[1]
Jun Ma, Holger M. Kienle, Piotr Kaminski, Anke Weber, and Marin Litoiu. Customizing Lotus notes to build software engineering tools. In Proceedings of the 2003 Conference of the Centre for Advanced Studies Conference on Collaborative Research, pages 211–222. IBM Press, 2003.
[2]
Julio César Luz and João José Neto. Tecnologa adaptativa aplicada à otimização de código em compiladores. In IX Congreso Argentino de Ciencias de la Computación, October 2003. In Spanish.
[3]
Q. Chen, C. Zhang, S. Zhang, and C. Li. Verifying the purchase request in SET protocol. In Web Technologies and Applications: 5th Asia-Pacific Web Conference, APWeb 2003, pages 263–274. Springer-Verlag, 2003. Lecture Notes in Computer Science 2642.
[4]
R. Breu, K. Burger, M. Hafner, J. Jürgens, G. Popp, G. Wimmel, and V. Lotz. Key issues of a formally based process model for security engineering. In 16th International Conference Software and Systems Engineering and their Applications, December 2003.
[5]
J. Gray and G. Karsai. An examination of DSLs for concisely representing model traversals and transformations. In Proc. Domain-Specific Language Minitrack, 36th Hawaii Int. Conf. on System Sciences (HICSS-36), January 2003.
[6]
Chengyuan Peng and Petri Vuorimaa. Optimizing mobile electronic program guide by adaptive learning. In M. H. Hamza, editor, The Third IASTED International Conference on Artificial Intelligence and Applications (AIA 2003). ACTA Press, September 2003.
[7]
E. Saul and A. Hutchison. Enhanced security protocol engineering through a unified multidimensional framework. IEEE Journal on Selected Areas in Communications, 21(1):62–76, 2003. (doi:10.1109/JSAC.2002.806128)
[8]
Lori Reed-Fourquet, John T. Lynch, Michael K. Martin, Michael Cascio, Wing-Yan Leung, and Philip P. Ruenhorst. The CHIME-trust healthcare public key infrastructure and trusted third party services: A case-study. In Jeff Collmann, editor, CPRI Toolkit for Health Care Security Management, chapter 4.9.4, pages 1–10. Healthcare Information and Management Systems Society, Chicago, IL, 2003. Available online http://www.himss.org/asp/cpritoolkit_homepage.asp.
[9]
C. Roser, M. Nakano, and M. Tanaka. Buffer allocation model based on a single simulation. In Winter Simulation Conference Proceedings, volume 2, pages 1238–1246, 2003.
[10]
Stephen Smith and Rodger Jamieson. Key drivers and inhibitors for information system security within e-government. In 14th Australasian Conference on Information Systems, November 2003.
[11]
W. Morein, A. Stavrou, D. Cook, A. Keromytis, V. Misra, and D. Rubenstein. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), pages 8–19, October 2003.
[12]
M. Mernik, J. Heering, and A.M. Sloane. When and how to develop domain-specific languages. Report SEN-E0309, Centrum voor Wiskunde en Informatica (CWI), Amsterdam, NL, December 2003. Available online http://ftp.cwi.nl/CWIreports/SEN/SEN-E0309.pdf.
[13]
Jeff Carver, Forrest Shull, and Victor Basili. Observational studies to accelerate process experience in classroom studies: An evaluation. In Proceedings of 2003 ACM-IEEE International Symposium on Empirical Software Engineering (ISESE 2003), pages 72–79, September 2003.
[14]
Mike Jochen, Lisa Marvel, and Lori Pollock. A framework for tamper detection marking of mobile applications. In International Symposium on Software Reliability Engineering (ISSRE), November 2003.
[15]
Mike Jochen, Lori Pollock, and Lisa Marvel. Zero footprint tamper detection for object files. In Proceedings of the Collaborative Technology Alliances Communications & Networks Alliance (CTA C&N) Annual Symposium, April 2003.
[16]
Mike Jochen, Lori Pollock, and Lisa Marvel. Tamper detection marking for object files. In Military Communications Conference, MILCOM, pages 747–751, October 2003.
[17]
Kentaro Toyama, Ron Logan, and Asta Roseway. Geographic location tags on digital images. In Proceedings of the eleventh ACM international conference on Multimedia, pages 156–166. ACM Press, 2003. (doi:10.1145/957013.957046)
[18]
Christian Decker, Uwe Kubach, and Michael Beigl. Revealing the retail black box by interaction sensing. In Michael Beigl, editor, 3rd International Workshop on Smart Appliances and Wearable Computing (IWSAWC 2003), May 2003.
[19]
Brendan Lawlor and Linh Vu. A survey of techniques for security architecture analysis. Technical Report DSTO-TR-1438, DSTO Information Sciences Laboratory, Edinburgh, South Australia, 2003.
[20]
M.A. Belsis and L. Smalov. Building an enterprise IT security management system. IFIP TC11 18th International Conference on Information Security, SEC 2003, 122:181–192, 2003. (doi:10.1007/978-0-387-35691-4_16)
[21]
Rok Rupnik and Marjan Krisper. The role of mobile applications in information systems. In Second International Mobile Business Conference, June 2003.
[22]
A. Chitra and G. Sudha Sadasivam. Design and implementation of a static bridge between COM and Corba distributed objects. Transactions of the SDPS: Journal of Integrated Design and Process Science, 7(4):25–33, September 2003.
[23]
(Author names in Chinese). Survey on the theories and methods of formal analyses for security protocols. Journal of the Graduate School of the Chinese Academy of Sciences, 20(4):389–405, 2003. In Chinese.
[24]
Varadharajan Sridhar and Bharat Bhasker. Managing information security on a shoestring budget. Annals of Cases on Information Technology, pages 151–167, 2003.
[25]
S. Kwon, T. amd Lim. Automation-considered logic of automation and key distribution. In Proceedings of the 4th WISA International Workshop on Information Security Applications, pages 442–457. Springer Verlag, August 2003. Lecture Notes in Computer Science 2908. (doi:10.1007/b95188)
[26]
Soha Maad. The potential and pitfall of interactive tv technology: An empirical study. In Television in Transition International Conference, May 2003.
[27]
Chung-Kie Tung. Tuning webmail performance: the design and implementation of open webmail. In International Conference on Open Source 2003, July 2003.
[28]
Rudinei Goularte, Edson dos Santos Moreira, and Maria da Graça C. Pimentel. Structuring interactive TV documents. In Proceedings of the 2003 ACM Symposium on Document Engineering, pages 42–51. ACM Press, 2003. (doi:10.1145/958220.958229)
[29]
John Millaway and Phillip Conrad. C server pages: An architecture for dynamic web content generation. In Twelfth International World Wide Web Conference. International World Wide Web Conference Committee, May 2003.
[30]
Craig Schmugar and Vincent Gullotto. Method and apparatus for a virus information patrol. United States Patent 6,654,751, November 2003. Assignee: Networks Associates Technology, Inc. (Santa Clara, CA).
[31]
T. Tryfonas and E. Kiountouzis. Perceptions of security contributing to the implementation of secure IS. IFIP TC11 18th International Conference on Information Security, SEC 2003, 122:313–324, 2003. (doi:10.1007/978-0-387-35691-4_27)
[32]
S. Smith. Key drivers and inhibitors for information system security within egovernment. In Proceedings if the 14th Australasian Conference on Information Systems, 2003.
[33]
Derek M. Jones. The New C Standard: An Economic and Cultural Commentary. Addison-Wesley, 2003.
[34]
David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, and Mary Baker. Economic measures to resist attacks on a peer-to-peer network. In Workshop on Economics of Peer-to-Peer Systems, June 2003.
[35]
Hayato Kawashima and Katsuhiko Gondow. Experience with ANSI C markup language for a cross-referencer. In Proc. Domain-Specific Language Minitrack, 36th Hawaii Int. Conf. on System Sciences (HICSS-36), January 2003.
[36]
Vijayan Sugumaran and Veda C. Storey. A semantic-based approach to component retrieval. SIGMIS Database, 34(3):8–24, 2003. (doi:10.1145/937742.937745)
[37]
B. Karabacak and I. Sogukpinar. Risk analizi ve yonetimi surecleri. A New Electronic Journal in Computer Science, III, 2003. In Turkish.
[38]
Killer computer bugs. IEEE Spectrum, Progress column, March 2003. p. 63.
[39]
S. Lukell. Attack construction analysis of cryptographic protocols within a multidimentional security protocol engineering framework. Master's thesis, Cape Town University, August 2003.
[40]
Urs Hoezle. Archiving the Web is feasible today. Communications of the ACM, 46(5):11, May 2003.
[41]
Thomas Müller. Computer system and method for running an extensible database. European Patent 1288791, 2003.
[42]
Andrew P. Martin. Key determinants of information availability: A multiple case study. Master's thesis, Department of Information Systems and Quantitative Analysis, University of Nebraska at Omaha, Nebraska, OM, May 2003.
[43]
Gregory V. Wilson. Reading code. Dr. Dobb's Journal, September 2003.
[44]
Terrence A. Brooks. Web search: how the Web has changed information retrieval. Information Research, 8(3), April 2003. Paper no. 154.
[45]
Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. A constraint-based framework for the cascade vulnerability problem. In ICLP2003 Workshop on Constraint and Logic Programming in Security (COLOPS2003), 2003.
[46]
Mathee Olarnsakul and Dentcho N. Batanov. A method for developing component-oriented applications: A use-context driven approach toward component coordination. Knowledge and Information Systems, 5:466–502, 2003. (doi:10.1007/s10115-002-0085-2)
[47]
Stelios Sidiroglou and Angelos D. Keromytis. Countering network worms through automatic patch generation. Technical Report CUCS-029-03, Computer Science Dept. University of Columbia, 2003.
[48]
Ana I. Vicente. La convergence de la sécurité informatique et la protection des données à caractère personnel: vers une nouvelle approche juridique. Master's thesis, Universite de Montreal, 2003.
[49]
Dave L. Edyburn. 2002 in review: A synthesis of the special education technology literature. Journal of Special Education Technology, 18(3), Summer 2003.
[50]
Warren Keuffel. Outside the box. Software Development Magazine, September 2003.
[51]
Angeliki Tsilira. Targeted delivery of messages with use of mobile devices. Master's thesis, Athens University of Economics and Business, Department of Management Science and Technology, Athens, Greece, 2003.
[52]
S. Arumugam. AZIMAS: Web mobile agent system. Master's thesis, University of Florida, FL, USA, 2003.
[53]
Holger Eichelberger and Jurgen Wolff von Gudenberg. UML class diagrams—state of the art in layout techniques. In Proceedings of VISSOFT 2003: 2nd Annual ``Designfest'' on visualizing software for understanding and analysis. NWO, September 2003.
[54]
Terry Bollinger. Software cooperatives: Infrastructure in the internet era, October 2003. Available online http://www.terrybollinger.com/swcoops/swcoops/.
[55]
David S. H. Rosenthal. A digital preservation appliance based on OpenBSD. In Proceedings of BSDCon '03. USENIX, USENIX Association, September 2003.
[56]
Richard Mateosian. So many books, so little time. IEEE Micro, pages 7, 79, September 2003.
[57]
B. Padmanabhan. Modeling and analysis of security protocols using CASPER. Master's thesis, Syracuse University, August 2003.
[58]
H. Tempelmeier. Practical considerations in the optimization of flow production systems. International Journal of Production Research, 41(1):149–170, 2003. (doi:10.1080/00207540210161641)
[59]
H. Tempelmeier. Simultaneous buffer and workload optimization for aysnchronous flow production systems. In Fourth Aegean International Conference on the Analysis and Modelling of Manufacturing Systems, pages 31–39. University of the Aegean, 2003.
[60]
N. H. Christensen. Domain-specific languages in software development - and the relation to partial evaluation. PhD thesis, Dept. of Computer Science, University of Copenhagen, Copenhagen East, Denmark, July 2003.
[1]
S. Arumugam. AZIMAS: Web mobile agent system. Master's thesis, University of Florida, FL, USA, 2003.

[2]
(Author names in Chinese). Survey on the theories and methods of formal analyses for security protocols. Journal of the Graduate School of the Chinese Academy of Sciences, 20(4):389–405, 2003. In Chinese.

[3]
M.A. Belsis and L. Smalov. Building an enterprise IT security management system. IFIP TC11 18th International Conference on Information Security, SEC 2003, 122:181–192, 2003. (doi:10.1007/978-0-387-35691-4_16)

[4]
Stefano Bistarelli, Simon N. Foley, and Barry O'Sullivan. A constraint-based framework for the cascade vulnerability problem. In ICLP2003 Workshop on Constraint and Logic Programming in Security (COLOPS2003), 2003.

[5]
Terry Bollinger. Software cooperatives: Infrastructure in the internet era, October 2003. Available online http://www.terrybollinger.com/swcoops/swcoops/.

[6]
R. Breu, K. Burger, M. Hafner, J. Jürgens, G. Popp, G. Wimmel, and V. Lotz. Key issues of a formally based process model for security engineering. In 16th International Conference Software and Systems Engineering and their Applications, December 2003.

[7]
Terrence A. Brooks. Web search: how the Web has changed information retrieval. Information Research, 8(3), April 2003. Paper no. 154.

[8]
Jeff Carver, Forrest Shull, and Victor Basili. Observational studies to accelerate process experience in classroom studies: An evaluation. In Proceedings of 2003 ACM-IEEE International Symposium on Empirical Software Engineering (ISESE 2003), pages 72–79, September 2003.

[9]
Q. Chen, C. Zhang, S. Zhang, and C. Li. Verifying the purchase request in SET protocol. In Web Technologies and Applications: 5th Asia-Pacific Web Conference, APWeb 2003, pages 263–274. Springer-Verlag, 2003. Lecture Notes in Computer Science 2642.

[10]
A. Chitra and G. Sudha Sadasivam. Design and implementation of a static bridge between COM and Corba distributed objects. Transactions of the SDPS: Journal of Integrated Design and Process Science, 7(4):25–33, September 2003.

[11]
N. H. Christensen. Domain-specific languages in software development - and the relation to partial evaluation. PhD thesis, Dept. of Computer Science, University of Copenhagen, Copenhagen East, Denmark, July 2003.

[12]
Christian Decker, Uwe Kubach, and Michael Beigl. Revealing the retail black box by interaction sensing. In Michael Beigl, editor, 3rd International Workshop on Smart Appliances and Wearable Computing (IWSAWC 2003), May 2003.

[13]
Dave L. Edyburn. 2002 in review: A synthesis of the special education technology literature. Journal of Special Education Technology, 18(3), Summer 2003.

[14]
Holger Eichelberger and Jurgen Wolff von Gudenberg. UML class diagrams—state of the art in layout techniques. In Proceedings of VISSOFT 2003: 2nd Annual ``Designfest'' on visualizing software for understanding and analysis. NWO, September 2003.

[15]
Rudinei Goularte, Edson dos Santos Moreira, and Maria da Graça C. Pimentel. Structuring interactive TV documents. In Proceedings of the 2003 ACM Symposium on Document Engineering, pages 42–51. ACM Press, 2003. (doi:10.1145/958220.958229)

[16]
J. Gray and G. Karsai. An examination of DSLs for concisely representing model traversals and transformations. In Proc. Domain-Specific Language Minitrack, 36th Hawaii Int. Conf. on System Sciences (HICSS-36), January 2003.

[17]
Urs Hoezle. Archiving the Web is feasible today. Communications of the ACM, 46(5):11, May 2003.

[18]
Killer computer bugs. IEEE Spectrum, Progress column, March 2003. p. 63.

[19]
Mike Jochen, Lisa Marvel, and Lori Pollock. A framework for tamper detection marking of mobile applications. In International Symposium on Software Reliability Engineering (ISSRE), November 2003.

[20]
Mike Jochen, Lori Pollock, and Lisa Marvel. Tamper detection marking for object files. In Military Communications Conference, MILCOM, pages 747–751, October 2003.

[21]
Mike Jochen, Lori Pollock, and Lisa Marvel. Zero footprint tamper detection for object files. In Proceedings of the Collaborative Technology Alliances Communications & Networks Alliance (CTA C&N) Annual Symposium, April 2003.

[22]
Derek M. Jones. The New C Standard: An Economic and Cultural Commentary. Addison-Wesley, 2003.

[23]
B. Karabacak and I. Sogukpinar. Risk analizi ve yonetimi surecleri. A New Electronic Journal in Computer Science, III, 2003. In Turkish.

[24]
Hayato Kawashima and Katsuhiko Gondow. Experience with ANSI C markup language for a cross-referencer. In Proc. Domain-Specific Language Minitrack, 36th Hawaii Int. Conf. on System Sciences (HICSS-36), January 2003.

[25]
Warren Keuffel. Outside the box. Software Development Magazine, September 2003.

[26]
S. Kwon, T. amd Lim. Automation-considered logic of automation and key distribution. In Proceedings of the 4th WISA International Workshop on Information Security Applications, pages 442–457. Springer Verlag, August 2003. Lecture Notes in Computer Science 2908. (doi:10.1007/b95188)

[27]
Brendan Lawlor and Linh Vu. A survey of techniques for security architecture analysis. Technical Report DSTO-TR-1438, DSTO Information Sciences Laboratory, Edinburgh, South Australia, 2003.

[28]
S. Lukell. Attack construction analysis of cryptographic protocols within a multidimentional security protocol engineering framework. Master's thesis, Cape Town University, August 2003.

[29]
Julio César Luz and João José Neto. Tecnologa adaptativa aplicada à otimização de código em compiladores. In IX Congreso Argentino de Ciencias de la Computación, October 2003. In Spanish.

[30]
Jun Ma, Holger M. Kienle, Piotr Kaminski, Anke Weber, and Marin Litoiu. Customizing Lotus notes to build software engineering tools. In Proceedings of the 2003 Conference of the Centre for Advanced Studies Conference on Collaborative Research, pages 211–222. IBM Press, 2003.

[31]
Soha Maad. The potential and pitfall of interactive tv technology: An empirical study. In Television in Transition International Conference, May 2003.

[32]
Andrew P. Martin. Key determinants of information availability: A multiple case study. Master's thesis, Department of Information Systems and Quantitative Analysis, University of Nebraska at Omaha, Nebraska, OM, May 2003.

[33]
Richard Mateosian. So many books, so little time. IEEE Micro, pages 7, 79, September 2003.

[34]
M. Mernik, J. Heering, and A.M. Sloane. When and how to develop domain-specific languages. Report SEN-E0309, Centrum voor Wiskunde en Informatica (CWI), Amsterdam, NL, December 2003. Available online http://ftp.cwi.nl/CWIreports/SEN/SEN-E0309.pdf.

[35]
John Millaway and Phillip Conrad. C server pages: An architecture for dynamic web content generation. In Twelfth International World Wide Web Conference. International World Wide Web Conference Committee, May 2003.

[36]
W. Morein, A. Stavrou, D. Cook, A. Keromytis, V. Misra, and D. Rubenstein. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS), pages 8–19, October 2003.

[37]
Thomas Müller. Computer system and method for running an extensible database. European Patent 1288791, 2003.

[38]
Mathee Olarnsakul and Dentcho N. Batanov. A method for developing component-oriented applications: A use-context driven approach toward component coordination. Knowledge and Information Systems, 5:466–502, 2003. (doi:10.1007/s10115-002-0085-2)

[39]
B. Padmanabhan. Modeling and analysis of security protocols using CASPER. Master's thesis, Syracuse University, August 2003.

[40]
Chengyuan Peng and Petri Vuorimaa. Optimizing mobile electronic program guide by adaptive learning. In M. H. Hamza, editor, The Third IASTED International Conference on Artificial Intelligence and Applications (AIA 2003). ACTA Press, September 2003.

[41]
Lori Reed-Fourquet, John T. Lynch, Michael K. Martin, Michael Cascio, Wing-Yan Leung, and Philip P. Ruenhorst. The CHIME-trust healthcare public key infrastructure and trusted third party services: A case-study. In Jeff Collmann, editor, CPRI Toolkit for Health Care Security Management, chapter 4.9.4, pages 1–10. Healthcare Information and Management Systems Society, Chicago, IL, 2003. Available online http://www.himss.org/asp/cpritoolkit_homepage.asp.

[42]
David S. H. Rosenthal, Mema Roussopoulos, Petros Maniatis, and Mary Baker. Economic measures to resist attacks on a peer-to-peer network. In Workshop on Economics of Peer-to-Peer Systems, June 2003.

[43]
David S. H. Rosenthal. A digital preservation appliance based on OpenBSD. In Proceedings of BSDCon '03. USENIX, USENIX Association, September 2003.

[44]
C. Roser, M. Nakano, and M. Tanaka. Buffer allocation model based on a single simulation. In Winter Simulation Conference Proceedings, volume 2, pages 1238–1246, 2003.

[45]
Rok Rupnik and Marjan Krisper. The role of mobile applications in information systems. In Second International Mobile Business Conference, June 2003.

[46]
E. Saul and A. Hutchison. Enhanced security protocol engineering through a unified multidimensional framework. IEEE Journal on Selected Areas in Communications, 21(1):62–76, 2003. (doi:10.1109/JSAC.2002.806128)

[47]
Craig Schmugar and Vincent Gullotto. Method and apparatus for a virus information patrol. United States Patent 6,654,751, November 2003. Assignee: Networks Associates Technology, Inc. (Santa Clara, CA).

[48]
Stelios Sidiroglou and Angelos D. Keromytis. Countering network worms through automatic patch generation. Technical Report CUCS-029-03, Computer Science Dept. University of Columbia, 2003.

[49]
Stephen Smith and Rodger Jamieson. Key drivers and inhibitors for information system security within e-government. In 14th Australasian Conference on Information Systems, November 2003.

[50]
S. Smith. Key drivers and inhibitors for information system security within egovernment. In Proceedings if the 14th Australasian Conference on Information Systems, 2003.

[51]
Varadharajan Sridhar and Bharat Bhasker. Managing information security on a shoestring budget. Annals of Cases on Information Technology, pages 151–167, 2003.

[52]
Vijayan Sugumaran and Veda C. Storey. A semantic-based approach to component retrieval. SIGMIS Database, 34(3):8–24, 2003. (doi:10.1145/937742.937745)

[53]
H. Tempelmeier. Practical considerations in the optimization of flow production systems. International Journal of Production Research, 41(1):149–170, 2003. (doi:10.1080/00207540210161641)

[54]
H. Tempelmeier. Simultaneous buffer and workload optimization for aysnchronous flow production systems. In Fourth Aegean International Conference on the Analysis and Modelling of Manufacturing Systems, pages 31–39. University of the Aegean, 2003.

[55]
Kentaro Toyama, Ron Logan, and Asta Roseway. Geographic location tags on digital images. In Proceedings of the eleventh ACM international conference on Multimedia, pages 156–166. ACM Press, 2003. (doi:10.1145/957013.957046)

[56]
T. Tryfonas and E. Kiountouzis. Perceptions of security contributing to the implementation of secure IS. IFIP TC11 18th International Conference on Information Security, SEC 2003, 122:313–324, 2003. (doi:10.1007/978-0-387-35691-4_27)

[57]
Angeliki Tsilira. Targeted delivery of messages with use of mobile devices. Master's thesis, Athens University of Economics and Business, Department of Management Science and Technology, Athens, Greece, 2003.

[58]
Chung-Kie Tung. Tuning webmail performance: the design and implementation of open webmail. In International Conference on Open Source 2003, July 2003.

[59]
Ana I. Vicente. La convergence de la sécurité informatique et la protection des données à caractère personnel: vers une nouvelle approche juridique. Master's thesis, Universite de Montreal, 2003.

[60]
Gregory V. Wilson. Reading code. Dr. Dobb's Journal, September 2003.