Author of the publication

An Automated Approach to Transform Use Cases into Activity Diagrams.

, , and . ECMFA, volume 6138 of Lecture Notes in Computer Science, page 337-353. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling robustness behavior using aspect-oriented modeling to support robustness testing of industrial systems., , and . Softw. Syst. Model., 11 (4): 633-670 (2012)A goal-based approach for qualification of new technologies: Foundations, tool support, and industrial validation., , , and . Reliab. Eng. Syst. Saf., (2013)Q-MOPP: qualitative evaluation of maintenance organizations, processes and products., , , , and . Journal of Software Maintenance, 10 (4): 249-278 (1998)Replicated Case Studies for Investigating Quality Factors in Object-Oriented Designs., , and . Empirical Software Engineering, 6 (1): 11-58 (2001)Property-Based Software Engineering Measurement., , and . IEEE Trans. Software Eng., 22 (1): 68-86 (1996)A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance., , and . IEEE Trans. Software Eng., 34 (3): 407-432 (2008)Embracing the Engineering Side of Software Engineering.. IEEE Software, 29 (4): 96 (2012)A scalable approach for malware detection through bounded feature space behavior modeling., , , , and . ASE, page 312-322. IEEE, (2013)Using machine learning to assist with the selection of security controls during security assessment., , , , , and . Empir. Softw. Eng., 25 (4): 2550-2582 (2020)Coverage-based regression test case selection, minimization and prioritization: a case study on an industrial system., , , and . Softw. Test. Verification Reliab., 25 (4): 371-396 (2015)