The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SSR"( http://dblp.L3S.de/Venues/SSR )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secsr

Publication years (Num. hits)
1995 (40) 1997 (26) 1999 (24) 2001 (20) 2014 (15) 2015-2016 (27) 2018-2019 (18) 2020-2023 (15)
Publication types (Num. hits)
inproceedings(175) proceedings(10)
Venues (Conferences, Journals, ...)
SSR(185)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 151 occurrences of 104 keywords

Results
Found 185 publication records. Showing 185 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Md. Wasiuddin Pathan Shuvo, Md. Nazmul Hoq, Suryadipta Majumdar, Paria Shirani On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT. Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Stefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Heider, Daniel Herzinger, Felix Schärtl, Joo Yeon Cho, Tobias Guggemos, Daniel Loebenberger Quantum-Resistant MACsec and IPsec for Virtual Private Networks. Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Bertram Poettering, Simon Rastikian A Study of KEM Generalizations. Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Felix Günther 0001, Julia Hesse (eds.) Security Standardisation Research - 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Panos Kampanakis, Tancrède Lepoint Vision Paper: Do We Need to Change Some Things? - Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments. Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Saqib A. Kakvi, Keith M. Martin, Colin Putman, Elizabeth A. Quaglia SoK: Anonymous Credentials. Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock Post-quantum Security for the Extended Access Control Protocol. Search on Bibsonomy SSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Saqib A. Kakvi SoK: Comparison of the Security of Real World RSA Hash-and-Sign Signatures. Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lukas Brandstetter, Marc Fischlin, Robin Leander Schröder, Michael Yonli On the Memory Fault Resilience of TLS 1.3. Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Stanislav Smyshlyaev, Igor B. Oshkin On Internal Re-keying. Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Konstantinos Chalkias, François Garillot, Valeria Nikolaenko Taming the Many EdDSAs. Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thyla van der Merwe, Chris J. Mitchell, Maryam Mehrnezhad (eds.) Security Standardisation Research - 6th International Conference, SSR 2020, London, UK, November 30 - December 1, 2020, Proceedings Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Rikke Bjerg Jensen The Vacuity of the Open Source Security Testing Methodology Manual. Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Melissa Azouaoui, Davide Bellizia, Ileana Buhan, Nicolas Debande, Sébastien Duval, Christophe Giraud 0001, Éliane Jaulmes, François Koeune, Elisabeth Oswald, François-Xavier Standaert, Carolyn Whitnall A Systematic Appraisal of Side Channel Evaluation Strategies. Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Harry Halpin Vision: A Critique of Immunity Passports and W3C Decentralized Identifiers. Search on Bibsonomy SSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Justin Whitaker, Sathvik Prasad, Bradley Reaves, William Enck Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saqib A. Kakvi On the Security of RSA-PSS in the Wild. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohsin Khan, Philip Ginzboorg, Valtteri Niemi Privacy Preserving AKMA in 5G. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogeny. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao 0001 (eds.) Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman, Léo Perrin Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wanpeng Li, Chris J. Mitchell, Thomas M. Chen OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Flor Álvarez, Lars Almon, Ann-Sophie Hahn, Matthias Hollick Toxic Friends in Your Network: Breaking the Bluetooth Mesh Friendship Concept. Search on Bibsonomy SSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1John Kelsey The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haibat Khan, Benjamin Dowling, Keith M. Martin Identity Confidentiality in 5G Mobile Telephony Systems. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kristof Teichel, Gregor Hildermeier Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization Protocols. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cas Cremers, Anja Lehmann (eds.) Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marcello Balduccini, Claire Vishik Building Blocks in Standards: Improving Consistency in Standardization with Ontology and Reasoning. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alessandro Bruni, Thorvald Sahl Jørgensen, Theis Grønbech Petersen, Carsten Schürmann 0001 Formal Verification of Ephemeral Diffie-Hellman Over COSE (EDHOC). Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Darren Hurley-Smith, Julio C. Hernandez-Castro Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohsin Khan, Philip Ginzboorg, Kimmo Järvinen 0001, Valtteri Niemi Defeating the Downgrade Attack on Identity Privacy in 5G. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Harry Halpin, Ksenia Ermoshina, Francesca Musiani Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karthikeyan Bhargavan, Franziskus Kiefer, Pierre-Yves Strub hacspec: Towards Verifiable Crypto Standards. Search on Bibsonomy SSR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida Analyzing and Fixing the QACCE Security of QUIC. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohamed Sabt, Jacques Traoré Cryptanalysis of GlobalPlatform Secure Channel Protocols. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Thyla van der Merwe Reactive and Proactive Standardisation of TLS. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao 0001, Aad P. A. van Moorsel NFC Payment Spy: A Privacy Attack on Contactless Payments. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alberto De la Rosa Algarin, Steven A. Demurjian Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jonathan Katz Analysis of a Proposed Hash-Based Signature Standard. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David A. McGrew, Panos Kampanakis, Scott R. Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann 0001 State Management for Hash-Based Signatures. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yoshikazu Hanatani, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, Subir Das Secure Multicast Group Management and Key Distribution in IEEE 802.21. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kelsey Cairns, Harry Halpin, Graham Steel Security Analysis of the W3C Web Cryptography API. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, John D. Ramsdell, Paul D. Rowe Cross-Tool Semantics for Protocol Security Goals. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Rainer Urian Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Frank Morgner, Paul Bastian, Marc Fischlin Attribute-Based Access Control Architectures with the eIDAS Protocols. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lidong Chen, David A. McGrew, Chris J. Mitchell (eds.) Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gautham Sekar Side Channel Cryptanalysis of Streebog. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhenfeng Zhang, Kang Yang 0002, Jiang Zhang 0001, Cheng Chen Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Boyeon Song Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masatoshi Hokino, Yuri Fujiki, Sakura Onda, Takeaki Kaneko, Natsuhiko Sakimura, Hiroyuki Sato A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, Chris J. Mitchell, Po-Wah Yau Generating Unlinkable IPv6 Addresses. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Feng Hao 0001, Siamak Fayyaz Shahandashti Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammed Shafiul Alam Khan, Chris J. Mitchell Improving Air Interface User Privacy in Mobile Telephony. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Antonio González-Burgueño, Sonia Santiago, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 Analysis of the PKCS#11 API Using the Maude-NPA Tool. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange 0001, Ruben Niederhagen, Christine van Vredendaal How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liqun Chen, Shin'ichiro Matsuo (eds.) Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe Formal Support for Standardizing Protocols with State. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao 0001 Authenticated Key Exchange over Bitcoin. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kristof Teichel, Dieter Sibold, Stefan Milius First Results of a Formal Analysis of the Network Time Security Specification. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Karl Christoph Ruland, Jochen Sassmannshausen Non-repudiation Services for the MMS Protocol of IEC 61850. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Phillip H. Griffin Standardization Transparency - An Out of Body Experience. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christopher W. Brown 0001, Michael Jenkins Analyzing Proposals for Improving Authentication on the TLS/SSL-Protected Web. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Feng Hao 0001, Siamak Fayyaz Shahandashti The SPEKE Protocol Revisited. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther 0001, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman, Moses D. Liskov, Paul D. Rowe Security Goals and Evolving Standards. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nils Fleischhacker, Mark Manulis, Amir Azodi A Modular Framework for Multi-Factor Authentication and Key Exchange. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Duncan Garrett, Michael Ward Blinded Diffie-Hellman - Preventing Eavesdroppers from Tracking Payments. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Chris J. Mitchell (eds.) Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane Mapping. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jinwoo Lee, Pil Joong Lee Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Antonio González-Burgueño, Sonia Santiago, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 Analysis of the IBM CCA Security API Protocols in Maude-NPA. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Douglas Stebila, Nick Denham Secure Modular Password Authentication for the Web Using Channel Bindings. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Cas Cremers, Marko Horvat 0002 Improving the ISO/IEC 11770 Standard for Key Management Techniques. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Efstathios Stathakidis, Steve A. Schneider, James Heather Robustness Modelling and Verification of a Mix Net Protocol. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Britta Hale, Colin Boyd Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eila Niemelä, Tuomas Ihme Product line software engineering of embedded systems. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF quality attributes, domain engineering, product line architecture, product features
1Margaretha W. Price, Donald M. Needham, Steven A. Demurjian Producing reusable object-oriented components: a domain-and-organization-specific perspective. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF quantification and metrics, reuse process, component based engineering
1Felix Bachmann, Leonard J. Bass Managing variability in software architectures. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF strategic reuse, variation points, software architecture, variability, requirement analysis, product lines
1Murali Sitaraman, Gregory Kulczycki, Joan Krone, William F. Ogden, A. L. Narasimha Reddy Performance specification of software components. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF generic objects, time & space analysis, data structures, storage management
1 Proceedings of the ACM SIGSOFT Symposium on Software Reusability: Putting Software Reuse in Context, SSR 2001, May 18-20, 2001, Toronto, Ontario, Canada Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Mansour Zand, Paul Bassett, Rubén Prieto Díaz Closing panel: where are we standing? can we say "reuse is dead, long live reuse" or is it too soon? Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Katsuhisa Maruyama Automated method-extraction refactoring by using block-based slicing. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Gregory Butler, Lugang Xu Cascaded refactoring for framework. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF architecture, framework, design pattern, evolution, refactoring, use case, role, feature model, domain analysis, hotspot
1Hassan Gomaa, Daniel A. Menascé, Michael E. Shin Reusable component interconnection patterns for distributed software architectures. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF UML, software architecture, patterns, software reuse, software component, distributed applications, client/server systems
1Tak Wong, Stan Jarzabek, Soe Myat Swe, Ru Shen, Hongyu Zhang 0002 XML implementation of frame processor. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF frame technology, variant requirements, XML, product families
1Marija Mikic-Rakic, Nenad Medvidovic Increasing the confidence in off-the-shelf components: a software connector-based approach. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Kurt Stirewalt, Laura K. Dillon Generation of visitor components that implement program transformations. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF amalia, curried visitor framework, lightweight analysis components, program transformations, visitor pattern
1Yasuyuki Tahara, Nobukazu Toshiba, Akihiko Ohsuga, Shinichi Honiden Secure and efficient mobile agent application reuse using patterns. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Internet
1Regina M. M. Braga, Marta Mattoso, Cláudia Maria Lima Werner The use of mediation and ontology technologies for software component information retrieval. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF software classification and identification, domain engineering, component repositories, component based engineering
1Silke Eckstein, Peter Ahlbrecht, Karl Neumann Techniques and language constructs for developing generic informations systems: a case study. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF parameterized programming, parameterized specification, Java, UML, UML, information systems, application generators
1Juha Savolainen, Juha Kuusela Violatility analysis framework for product lines. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF volatility analysis, requirements engineering, evolution, variability, product line, domain analysis, commonality
1Maya Daneva Evaluating the value-added benefits of using requirements reuse metrics in ERP projects. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF benefits assessment, requirements reuse measurement, reuse- driven requirements engineering
1Jun-Jang Jeng An approach to designing reusable service frameworks via virtual service machine. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF service computing platform, service framework, software architecture, object-oriented technologies
1Roland T. Mittermeir, Andreas Bollin, Heinz Pozewaunig, Dominik Rauner-Reithmayer Goal-driven combination of software comprehension approaches for component based development. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF specification animation, cognitive models, program comprehension, software visualization, trace analysis
1Cristina Gacek, Michalis Anastasopoules Implementing product line variabilities. Search on Bibsonomy SSR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF implementation approaches, implementing variabilities, product line variability, software product lines, traceability
1Jesse Aronson, Prasanta K. Bose A Model-Based Approach to Simulation Composition. Search on Bibsonomy SSR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF domain-specific architectural model, simulation, constraints, composition, hierarchical decomposition, component selection
1Maya Daneva Measuring Reuse of SAP Requirements: A Model-Based Approach. Search on Bibsonomy SSR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF quantification and metrics for reuse, reuse of software engineering work products, component-based engineering
1Christine L. Braun A Lifecycle Process for the Effective Reuse of Commercial Off-the-Shelf (COTS) Software. Search on Bibsonomy SSR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF life-cycle process, architectures, reuse, COTS, product lines
1Murali Sitaraman, Maggie Davis, Premkumar T. Devanbu, Jeffrey S. Poulin, Alexander Ran, Bruce W. Weide Reuse Research: Contributions, Problems and Non-Problems. Search on Bibsonomy SSR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Maurizio Morisio, Michel Ezran, Colin Tully Introducing Reuse in Companies: A Survey of European Experiences. Search on Bibsonomy SSR The full citation details ... 1999 DBLP  DOI  BibTeX  RDF case studies and experience reports, industrial experiences and assessment
Displaying result #1 - #100 of 185 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license