María M. Larrondo-Petrie

According to our database1, María M. Larrondo-Petrie authored at least 38 papers between 1989 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A Reliability Assessment Model for Online Laboratories Systems.
Proceedings of the Smart Industry & Smart Education, 2018

Scalable. Ad Hoc, Low Cost, Mobile, Online Laboratories.
Proceedings of the Learning With MOOCS, 2018

xAPI-Based Model for Tracking On-line Laboratory Applications.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Editorial IEEE-RITA Electronic Journal - A Selection of Papers From LACCEI General Conference 2015.
IEEE-RITA, 2017

Models and Smart Adaptive Interfaces for the Improvement of the Remote Laboratories User Experience in Education.
Proceedings of the Online Engineering & Internet of Things, 2017

Implementation of cloud-based smart adaptive remote laboratories for education.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
Models of Collaborative Remote Laboratories and Integration with Learning Environments.
Int. J. Online Eng., 2016

Design of a Latin American and Caribbean remote laboratories network.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2015
Editorial A Broader Coverage of the IEEE Education Society IEEE-RITA Electronic Journal: Latin American and Caribbean Consortium of Engineering Institutions (LACCEI) Collaboration.
IEEE-RITA, 2015

Developing Leadership and Global Professional Engineer Competences in Our Students.
IEEE-RITA, 2015

2012
A Survey of Patterns for Web Services Security and Reliability Standards.
Future Internet, 2012

2010
Security Requirements for Social Networks in Web 2.0.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

Designing Secure SCADA Systems Using Security Patterns.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Misuse patterns in VoIP.
Security and Communication Networks, 2009

On building secure SCADA systems using security patterns.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Patterns and Pattern Diagrams for Access Control.
Proceedings of the Trust, 2008

2007
Security Patterns for Voice over IP Networks.
JSW, 2007

Attack Patterns: A New Forensic and Design Tool.
Proceedings of the Advances in Digital Forensics III, 2007

Security Patterns for Physical Access Control Systems.
Proceedings of the Data and Applications Security XXI, 2007

2006
Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source.
Proceedings of the 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 2006

Defining Security Requirements Through Misuse Actions.
Proceedings of the IFIP 19th World Computer Congress, 2006

2005
A UML-Based Methodology for Secure Systems: The Design Stage .
Proceedings of the Security in Information Systems, 2005

Some Security Issues of Wireless Systems.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005

1999
Reasoning about VHDL and VHDL-AMS using Denotational Semantics.
Proceedings of the 1999 Design, 1999

1998
Extending Aggregation Constructs in UML.
Proceedings of the Unified Modeling Language, 1998

1997
An Integrated Object-Oriented and Formal Modeling Environment.
JOOP, 1997

Towards a Rigorous Object-Oriented Analysis and Design Method.
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997

Rigorous Object-Oriented Modeling: Integrating Formal and Informal Notations.
Proceedings of the Algebraic Methodology and Software Technology, 1997

1996
High-Level Security Issues in Multimedia/Hypertext Systems.
Proceedings of the Communications and Multimedia Security II, 1996

Guidelines for Formalizing Fusion Object-Oriented Analysis Methods .
Proceedings of the Advances Information System Engineering, 8th International Conference, 1996

1995
A Two-Dimensional View of Integrated Formal and Informal Specification Techniques.
Proceedings of the ZUM '95: The Z Formal Specification Notation, 1995

Understanding the Role of Formal Specification Techniques in Requirements Engineering.
Proceedings of the Software Engineering Education, 8th SEI CSEE Conference, New Orleans, LA, USA, March 29, 1995

1994
Approaches to teaching introductory computer graphics.
Proceedings of the 21th Annual Conference on Computer Graphics and Interactive Techniques, 1994

From Structured Analysis to Formal Specifications: State of the Theory.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
A Method-Based Authorization Model for Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993

1992
EDICT for computer ethics education.
J. Syst. Softw., 1992

1990
Relating Psychology's Moral Development Levels to the Ethical Use of Computers (Abstract).
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990

1989
Security Policies in Object-Oriented Databases.
Proceedings of the Database Security, 1989


  Loading...