEEE International Symposium on Empirical
Software Engineering (ISESE 2003), pages 72–79, September 2003.
- [9]
- Q. Chen,
C. Zhang, S. Zhang, and C. Li.
Verifying the purchase request in SET protocol.
In Web Technologies and Applications: 5th Asia-Pacific Web Conference,
APWeb 2003, pages 263–274. Springer-Verlag, 2003.
Lecture Notes in Computer Science 2642.
- [10]
- A. Chitra and G. Sudha
Sadasivam.
Design
and implementation of a static bridge between COM and Corba distributed
objects.
Transactions of the SDPS: Journal of Integrated Design and Process
Science, 7(4):25–33, September 2003.
- [11]
- N. H.
Christensen.
Domain-specific
languages in software development - and the relation to partial
evaluation.
PhD thesis, Dept. of Computer Science, University of Copenhagen, Copenhagen
East, Denmark, July 2003.
- [12]
- Christian Decker, Uwe Kubach,
and Michael Beigl.
Revealing the
retail black box by interaction sensing.
In Michael Beigl, editor, 3rd International Workshop on
Smart Appliances and Wearable Computing (IWSAWC 2003), May 2003.
- [13]
- Dave L.
Edyburn.
2002 in review: A
synthesis of the special education technology literature.
Journal of Special Education Technology, 18(3), Summer 2003.
- [14]
- Holger Eichelberger and
Jurgen Wolff von Gudenberg.
UML
class diagrams—state of the art in layout techniques.
In Proceedings of VISSOFT 2003: 2nd Annual ``Designfest'' on
visualizing software for understanding and analysis. NWO, September
2003.
- [15]
- Rudinei Goularte, Edson dos
Santos Moreira, and Maria da Graça C. Pimentel.
Structuring interactive TV documents.
In Proceedings of the 2003 ACM Symposium on Document Engineering,
pages 42–51. ACM Press, 2003.
(doi:10.1145/958220.958229)
- [16]
- J. Gray and G. Karsai.
An
examination of DSLs for concisely representing model traversals and
transformations.
In Proc. Domain-Specific Language Minitrack, 36th Hawaii Int. Conf. on
System Sciences (HICSS-36), January 2003.
- [17]
- Urs Hoezle.
Archiving the Web is feasible today.
Communications of the ACM, 46(5):11, May 2003.
- [18]
- Killer computer bugs.
IEEE Spectrum, Progress column, March 2003.
p. 63.
- [19]
- Mike
Jochen, Lori Pollock, and Lisa Marvel.
Zero footprint tamper detection for object files.
In Proceedings of the Collaborative Technology Alliances Communications
& Networks Alliance (CTA C&N) Annual Symposium, April 2003.
- [20]
- Mike
Jochen, Lori Pollock, and Lisa Marvel.
Tamper detection marking for object files.
In Military Communications Conference, MILCOM, pages 747–751,
October 2003.
- [21]
- Mike
Jochen, Lisa Marvel, and Lori Pollock.
A
framework for tamper detection marking of mobile applications.
In International Symposium on Software Reliability Engineering
(ISSRE), November 2003.
- [22]
- Derek M. Jones.
The New C Standard: An Economic and Cultural Commentary.
Addison-Wesley, 2003.
- [23]
- B. Karabacak and
I. Sogukpinar.
Risk analizi ve yonetimi surecleri.
A New Electronic Journal in Computer Science, III, 2003.
In Turkish.
- [24]
- Hayato Kawashima and Katsuhiko
Gondow.
Experience
with ANSI C markup language for a cross-referencer.
In Proc. Domain-Specific Language Minitrack, 36th Hawaii Int. Conf. on
System Sciences (HICSS-36), January 2003.
- [25]
- Warren
Keuffel.
Outside the box.
Software Development Magazine, September 2003.
- [26]
- S. Kwon, T.
amd Lim.
Automation-considered logic of automation and key distribution.
In Proceedings of the 4th WISA International Workshop on Information
Security Applications, pages 442–457. Springer Verlag, August 2003.
Lecture Notes in Computer Science 2908.
(doi:10.1007/b95188)
- [27]
- Brendan
Lawlor and Linh Vu.
A
survey of techniques for security architecture analysis.
Technical Report DSTO-TR-1438, DSTO Information Sciences Laboratory, Edinburgh,
South Australia, 2003.
- [28]
- S. Lukell.
Attack construction analysis of cryptographic protocols within a
multidimentional security protocol engineering framework.
Master's thesis, Cape Town University, August 2003.
- [29]
- Julio César Luz and
João José Neto.
Tecnologa
adaptativa aplicada à otimização de código em
compiladores.
In IX Congreso Argentino de Ciencias de la Computación,
October 2003.
In Spanish.
- [30]
- Jun Ma,
Holger M. Kienle, Piotr Kaminski,
Anke Weber, and Marin Litoiu.
Customizing
Lotus notes to build software engineering tools.
In Proceedings of the 2003 Conference of the Centre for Advanced Studies
Conference on Collaborative Research, pages 211–222. IBM Press,
2003.
- [31]
- Soha Maad.
The potential and pitfall of
interactive tv technology: An empirical study.
In Television in Transition International Conference, May
2003.
- [32]
- Andrew P.
Martin.
Key
determinants of information availability: A multiple case study.
Master's thesis, Department of Information Systems and Quantitative Analysis,
University of Nebraska at Omaha, Nebraska, OM, May 2003.
- [33]
- Richard
Mateosian.
So many books, so little time.
IEEE Micro, pages 7, 79, September 2003.
- [34]
- M. Mernik, J. Heering, and
A.M. Sloane.
When and how to
develop domain-specific languages.
Report SEN-E0309, Centrum voor Wiskunde en Informatica (CWI), Amsterdam, NL,
December 2003.
Available online http://ftp.cwi.nl/CWIreports/SEN/SEN-E0309.pdf.
- [35]
- John Millaway and Phillip
Conrad.
C
server pages: An architecture for dynamic web content generation.
In Twelfth International World Wide Web Conference. International
World Wide Web Conference Committee, May 2003.
- [36]
- W. Morein, A. Stavrou,
D. Cook, A. Keromytis, V. Misra,
and D. Rubenstein.
Using graphic turing tests to counter automated DDoS attacks against web
servers.
In Proceedings of the 10th ACM International Conference on Computer and
Communications Security (CCS), pages 8–19, October 2003.
- [37]
- Thomas
Müller.
Computer
system and method for running an extensible database.
European Patent 1288791, 2003.
- [38]
- Mathee Olarnsakul and
Dentcho N. Batanov.
A method for developing component-oriented applications: A use-context driven
approach toward component coordination.
Knowledge and Information Systems, 5:466–502, 2003.
(doi:10.1007/s10115-002-0085-2)
- [39]
- B. Padmanabhan.
Modeling and analysis of security protocols using CASPER.
Master's thesis, Syracuse University, August 2003.
- [40]
- Chengyuan Peng and Petri
Vuorimaa.
Optimizing mobile electronic
program guide by adaptive learning.
In M. H. Hamza, editor, The Third IASTED International
Conference on Artificial Intelligence and Applications (AIA 2003).
ACTA Press, September 2003.
- [41]
- Lori Reed-Fourquet, John T.
Lynch, Michael K. Martin, Michael Cascio,
Wing-Yan Leung, and Philip P. Ruenhorst.
The
CHIME-trust healthcare public key infrastructure and trusted third party
services: A case-study.
In Jeff Collmann, editor, CPRI Toolkit for Health Care
Security Management, chapter 4.9.4, pages 1–10. Healthcare
Information and Management Systems Society, Chicago, IL, 2003.
Available online http://www.himss.org/asp/cpritoolkit_homepage.asp.
- [42]
- David S. H. Rosenthal, Mema
Roussopoulos, Petros Maniatis, and Mary Baker.
Economic
measures to resist attacks on a peer-to-peer network.
In Workshop on Economics of Peer-to-Peer Systems, June 2003.
- [43]
- David S. H.
Rosenthal.
A digital preservation
appliance based on OpenBSD.
In Proceedings of BSDCon '03. USENIX, USENIX Association,
September 2003.
- [44]
- C. Roser, M. Nakano, and
M. Tanaka.
Buffer allocation model based on a single simulation.
In Winter Simulation Conference Proceedings, volume 2, pages
1238–1246, 2003.
- [45]
- Rok
Rupnik and Marjan Krisper.
The
role of mobile applications in information systems.
In Second International Mobile Business Conference, June
2003.
- [46]
- E. Saul and A. Hutchison.
Enhanced security protocol engineering through a unified multidimensional
framework.
IEEE Journal on Selected Areas in Communications, 21(1):62–76,
2003.
(doi:10.1109/JSAC.2002.806128)
- [47]
- Craig Schmugar and Vincent
Gullotto.
Method
and apparatus for a virus information patrol.
United States Patent 6,654,751, November 2003.
Assignee: Networks Associates Technology, Inc. (Santa Clara, CA).
- [48]
- Stelios Sidiroglou and
Angelos D. Keromytis.
Countering
network worms through automatic patch generation.
Technical Report CUCS-029-03, Computer Science Dept. University of Columbia,
2003.
- [49]
- Stephen Smith and Rodger
Jamieson.
Key drivers and
inhibitors for information system security within e-government.
In 14th Australasian Conference on Information Systems, November
2003.
- [50]
- S. Smith.
Key drivers and inhibitors for information system security within egovernment.
In Proceedings if the 14th Australasian Conference on Information
Systems, 2003.
- [51]
- Varadharajan Sridhar and
Bharat Bhasker.
Managing information security on a shoestring budget.
Annals of Cases on Information Technology, pages 151–167,
2003.
- [52]
- Vijayan Sugumaran and Veda C.
Storey.
A semantic-based approach to component retrieval.
SIGMIS Database, 34(3):8–24, 2003.
(doi:10.1145/937742.937745)
- [53]
- H. Tempelmeier.
Practical considerations in the optimization of flow production systems.
International Journal of Production Research, 41(1):149–170,
2003.
(doi:10.1080/00207540210161641)
- [54]
- H. Tempelmeier.
Simultaneous
buffer and workload optimization for aysnchronous flow production
systems.
In Fourth Aegean International Conference on the Analysis and Modelling
of Manufacturing Systems, pages 31–39. University of the Aegean,
2003.
- [55]
- Kentaro
Toyama, Ron Logan, and Asta Roseway.
Geographic location tags on digital images.
In Proceedings of the eleventh ACM international conference on
Multimedia, pages 156–166. ACM Press, 2003.
(doi:10.1145/957013.957046)
- [56]
- T. Tryfonas and
E. Kiountouzis.
Perceptions of security contributing to the implementation of secure IS.
IFIP TC11 18th International Conference on Information Security, SEC
2003, 122:313–324, 2003.
(doi:10.1007/978-0-387-35691-4_27)
- [57]
- Angeliki
Tsilira.
Targeted delivery of messages with use of mobile devices.
Master's thesis, Athens University of Economics and Business, Department of
Management Science and Technology, Athens, Greece, 2003.
- [58]
- Chung-Kie Tung.
Tuning
webmail performance: the design and implementation of open webmail.
In International Conference on Open Source 2003, July 2003.
- [59]
- Ana I.
Vicente.
La convergence de la sécurité informatique et la protection des
données à caractère personnel: vers une nouvelle approche
juridique.
Master's thesis, Universite de Montreal, 2003.
- [60]
- Gregory V.
Wilson.
Reading code.
Dr. Dobb's Journal, September 2003.