Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using enterprise architecture analysis and interview data to estimate service response time., , , and . J. Strateg. Inf. Syst., 22 (1): 70-85 (2013)A method for assessing the business value of information system scenarios with an estimated credibility of the result., , and . Int. J. Serv. Technol. Manag., 13 (1/2): 105-133 (2010)Extended Influence Diagrams for System Quality Analysis., , , and . J. Softw., 2 (3): 30-42 (2007)Enterprise Architecture for Information System Analysis: Modeling and assessing data accuracy, availability, performance and application usage.. KTH Royal Institute of Technology, Sweden, (2012)A Survival Analysis of Application Life Spans based on Enterprise Architecture Models., , , , , , , and . EMISA, volume P-152 of LNI, page 141-154. GI, (2009)Extended Influence Diagrams for Enterprise Architecture Analysis., , , and . EDOC, page 3-12. IEEE Computer Society, (2006)Using enterprise architecture and technology adoption models to predict application usage., , , , and . J. Syst. Softw., 85 (8): 1953-1967 (2012)Data Collection Prioritization for System Quality Analysis., , , , and . SQM@CSMR, volume 233 of Electronic Notes in Theoretical Computer Science, page 29-42. Elsevier, (2008)Enterprise Architecture Analysis for Data Accuracy Assessments., , , , and . EDOC, page 24-33. IEEE Computer Society, (2009)Enterprise architecture analysis with extended influence diagrams., , , and . Inf. Syst. Frontiers, 9 (2-3): 163-180 (2007)