AAAAAA

   
Results: 1-10 |
Results: 10

Authors: Spinellis, D
Citation: D. Spinellis, Notable design patterns for domain-specific languages, J SYST SOFT, 56(1), 2001, pp. 91-99

Authors: Spinellis, D
Citation: D. Spinellis, Fear of coding, and how to reduce it, COMPUTER, 34(8), 2001, pp. 100

Authors: Spinellis, D Raptis, K
Citation: D. Spinellis et K. Raptis, Component mining: a process and its pattern language, INF SOFTW T, 42(9), 2000, pp. 609-617

Authors: Spinellis, D Papadopoulos, C Smith, JM
Citation: D. Spinellis et al., Large production line optimization using simulated annealing, INT J PROD, 38(3), 2000, pp. 509-541

Authors: Spinellis, D
Citation: D. Spinellis, Declarative peephole optimization using string pattern matching, ACM SIGPL N, 34(2), 1999, pp. 47-51

Authors: Gritzalis, S Iliadis, J Gritzalis, D Spinellis, D Katsikas, S
Citation: S. Gritzalis et al., Developing secure Web-based medical applications, MED INF IN, 24(1), 1999, pp. 75-90

Authors: Gritzalis, S Aggelis, G Spinellis, D
Citation: S. Gritzalis et al., Architectures for secure portable executable content, INTERNET R, 9(1), 1999, pp. 16-24

Authors: Spinellis, D Gritzalis, S Iliadis, J Gritzalis, D Katsikas, S
Citation: D. Spinellis et al., Trusted third party services for deploying secure telemedical applicationsover the WWW, COMPUT SEC, 18(7), 1999, pp. 627-639

Authors: Gritzalis, S Spinellis, D Georgiadis, P
Citation: S. Gritzalis et al., Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification, COMPUT COMM, 22(8), 1999, pp. 697-709

Authors: Spinellis, D
Citation: D. Spinellis, Explore, excogitate, exploit: Component mining, COMPUTER, 32(9), 1999, pp. 114-116
Risultati: 1-10 |