[1]
G. Allon, T. Raviv, and R. Y. Rubinstein. Application of the cross entropy method for buffer allocation problem in simulation based environment. In Fourth Workshop on Rare Event Simulation and Related Combinatorial Optimization Problems, RESIM/COP'02, April 2002.
[2]
Subramanian Arumugam, Abdelsalam (Sumi) Helal, and Amar Nalla. aZIMAS: Web mobile agent system. In N. Suri, editor, Mobile Agents : 6th International Conference MA 2002, pages 1–15. Springer-Verlag, October 2002. Lecture Notes in Computer Science; Vol 2535.
[3]
M. Belsi. Developing an enterprise IT security data model. Master's thesis, Coventry University, January 2002.
[4]
M.A. Belsis, A.N. Godwin, and L. Smalov. An enterprise IT security data model. In 4th International Conference on Enterprise Information Systems, ICEIS 2002, volume 2, pages 885–891. ICEIS Press, 2002.
[5]
T. Bohne. A general intruder for security protocols in MANDE. Master's thesis, University of Wyoming, 2002.
[6]
Gérard Chauvel, Maija Kuusela, Dominique D'Inverno, and Serge Lasserre. Task based adaptive profiling and debugging. European Patent 1182556, 2002.
[7]
Kefeng Chen. Methods and systems for authenticating business partners for secured electronic transactions. World Intellectual Property Organization Patent 0206932, 2002.
[8]
A. Dolgui, A. Eremeev, A. Kolokolov, and V. Sigaev. A genetic algorithm for buffer allocation in production line with unreliable machines. Journal of Mathematical Modelling and Algorithms, 1(2):89–104, 2002. (doi:10.1023/A:1016560109076)
[9]
Liu Dongxi, Li Xiaoyong, and Bai Yingcai. An attack-finding algorithm for security protocols. Journal of Computer Science and Technology, 17(4):450–463, 2002.
[10]
Myrna C. M dos Santos, José A. M. Xexéo, and José F. de Rezende. Anáalise formal de protocolos de segurança para redes celulares. Technical Report GTA-02-26, Universidade Federal do Rio de Janeiro/UFRJ, 2002.
[11]
A. J. D'Souza. Formal analysis on cryptographic protocols. Master's thesis, Indian Institute of Technology, Bombay, India, May 2002.
[12]
Michael Goedicke and Uwe Zdun. Piecemeal legacy migrating with an architectural pattern language: A case study. In Journal of Software Maintenance and Evolution: Research and Practice, 14(1):1–30, 2002. (doi:10.1002/smr.243)
[13]
M. Grechanik, D. Perry, and D. Batory. An approach to evolving database dependent systems. In International Workshop on Principles of Software Evolution (IWPSE), pages 113–116, 2002.
[14]
Mark Grechanik, Dewayne Perry, and Don Batory. An approach to change management of evolving database schemas. In Seventh International Conference on Software Reuse ICSR 2002—Young Researchers Workshop, 2002.
[15]
Mark Grechanik, Dewayne Perry, and Don Batory. An approach to evolving database dependent systems. In International Conference on Software Engineering: Proceedings of the International Workshop on Principles of Software Evolution, pages 113–116. ACM Press, 2002. (doi:10.1145/512035.512061)
[16]
K. Haneda, T. Kajima, T. Koyama, H. Muranaka, H. Dojo, and Y. Aratani. Development of quantitative security optimization approach for the picture archives and carrying system between a clinic and a rehabilitation center. Proceedings of SPIE — The International Society for Optical Engineering, 4685:422–429, 2002. (doi:10.1117/12.467036)
[17]
Elliott Hughes. How many trivial getter methods does Java have. SIGPLAN Notices, 37(8):19–24, August 2002.
[18]
Jan Jürjens. Secure Java development with UML. In Proceedings of the First INetSec '01 International IFIP TC-11 WG 11.4 Working Conference on Network Security. IFIP, Kluwer, November 2002.
[19]
J. Jürjens. Modelling audit security for smart-card payment schemes with uml-sec. IFIP TC11 16th International Conference on Information Security, lFIP/Sec 2001, 65:93–107, 2002.
[20]
Kazuhiko Kato and Yoshihiro Oyama. Softwarepot: An encapsulated transferable file system for secure software circulation. In Software Security — Theories and Systems: Proceedings of the International Symposium on Software Security, pages 112–132. Springer-Verlag, November 2002. Lecture Notes in Computer Science; Vol 2609.
[21]
Holger M. Kienle, Anke Weber, Jens Jahnke, and Hausi A. Müller. Tackling the adoption problem of domain-specific visual languages. In 2nd OOPSLA Workshop on Domain Specific Visual Languages, November 2002.
[22]
Victor Kouznetsov, Charles L. Vigue, Martin Fallenstedt, and Daniel Melchione. System and method to verify trusted status of peer in a peer-to-peer network environment. European Patent 1259045, 2002.
[23]
Sumit Kumar, Rajesh Rajamani, and Abhishek Saxena. Comminst: Instrumenting process communication, 2002. Available online http://www.cs.wisc.edu/ raj/comminst/comminstpaper.doc.
[24]
Philipp W. Kutter. Montages — Engineering in Computer Languages. PhD thesis, Swiss Federal Institute of Technology, Zurich, CH, 2002.
[25]
Philipp W. Kutter. Replacing generation of interpreters with a combination of partial evaluation and parameterized signatures, leading to a concept for meta-bootstrapping. In ECOOP'2002 Workshop on Generative Programming, 2002.
[26]
G. Liu, Y. He, Y. Qiu, and J. Yu. Research on influence of solving quality based on different initializing solution algorithm in tabu search. In 1st International Conference on Communications, Circuits and Systems, ICCCAS 2002, volume 2, pages 1141–1145. Institute of Electrical and Electronics Engineers Inc., 2002. (doi:10.1109/ICCCAS.2002.1178986)
[27]
C. Löbbecke and M. Falkenberg. A framework for assessing market entry opportunities for internet-based TV. International Journal on Media Management, 4(2), 2002.
[28]
S. Lukell and H. Hutchison. Attack construction analysis of cryptographic protocols within a multidimentional security protocol engineering framework. Technical report, Cape Town University, 2002.
[29]
David Mussington. Concepts for enhancing critical infrastructure protection : relating Y2K to CIP research and development. RAND, Santa Monica, CA, USA, 2002.
[30]
E. W. T. Ngai and F. K. T. Wat. A literature review and classification of e-commerce research. Information and Management, 39(5):415–429, March 2002.
[31]
Frédéric Oehl and David Sinclair. Combining ISABELLE and Timbuk for cryptographic protocol verification. In Securité de la Communication sur Intenet: SECI 02, pages 57–67, Tunis, Tunisia, September 2002. INRIA, Le Centre de Calcul El Khawarizmi.
[32]
F. Oehl, G. Cece, O. Kouchnarenko, and D. Sinclair. Automatic approximation for the verification of cryptographic protocols. In P. Ryan, editor, Proceedings of the Conference on Formal Aspects of Security. Springer-Verlag, 2002. Lecture Notes in Computer Science; Vol 2629.
[33]
Yoshihiro Oyama, Katsunori Kanda, and Kazuhiko Kato. Design and implementation of secure software execution system SoftwarePot. Computer Software, 19(6):2–12, November 2002. In Japanese.
[34]
J. Pang. Analysis of a security protocol in μcrl. CWI Technical Report SEN-R0201, Centrum voor Wiskunde en Informatica, Amsterdam, The Netherlands, January 2002.
[35]
M. Panti, L. Spalazzi, and S. Tacconi. Attacks on cryptographic protocols: A survey. Technical Report TR-2002-10, University of Ancona, 2002.
[36]
Dietrich Paulus and Joachim Hornegger. Applied Pattern Recognition: A Practical Introduction to Image and Speech Processing in C++. Vieweg, fourth edition, 2002.
[37]
Radia J. Perlman. Efficient revocation of registration authorities. World Intellectual Property Organization Patent 02060148, 2002.
[38]
Konstantinos Raptis. Software Component Communication Methodologies. PhD thesis, University of the Aegean, Department of Information and Communication Systems, Samos, Greece, 2002. In Greek.
[39]
Erik Riedel, Mahesh Kallahalla, and Ram Swaminathan. A framework for evaluating storage system security. In Proceedings of the FAST 2002 Conference on FILE and Storage Technologies. USENIX, USENIX Association, January 2002.
[40]
E. Saul and A. Hutchison. Using GYPSIE, GYNGER and visual GNY to analyze cryptographic protocols in SPEAR II. IFIP TC11 WG11.1/WG11.2 8th Annual Working Conference on Information Security Management and Small Systems Security, 72:73–85, 2002.
[41]
A. Schreiner. Unix tools as visual programming components in a GUI-builder environment. ACM Computing Reviews, November 2002.
[42]
Glenn Vanderburg. Using the source: Software archaeology for users of open source software. Online http://www.delphis.com/downloads/presentations/java/UsingTheSource_handouts.pdf (current May 2003), July 2002. Tutorial presented at the O'Reilly Open Source Convention.
[43]
Stefan Voß and David L. Woodruff, editors. Optimization Software Class Libraries. Kluwer Academic Publishers, 2002.
[44]
Vytautas Štuikys and Robertas Damaševičius. Relationship model of abstractions used for developing domain generators. Informatica, 13(1):111–128, 2002.
[45]
G. Wimmel and J. Jürgens. Specification-based test generation for security-critical systems using mutuations. In Proceedings of the 4th ICFEM2002 International Conference on Formal Engineering Methods. Springer-Verlag, 2002.
[46]
Dong xi Liu and Ying cai Bai. A study on the proof method of authentication protocols based on Strand space. Journal of Software, 13(4), 2002.
[47]
F. Xia, Q. Luo, and M. Yin. Software implementation of PACS viewer: The use of COM technology. Proceedings of SPIE — The International Society for Optical Engineering, 4536:101–107, 2002. (doi:10.1117/12.462532)
[48]
Uwe Zdun. Language Support for Dynamic and Evolving Software Architectures. PhD thesis, University of Essen, Essen, Germany, January 2002.
[49]
X. Zhang, D. Li, X. Zhu, and N. Chen. Systematic plan of building web geographic information system based on activex control. Proceedings of SPIE — The International Society for Optical Engineering, 4886:307–314, 2002. (doi:10.1117/12.462322)
[1]
G. Allon, T. Raviv, and R. Y. Rubinstein. Application of the cross entropy method for buffer allocation problem in simulation based environment. In Fourth Workshop on Rare Event Simulation and Related Combinatorial Optimization Problems, RESIM/COP'02, April 2002.

[2]
Subramanian Arumugam, Abdelsalam (Sumi) Helal, and Amar Nalla. aZIMAS: Web mobile agent system. In N. Suri, editor, Mobile Agents : 6th International Conference MA 2002, pages 1–15. Springer-Verlag, October 2002. Lecture Notes in Computer Science; Vol 2535.

[3]
M. Belsi. Developing an enterprise IT security data model. Master's thesis, Coventry University, January 2002.

[4]
T. Bohne. A general intruder for security protocols in MANDE. Master's thesis, University of Wyoming, 2002.

[5]
Gérard Chauvel, Maija Kuusela, Dominique D'Inverno, and Serge Lasserre. Task based adaptive profiling and debugging. European Patent 1182556, 2002.

[6]
Kefeng Chen. Methods and systems for authenticating business partners for secured electronic transactions. World Intellectual Property Organization Patent 0206932, 2002.

[7]
A. Dolgui, A. Eremeev, A. Kolokolov, and V. Sigaev. A genetic algorithm for buffer allocation in production line with unreliable machines. Journal of Mathematical Modelling and Algorithms, 1(2):89–104, 2002. (doi:10.1023/A:1016560109076)

[8]
Liu Dongxi, Li Xiaoyong, and Bai Yingcai. An attack-finding algorithm for security protocols. Journal of Computer Science and Technology, 17(4):450–463, 2002.

[9]
Myrna C. M dos Santos, José A. M. Xexéo, and José F. de Rezende. Anáalise formal de protocolos de segurança para redes celulares. Technical Report GTA-02-26, Universidade Federal do Rio de Janeiro/UFRJ, 2002.

[10]
A. J. D'Souza. Formal analysis on cryptographic protocols. Master's thesis, Indian Institute of Technology, Bombay, India, May 2002.

[11]
Michael Goedicke and Uwe Zdun. Piecemeal legacy migrating with an architectural pattern language: A case study. In Journal of Software Maintenance and Evolution: Research and Practice, 14(1):1–30, 2002. (doi:10.1002/smr.243)

[12]
M. Grechanik, D. Perry, and D. Batory. An approach to evolving database dependent systems. In International Workshop on Principles of Software Evolution (IWPSE), pages 113–116, 2002.

[13]
Mark Grechanik, Dewayne Perry, and Don Batory. An approach to change management of evolving database schemas. In Seventh International Conference on Software Reuse ICSR 2002—Young Researchers Workshop, 2002.

[14]
Mark Grechanik, Dewayne Perry, and Don Batory. An approach to evolving database dependent systems. In International Conference on Software Engineering: Proceedings of the International Workshop on Principles of Software Evolution, pages 113–116. ACM Press, 2002. (doi:10.1145/512035.512061)

[15]
K. Haneda, T. Kajima, T. Koyama, H. Muranaka, H. Dojo, and Y. Aratani. Development of quantitative security optimization approach for the picture archives and carrying system between a clinic and a rehabilitation center. Proceedings of SPIE — The International Society for Optical Engineering, 4685:422–429, 2002. (doi:10.1117/12.467036)

[16]
Elliott Hughes. How many trivial getter methods does Java have. SIGPLAN Notices, 37(8):19–24, August 2002.

[17]
J. Jürjens. Modelling audit security for smart-card payment schemes with uml-sec. IFIP TC11 16th International Conference on Information Security, lFIP/Sec 2001, 65:93–107, 2002.

[18]
Jan Jürjens. Secure Java development with UML. In Proceedings of the First INetSec '01 International IFIP TC-11 WG 11.4 Working Conference on Network Security. IFIP, Kluwer, November 2002.

[19]
Kazuhiko Kato and Yoshihiro Oyama. Softwarepot: An encapsulated transferable file system for secure software circulation. In Software Security — Theories and Systems: Proceedings of the International Symposium on Software Security, pages 112–132. Springer-Verlag, November 2002. Lecture Notes in Computer Science; Vol 2609.

[20]
Holger M. Kienle, Anke Weber, Jens Jahnke, and Hausi A. Müller. Tackling the adoption problem of domain-specific visual languages. In 2nd OOPSLA Workshop on Domain Specific Visual Languages, November 2002.

[21]
Victor Kouznetsov, Charles L. Vigue, Martin Fallenstedt, and Daniel Melchione. System and method to verify trusted status of peer in a peer-to-peer network environment. European Patent 1259045, 2002.

[22]
Sumit Kumar, Rajesh Rajamani, and Abhishek Saxena. Comminst: Instrumenting process communication, 2002. Available online http://www.cs.wisc.edu/ raj/comminst/comminstpaper.doc.

[23]
Philipp W. Kutter. Montages — Engineering in Computer Languages. PhD thesis, Swiss Federal Institute of Technology, Zurich, CH, 2002.

[24]
Philipp W. Kutter. Replacing generation of interpreters with a combination of partial evaluation and parameterized signatures, leading to a concept for meta-bootstrapping. In ECOOP'2002 Workshop on Generative Programming, 2002.

[25]
C. Löbbecke and M. Falkenberg. A framework for assessing market entry opportunities for internet-based TV. International Journal on Media Management, 4(2), 2002.

[26]
S. Lukell and H. Hutchison. Attack construction analysis of cryptographic protocols within a multidimentional security protocol engineering framework. Technical report, Cape Town University, 2002.

[27]
David Mussington. Concepts for enhancing critical infrastructure protection : relating Y2K to CIP research and development. RAND, Santa Monica, CA, USA, 2002.

[28]
E. W. T. Ngai and F. K. T. Wat. A literature review and classification of e-commerce research. Information and Management, 39(5):415–429, March 2002.

[29]
Frédéric Oehl and David Sinclair. Combining ISABELLE and Timbuk for cryptographic protocol verification. In Securité de la Communication sur Intenet: SECI 02, pages 57–67, Tunis, Tunisia, September 2002. INRIA, Le Centre de Calcul El Khawarizmi.

[30]
F. Oehl, G. Cece, O. Kouchnarenko, and D. Sinclair. Automatic approximation for the verification of cryptographic protocols. In P. Ryan, editor, Proceedings of the Conference on Formal Aspects of Security. Springer-Verlag, 2002. Lecture Notes in Computer Science; Vol 2629.

[31]
Yoshihiro Oyama, Katsunori Kanda, and Kazuhiko Kato. Design and implementation of secure software execution system SoftwarePot. Computer Software, 19(6):2–12, November 2002. In Japanese.

[32]
J. Pang. Analysis of a security protocol in μcrl. CWI Technical Report SEN-R0201, Centrum voor Wiskunde en Informatica, Amsterdam, The Netherlands, January 2002.

[33]
M. Panti, L. Spalazzi, and S. Tacconi. Attacks on cryptographic protocols: A survey. Technical Report TR-2002-10, University of Ancona, 2002.

[34]
Dietrich Paulus and Joachim Hornegger. Applied Pattern Recognition: A Practical Introduction to Image and Speech Processing in C++. Vieweg, fourth edition, 2002.

[35]
Radia J. Perlman. Efficient revocation of registration authorities. World Intellectual Property Organization Patent 02060148, 2002.

[36]
Konstantinos Raptis. Software Component Communication Methodologies. PhD thesis, University of the Aegean, Department of Information and Communication Systems, Samos, Greece, 2002. In Greek.

[37]
Erik Riedel, Mahesh Kallahalla, and Ram Swaminathan. A framework for evaluating storage system security. In Proceedings of the FAST 2002 Conference on FILE and Storage Technologies. USENIX, USENIX Association, January 2002.

[38]
E. Saul and A. Hutchison. Using GYPSIE, GYNGER and visual GNY to analyze cryptographic protocols in SPEAR II. IFIP TC11 WG11.1/WG11.2 8th Annual Working Conference on Information Security Management and Small Systems Security, 72:73–85, 2002.

[39]
A. Schreiner. Unix tools as visual programming components in a GUI-builder environment. ACM Computing Reviews, November 2002.

[40]
Glenn Vanderburg. Using the source: Software archaeology for users of open source software. Online http://www.delphis.com/downloads/presentations/java/UsingTheSource_handouts.pdf (current May 2003), July 2002. Tutorial presented at the O'Reilly Open Source Convention.

[41]
Stefan Voß and David L. Woodruff, editors. Optimization Software Class Libraries. Kluwer Academic Publishers, 2002.

[42]
Vytautas Štuikys and Robertas Damaševičius. Relationship model of abstractions used for developing domain generators. Informatica, 13(1):111–128, 2002.

[43]
G. Wimmel and J. Jürgens. Specification-based test generation for security-critical systems using mutuations. In Proceedings of the 4th ICFEM2002 International Conference on Formal Engineering Methods. Springer-Verlag, 2002.

[44]
Dong xi Liu and Ying cai Bai. A study on the proof method of authentication protocols based on Strand space. Journal of Software, 13(4), 2002.

[45]
F. Xia, Q. Luo, and M. Yin. Software implementation of PACS viewer: The use of COM technology. Proceedings of SPIE — The International Society for Optical Engineering, 4536:101–107, 2002. (doi:10.1117/12.462532)

[46]
Uwe Zdun. Language Support for Dynamic and Evolving Software Architectures. PhD thesis, University of Essen, Essen, Germany, January 2002.

[47]
X. Zhang, D. Li, X. Zhu, and N. Chen. Systematic plan of building web geographic information system based on activex control. Proceedings of SPIE — The International Society for Optical Engineering, 4886:307–314, 2002. (doi:10.1117/12.462322)