Author of the publication

Software Engineering mit UML und dem Unified Process

, , and . Pearson Studium, 2. �berarbeitete Auflage edition, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Descriptor Theory - What is about?., , and . ICCI, page 418-422. IEEE Computer Society, (1993)GroFin: enhancing in-store grocery shopping with a context-aware smartphone app., , , and . MUM, page 29:1-29:11. ACM, (2019)Automated Code Transformations: Dealing with the Aftermath., , , , and . SANER, page 627-631. IEEE, (2020)Ten Heuristics from Applying Agile Practices across Different Distribution Scenarios: A Multiple-Case Study., and . Computer and Information Science, 9 (2): 68-81 (2016)Securing the Rights of Data Subjects with Blockchain Technology., , , , , and . ICICT, page 284-288. IEEE, (2020)Hyper Typer: A Serious Game for Measuring Mobile Text Entry Performance in the Wild., , and . CHI Extended Abstracts, ACM, (2019)Design space for focus+context navigation in web forms., , , and . EICS, page 39-44. ACM, (2014)Outsourcing as a strategy for IT harmonization: a public sector case study proposing an approach in independent stakeholder scenarios., , and . ICEGOV, volume 351 of ACM International Conference Proceeding Series, page 245-250. ACM, (2008)Black-box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service: work in progress., , , and . IPTComm, page 101-110. ACM, (2010)Introducing a Software Reuse Culture in Practice., and . CSEE, volume 750 of Lecture Notes in Computer Science, page 527-539. Springer, (1994)