Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formally Modeling UML and its Evolution: A Holistic Approach., and . FMOODS, volume 177 of IFIP Conference Proceedings, page 183-206. Kluwer, (2000)Emerging OCL tools., , and . Softw. Syst. Model., 2 (4): 248-261 (2003)ModelSec: A Generative Architecture for Model-Driven Security., , , and . J. Univers. Comput. Sci., 15 (15): 2957-2980 (2009)Formal Validation and Verification of Atomic Resolution Microscope Control and Topography., , , and . Cybern. Syst., 32 (8): 851-870 (2001)A Precise Approach for the Analysis of the UML Models Consistency., and . ER (Workshops), volume 3770 of Lecture Notes in Computer Science, page 74-84. Springer, (2005)REMM-Studio+: Modeling Variability to Enable Requirements Reuse., , and . ER, volume 5231 of Lecture Notes in Computer Science, page 530-531. Springer, (2008)Knowledge Clustering Using a Neural Network in a Course on Medical-Surgical Nursing., , , , and . EANN, volume 311 of Communications in Computer and Information Science, page 385-394. Springer, (2012)A Systematic Review and Comparison of Security Ontologies., , , , , and . ARES, page 813-820. IEEE Computer Society, (2008)Reusing Requirements in Global Software Engineering., , , , , and . Managing Requirements Knowledge, Springer, (2013)Evaluation and Neuronal Network-Based Classification of the PHRs Privacy Policies., , , , , and . HICSS, page 2840-2849. IEEE Computer Society, (2012)