Skip to content

Latest commit

 

History

History
23 lines (12 loc) · 2.31 KB

References.md

File metadata and controls

23 lines (12 loc) · 2.31 KB

REFERENCES

[1] A. Dearden, J. Finlay, L. Allgar, and B. Mcmanus, “Evaluating pattern languages in participatory design,” 2002, p. 664, doi: 10.1145/506486.506535.

[2] K. McGee, “Patterns and Computer Game Design Innovation,” Melbourne, AUS, 2007.

[3] D. Khazanchi, J. D. Murphy, and S. C. Petter, “Guidelines for Evaluating Patterns in the IS Domain,” in MWAIS 2008 Proceedings, 2008, vol. 24, [Online]. Available: https://digitalcommons.unomaha.edu/isqafacproc/7.

[4] C. Rolland, J. Stirna, N. Prekas, P. Loucopoulos, A. Persson, and G. Grosz, “Evaluating a Pattern Approach as an Aid for the Development of Organisa-tional Knowledge: An Empirical Study,” in Active Flow and Combustion Control 2018, vol. 141, R. King, Ed. Cham, 2000, pp. 176–191.

[5] J. Borchers and F. Buschmann, A Pattern Approach to Interaction Design. USA: John Wiley & Sons, Inc., 2001.

[6] W. Brown, R. Malveau, H. McCormick, and T. Mowbray, “The Software Patterns Criteria - Proposed Definitions for Evaluating Software Pattern Quality.” Jun. 02, 1998, [Online]. Available: http://antipatterns.com/whatisapattern/.

[7] D. Lea, “Christopher Alexander: an introduction for object-oriented designers,” SIGSOFT Softw. Eng. Notes, vol. 19, no. 1, pp. 39–46, Jan. 1994, doi: 10.1145/181610.181617.

[8] P. Singpant and N. Prompoon, “Constructing patterns verification criteria based on quality attributes: Web security context patterns case study,” in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, Okayama, Japan, Jun. 2016, pp. 1–7, doi: 10.1109/ICIS.2016.7550839.

[9] S. Niebuhr, K. Kohler, and C. Graf, “Engaging Patterns: Challenges and Means Shown by an Example,” in Engineering Interactive Systems, vol. 4940, J. Gulliksen, M. B. Harning, P. Palanque, G. C. van der Veer, and J. Wesson, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 586–600.

[10] A. Mavridou and A. Laszka, “Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach,” arXiv:1711.09327 [cs], Nov. 2017, Accessed: Aug. 24, 2019. [Online]. Available: http://arxiv.org/abs/1711.09327.

[11] Ethereum Foundation, “Common Patterns - Restricted Access.” Dec. 13, 2020, Accessed: Apr. 22, 2020. [Online]. Available: https://solid-ity.readthedocs.io/en/latest/common-patterns.html#restricting-access.