Author of the publication

A compulsory yet motivating question/answer game to teach computer fundamentals.

, , and . Comput. Appl. Eng. Educ., 17 (2): 167-179 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The REBOOT approach to software reuse., , and . J. Syst. Softw., 30 (3): 201-212 (1995)Process models representing knowledge for action: a revised quality framework., , and . Eur. J. Inf. Syst., 15 (1): 91-102 (2006)Defining quality aspects for conceptual models., , and . ISCO, volume 26 of IFIP Conference Proceedings, page 216-231. Chapman & Hall, (1995)Activity diagrams with location context: Experimental comparison of colour and icon annotations., and . ISD, University of Economics in Katowice / Association for Information Systems, (2016)Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases., and . BMMDS/EMMSAD, volume 113 of Lecture Notes in Business Information Processing, page 378-392. Springer, (2012)A Look at Misuse Cases for Safety Concerns.. Situational Method Engineering, volume 244 of IFIP, page 252-266. Springer, (2007)Adapting UML Activity Diagrams for Mobile Work Process Modelling: Experimental Comparison of Two Notation Alternatives., , and . PoEM, volume 68 of Lecture Notes in Business Information Processing, page 145-161. Springer, (2010)Report on the working conference on requirements engineering: foundation for software quality (REFSQ'09)., , , , , , , , and . ACM SIGSOFT Softw. Eng. Notes, 34 (5): 40-45 (2009)Concepts for Real-World Modelling, and . CAiSE, volume 685 of Lecture Notes in Computer Science, page 309-327. Springer, (1993)An experimental evaluation of bow-tie analysis for security., , , , and . Inf. Comput. Secur., (2019)