Author of the publication

Towards a reliable mapping between performance and security tactics, and architectural patterns.

, , , , and . EuroPLoP, page 39:1-39:43. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to Develop a General Theory of Software Engineering: Report on the GTSE 2014 Workshop., , , , , , and . ACM SIGSOFT Softw. Eng. Notes, 39 (6): 23-25 (2014)When is the best time to learn? - Evidence from an introductory statistics course., , , , , and . CoRR, (2019)Towards Sustainable Research Data Management in Human-Computer Interaction., , , , , and . CoRR, (2023)Introducing Managed Software Evolution., , , , , and . Managed Software Evolution, Springer, (2019)A Data Mining Approach for Detecting Collusion in Unproctored Online Exams., , , , , , and . EDM, International Educational Data Mining Society, (2023)Tool Support for ViewPoint-oriented Software Development., , , and . AGTIVE, volume 1779 of Lecture Notes in Computer Science, page 419-425. Springer, (1999)Enriching OSGi Service Interfaces with Formal Sequential Contracts., , and . Software Engineering (Workshops), volume P-184 of LNI, page 41-46. GI, (2011)Deriving Quality-based Architecture Alternatives with Patterns., , , , and . Software Engineering, volume P-198 of LNI, page 71-82. GI, (2012)Einführung., , , , , and . Software Engineering (Workshops), volume P-106 of LNI, page 151-152. GI, (2007)Modellierung und Enactment mit ESSENCE., and . Software Engineering (Workshops), volume P-215 of LNI, page 405-414. GI, (2013)