| Final Proceedings |
| Peer:
an Architectural Pattern by M. Amoretti, M. Reggiani,
F. Zanichelli, G. Conte |
| The
SOAP Pattern for Medical Charts by T.Sorgente, E. B.
Fernandez, M. M. Larrondo-Petrie |
| Activator by M. Stal, D. Schmidt |
| Stage
Driver: a design pattern for multistage forms by P.
Montesinos-Ortego |
| Change
Of Authority and Thread Safe Interface goes synchronized by P. Bachmann |
| Secure
Pre-forking - A Pattern for Performance and Security by M. Hafiz |
| Context
Object: A Design Pattern for Efficient Middleware Request
Processing by A.S Krishna, D.C Schmidt, M Stal |
| The
Dynamic Mapping Design Pattern by J. Gresh, J. McKim,
H. Sanchez |
| Log
Data Management Patterns by A. Raveh |
| Privacy-Aware
Network Client Pattern by M. Sadicoff, M. M.
Larrondo-Petrie, and E. B. Fernandez |
| Warning
Message Accumulator by K. S. Ahluwalia |
| A
Theoretically-based Process for Organizing Design Patterns by S. Hasso, C. R. Carlson |
| Telephone
Number Lookup by R. Hanmer |
| Reengineering
for Parallelism: An Entry Point into PLPP (Pattern Language
for Parallel Programming) for Legacy Applications by B. L. Massingill, T. G. Mattson, B. A. Sanders |
| Cognitive
Patterns for Software Comprehension: Temporal Details by A. Murray, T.C.Lethbridge |
| Patterns
for the eXtensible Access Control Markup Language by N. Delessy , E. B. Fernandez, T. Sorgente |
| A
Model for Meta-Specification and Cataloging of Software Patterns by L. Welicki, O. Sanjuan, J.M. Cueva |