María M. Larrondo-Petrie
According to our database1, María M. Larrondo-Petrie authored at least 38 papers between 1989 and 2018.
Legend:Book In proceedings Article PhD thesis Other
A Reliability Assessment Model for Online Laboratories Systems.
Proceedings of the Smart Industry & Smart Education, 2018
Scalable. Ad Hoc, Low Cost, Mobile, Online Laboratories.
Proceedings of the Learning With MOOCS, 2018
xAPI-Based Model for Tracking On-line Laboratory Applications.
Proceedings of the IEEE Frontiers in Education Conference, 2018
Editorial IEEE-RITA Electronic Journal - A Selection of Papers From LACCEI General Conference 2015.
Models and Smart Adaptive Interfaces for the Improvement of the Remote Laboratories User Experience in Education.
Proceedings of the Online Engineering & Internet of Things, 2017
Implementation of cloud-based smart adaptive remote laboratories for education.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017
Models of Collaborative Remote Laboratories and Integration with Learning Environments.
Int. J. Online Eng., 2016
Design of a Latin American and Caribbean remote laboratories network.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016
Editorial A Broader Coverage of the IEEE Education Society IEEE-RITA Electronic Journal: Latin American and Caribbean Consortium of Engineering Institutions (LACCEI) Collaboration.
Developing Leadership and Global Professional Engineer Competences in Our Students.
A Survey of Patterns for Web Services Security and Reliability Standards.
Future Internet, 2012
Security Requirements for Social Networks in Web 2.0.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
Designing Secure SCADA Systems Using Security Patterns.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Misuse patterns in VoIP.
Security and Communication Networks, 2009
On building secure SCADA systems using security patterns.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Patterns and Pattern Diagrams for Access Control.
Proceedings of the Trust, 2008
Security Patterns for Voice over IP Networks.
Attack Patterns: A New Forensic and Design Tool.
Proceedings of the Advances in Digital Forensics III, 2007
Security Patterns for Physical Access Control Systems.
Proceedings of the Data and Applications Security XXI, 2007
Detecting Deadlock, Double-Free and Other Abuses in a Million Lines of Linux Kernel Source.
Proceedings of the 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 2006
Defining Security Requirements Through Misuse Actions.
Proceedings of the IFIP 19th World Computer Congress, 2006
A UML-Based Methodology for Secure Systems: The Design Stage .
Proceedings of the Security in Information Systems, 2005
Some Security Issues of Wireless Systems.
Proceedings of the Advanced Distributed Systems: 5th International School and Symposium, 2005
Reasoning about VHDL and VHDL-AMS using Denotational Semantics.
Proceedings of the 1999 Design, 1999
Extending Aggregation Constructs in UML.
Proceedings of the Unified Modeling Language, 1998
An Integrated Object-Oriented and Formal Modeling Environment.
Towards a Rigorous Object-Oriented Analysis and Design Method.
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997
Rigorous Object-Oriented Modeling: Integrating Formal and Informal Notations.
Proceedings of the Algebraic Methodology and Software Technology, 1997
High-Level Security Issues in Multimedia/Hypertext Systems.
Proceedings of the Communications and Multimedia Security II, 1996
Guidelines for Formalizing Fusion Object-Oriented Analysis Methods .
Proceedings of the Advances Information System Engineering, 8th International Conference, 1996
A Two-Dimensional View of Integrated Formal and Informal Specification Techniques.
Proceedings of the ZUM '95: The Z Formal Specification Notation, 1995
Understanding the Role of Formal Specification Techniques in Requirements Engineering.
Proceedings of the Software Engineering Education, 8th SEI CSEE Conference, New Orleans, LA, USA, March 29, 1995
Approaches to teaching introductory computer graphics.
Proceedings of the 21th Annual Conference on Computer Graphics and Interactive Techniques, 1994
From Structured Analysis to Formal Specifications: State of the Theory.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994
A Method-Based Authorization Model for Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993
EDICT for computer ethics education.
J. Syst. Softw., 1992
Relating Psychology's Moral Development Levels to the Ethical Use of Computers (Abstract).
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990
Security Policies in Object-Oriented Databases.
Proceedings of the Database Security, 1989