Awais Rashid
Orcid: 0000-0002-0109-1341Affiliations:
- University of Bristol, UK
- The University of Lancaster, UK (former)
According to our database1,
Awais Rashid
authored at least 266 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Report on the 5th International Workshop on Engineering and Cybersecurity of Critical Systems and 2nd International Workshop on Software Vulnerability Management (EnCyCriS/SVM - 2024).
ACM SIGSOFT Softw. Eng. Notes, October, 2024
Threat models over space and time: A case study of end-to-end-encrypted messaging applications.
Softw. Pract. Exp., 2024
IEEE Secur. Priv., 2024
CoRR, 2024
A framework for mapping organisational workforce knowledge profile in cyber security.
Comput. Secur., 2024
Unveiling the Hunter-Gatherers: Exploring Threat Hunting Practices and Challenges in Cyber Defense.
Proceedings of the 33rd USENIX Security Symposium, 2024
Community Security Champions: Studying the Most Influential Users on Security Stack Exchange.
Proceedings of the IEEE Secure Development Conference, 2024
Proceedings of the 2024 European Symposium on Usable Security, 2024
Porting to Morello: An In-depth Study on Compiler Behaviors, CERT Guideline Violations, and Security Implications.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
"If You Build it, They will Come" - A Blueprint for ICS-focused Capture-The-Flag Competitions.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
Towards Linking Indicators of Compromise to Operational Resilience and Safety Requirements.
Proceedings of the Sixth Workshop on CPS&IoT Security and Privacy, 2024
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Companion Publication of the 2024 ACM Designing Interactive Systems Conference, 2024
2023
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices.
IEEE Trans. Software Eng., September, 2023
ACM Trans. Softw. Eng. Methodol., July, 2023
SLR: From Saltzer and Schroeder to 2021...47 Years of Research on the Development and Validation of Security API Recommendations.
ACM Trans. Softw. Eng. Methodol., May, 2023
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study.
ACM Trans. Priv. Secur., 2023
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities.
Proc. ACM Hum. Comput. Interact., 2023
IEEE Secur. Priv., 2023
Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023
CoRR, 2023
Proceedings of the Security Protocols XXVIII, 2023
Proceedings of the 2023 New Security Paradigms Workshop, 2023
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow.
Proceedings of the 2023 European Symposium on Usable Security, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
The Internet of Insecure Cows - A Security Analysis of Wireless Smart Devices Used for Dairy Farming.
Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, 2023
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
2022
When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?
Big Data Soc., January, 2022
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups.
IEEE Trans. Software Eng., 2022
The Impact of Surface Features on Choice of (in)Secure Answers by Stackoverflow Readers.
IEEE Trans. Software Eng., 2022
Proc. Priv. Enhancing Technol., 2022
The United Kingdom's Cyber Security Degree Certification Program: A Cyber Security Body of Knowledge Case Study.
IEEE Secur. Priv., 2022
Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organisational Culture, and Current Practices.
CoRR, 2022
Better Call Saltzer & Schroeder: A Retrospective Security Analysis of SolarWinds & Log4j.
CoRR, 2022
CoRR, 2022
"Yeah, it does have a...Windows '98 Vibe": Usability Study of Security Features in Programmable Logic Controllers.
CoRR, 2022
Contrasting global approaches for identifying and managing cybersecurity risks in supply chains.
CoRR, 2022
Understanding motivations and characteristics of financially-motivated cybercriminals.
CoRR, 2022
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces.
CoRR, 2022
CoRR, 2022
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development.
CoRR, 2022
Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
From Utility to Capability: A New Paradigm to Conceptualize and Develop Inclusive PETs.
Proceedings of the 2022 New Security Paradigms Workshop, 2022
Proceedings of the 15th IEEE/ACM International Workshop on Cooperative and Human Aspects of Software Engineering , 2022
Why Rigorous Underpinnings for Cyber Security Education and Training Matter? Experiences from CyBOK: The Cyber Security Body of Knowledge.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
Proceedings of the Critical Information Infrastructures Security, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations.
CoRR, 2021
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks.
Comput. Secur., 2021
Proceedings of the IEEE Secure Development Conference, 2021
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
Tokyo, Denver, Helsinki, Lisbon or the Professor? A Framework for Understanding Cybercriminal Roles in Darknet Markets.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021
Controller-in-the-Middle: Attacks on Software Defined Networks in Industrial Control Systems.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021
AMoC: A Multifaceted Machine Learning-based Toolkit for Analysing Cybercriminal Communities on the Darknet.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2021
2020
"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making.
ACM Trans. Priv. Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers.
Softw. Pract. Exp., 2020
IEEE Secur. Priv., 2020
Challenging software developers: dialectic as a foundation for security assurance techniques.
J. Cybersecur., 2020
Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs.
CoRR, 2020
Contextualising and aligning security metrics and business objectives: A GQM-based methodology.
Comput. Secur., 2020
Industry Responses to the European Directive on Security of Network and Information Systems (NIS): Understanding policy implementation practices across critical infrastructures.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Security but not for security's sake: The impact of social considerations on app developers' choices.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Workshops, Seoul, Republic of Korea, 27 June, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020
2019
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game.
IEEE Trans. Software Eng., 2019
Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy.
Proc. Priv. Enhancing Technol., 2019
IEEE Secur. Priv., 2019
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Interventions for software security: creating a lightweight program of assurance techniques for developers.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019
Proceedings of the 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Society, 2019
Proceedings of the Critical Information Infrastructures Security, 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
2018
ACM SIGSOFT Softw. Eng. Notes, 2018
J. Netw. Comput. Appl., 2018
Comput. Lang. Syst. Struct., 2018
Mirror, Mirror, On the Wall: What are we Teaching Them All? Characterising the Focus of Cybersecurity Curricular Frameworks.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018
Safe cryptography for all: towards visual metaphor driven cryptography building blocks.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Proceedings of the Prediction and Inference from Social Networks and Social Media, 2017
Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions.
ACM SIGSOFT Softw. Eng. Notes, 2017
Sci. Comput. Program., 2017
Computer, 2017
Comput. Secur., 2017
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Scamming the Scammers: Towards Automatic Detection of Persuasion in Advance Fee Frauds.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
"I feel stupid I can't delete...": A Study of Users' Cloud Deletion Practices and Coping Strategies.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study.
Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops, 2017
Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2017
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Society Track, 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Flash mobs, Arab Spring and protest movements: Can we analyse group identities in online conversations?
Expert Syst. Appl., 2016
Digit. Investig., 2016
How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views.
Proceedings of the 2nd Workshop on Security Information Workers, 2016
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016
SimaticScan: Towards A Specialised Vulnerability Scanner for Industrial Control Systems.
Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Mimicry in online conversations: An exploratory study of linguistic analysis techniques.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
2015
ACM Comput. Surv., 2015
Proceedings of the Companion Proceedings of the 2015 ACM SIGPLAN International Conference on Systems, 2015
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 29th International Conference on Environmental Informatics, 2015
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015
Proceedings of the Business Information Systems - 18th International Conference, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the Data-Driven Process Discovery and Analysis, 2014
Proceedings of the 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014), 2014
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
Proceedings of the Advances in Enterprise Engineering VIII, 2014
Constructs Competition Miner: Process Control-Flow Discovery of BP-Domain Constructs.
Proceedings of the Business Process Management - 12th International Conference, 2014
2013
Softw. Pract. Exp., 2013
Sci. Comput. Program., 2013
Computer, 2013
EA-Analyzer: automating conflict detection in a large set of textual aspect-oriented requirements.
Autom. Softw. Eng., 2013
Proceedings of the Aspect-Oriented Requirements Engineering, 2013
Proceedings of the Aspect-Oriented Requirements Engineering, 2013
2012
Pointcut Rejuvenation: Recovering Pointcut Expressions in Evolving Aspect-Oriented Software.
IEEE Trans. Software Eng., 2012
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 34th International Conference on Software Engineering, 2012
A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
Unveiling and taming liabilities of aspects in the presence of exceptions: A static analysis based approach.
Inf. Sci., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011
Aspect assumptions: a retrospective study of AspectJ developers' assumptions about aspect usage.
Proceedings of the 10th International Conference on Aspect-Oriented Software Development, 2011
Proceedings of the Companion Volume of the 10th International Conference on Aspect-Oriented Software Development, 2011
2010
Relating Feature Models to Other Models of a Software Product Line - A Comparative Study of FeatureMapper and VML*.
LNCS Trans. Aspect Oriented Softw. Dev., 2010
Computer, 2010
Proceedings of the 5th Workshop on Automation of Software Test, 2010
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010
Proceedings of the Business Process Management Workshops, 2010
2009
Requir. Eng., 2009
Proceedings of the Third International Workshop on Variability Modelling of Software-Intensive Systems, 2009
A framework for constructing semantically composable feature models from natural language requirements.
Proceedings of the Software Product Lines, 13th International Conference, 2009
Proceedings of the Software Language Engineering, Second International Conference, 2009
Proceedings of the Software Language Engineering, Second International Conference, 2009
Proceedings of the ASE 2009, 2009
Proceedings of the 15th workshop on Early aspects, 2009
EA-Analyzer: a tool for identifying conflicting dependencies in requirements documents.
Proceedings of the 15th workshop on Early aspects, 2009
Semantic vs. syntactic compositions in aspect-oriented requirements engineering: an empirical study.
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009
Proceedings of the 8th International Conference on Aspect-Oriented Software Development, 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Early Aspects: Aspect-Oriented Requirements and Architecture for Product Lines (EA@SPLC.08).
Proceedings of the Software Product Lines, 12th International Conference, 2008
Proceedings of the Software Product Lines, 12th International Conference, 2008
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software.
Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 2008
Proceedings of the 22nd Brazilian Symposium on Software Engineering, 2008
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008
Proceedings of the Foundations of Computer Software. Future Trends and Techniques for Development, 2008
Proceedings of the 16th IEEE International Conference on Program Comprehension, 2008
Proceedings of the Computational Forensics, Second International Workshop, 2008
Proceedings of the First International Conference on Software Testing, 2008
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
Proceedings of the 13th international workshop on Early Aspects, 2008
Early aspects at ICSE 2008: workshop on aspect-oriented requirements engineering and architecture design.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
Proceedings of the ECOOP 2008, 2008
On the Impact of Evolving Requirements-Architecture Dependencies: An Exploratory Study.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008
2007
LNCS Trans. Aspect Oriented Softw. Dev., 2007
LNCS Trans. Aspect Oriented Softw. Dev., 2007
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007
Proceedings of the Early Aspects at ICSE: Workshops in Aspect-Oriented Requirements Engineering and Architecture Design, 2007
Early Aspects at ICSE 2007: Workshop on Aspect-Oriented Requirements Engineering and Architecture Design.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of the First International Symposium on Empirical Software Engineering and Measurement, 2007
Proceedings of the ECOOP 2007 - Object-Oriented Programming, 21st European Conference, Berlin, Germany, July 30, 2007
Proceedings of the Early Aspects: Current Challenges and Future Directions, 2007
Proceedings of the 6th International Conference on Aspect-Oriented Software Development, 2007
2006
Softw. Pract. Exp., 2006
ACM SIGSOFT Softw. Eng. Notes, 2006
Proceedings of the Model Driven Engineering Languages and Systems, 2006
Proceedings of the Reuse of Off-the-Shelf Components, 2006
Proceedings of the Software Architecture, Third European Workshop, 2006
Aspects and Evolution: The Case for Versioned Types and Meta-Aspect Protocols.
Proceedings of the RAM-SE'06-ECOOP'06 Workshop on Reflection, 2006
2005
J. Softw. Maintenance Res. Pract., 2005
Proceedings of the Anais do WER05, 2005
From Requirements Documents to Feature Models for Aspect Oriented Product Line Implementation.
Proceedings of the Satellite Events at the MoDELS 2005 Conference, 2005
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005
Modular Aspect Verification for Safer Aspect-Based Evolution.
Proceedings of the RAM-SE'05-ECOOP'05 Workshop on Reflection, 2005
Proceedings of the Advanced Information Systems Engineering, 17th International Conference, 2005
2004
Special issue on Early aspects: aspect-oriented requirements engineering and architecture design.
IEE Proc. Softw., 2004
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004
Proceedings of the Software Reuse: Methods, 2004
Proceedings of the Generative Programming and Component Engineering: Third International Conference, 2004
2003
Comput. J., 2003
Proceedings of the 6th International Workshop on Principles of Software Evolution (IWPSE 2003), 2003
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003
Proceedings of the Object-Oriented Technology: ECOOP 2003 Workshop Reader, 2003
Proceedings of the 2nd International Conference on Aspect-Oriented Software Development, 2003
Proceedings of the 2nd International Conference on Aspect-Oriented Software Development, 2003
Aspect-Oriented Database Systems
Springer, ISBN: 3-540-00948-5, 2003
2002
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002
Proceedings of the Objects, 2002
2001
IEE Proc. Softw., 2001
Proceedings of the Metalevel Architectures and Separation of Crosscutting Concerns, 2001
Proceedings of the 2001 International Conference on Software Maintenance, 2001
Proceedings of the 27th EUROMICRO Conference 2001: A Net Odyssey, 2001
EProMS: An E-commerce Based Process Model for Cooperative Software Development in Small Organisations.
Proceedings of the Electronic Commerce and Web Technologies, 2001
2000
Transparent Dynamic Database Evolution from Java.
Obj. Logiciel Base données Réseaux, 2000
Proceedings of the TOOLS 2000: 34th International Conference on Technology of Object-Oriented Languages and Systems, 30 July, 2000
Reconfigurability in Object Database Management Systems: An Aspect-Oriented Approach.
Proceedings of the 6th International Conference on Object Oriented Information Systems, 2000
Proceedings of the Objects and Databases, 2000
Proceedings of the Generative and Component-Based Software Engineering, 2000
Proceedings of the Generative and Component-Based Software Engineering, 2000
Proceedings of the Database and Expert Systems Applications, 11th International Conference, 2000
1999
Proceedings of the TOOLS Europe 1999: 29th International Conference on Technology of Object-Oriented Languages and Systems, 1999
Evaluation for Evolution: How Well Commercial Systems Do.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999
Systematic Change Impact Determination in Complex Object Database Schemata.
Proceedings of the ECOOP'99 Workshop for PhD Students in OO Systems (PhDOOS '99), 1999
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999
1998
SADES - a Semi-Autonomous Database Evolution System.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998
Facilitating Virtual Representation of CAD Data Through A Learning Based Approach to Conceptual Database Evolution Employing Direct Instance Sharing.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998