Author of the publication

Resolving Anomalies in Configuration Knowledge Bases.

, , and . ISMIS, volume 7661 of Lecture Notes in Computer Science, page 311-320. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent supporting techniques for the maintenance of constraint-based configuration systems., , , and . Configuration Workshop, volume 1453 of CEUR Workshop Proceedings, page 31-38. CEUR-WS.org, (2015)Configuring Decision Tasks., , , , , and . Configuration Workshop, volume 1220 of CEUR Workshop Proceedings, page 17-21. CEUR-WS.org, (2014)A goal-question-metrics model for configuration knowledge bases., , , and . Configuration Workshop, volume 1453 of CEUR Workshop Proceedings, page 123-130. CEUR-WS.org, (2015)Eliciting Stakeholder Preferences for Requirements Prioritization., , and . Decisions@RecSys, volume 893 of CEUR Workshop Proceedings, page 27-31. CEUR-WS.org, (2012)Basic Approaches in Recommendation Systems., , , , , and . Recommendation Systems in Software Engineering, Springer, (2014)WE-DECIDE: A Decision Support Environment for Groups of Users., , , , and . IEA/AIE, volume 7906 of Lecture Notes in Computer Science, page 382-391. Springer, (2013)Using group recommendation heuristics for the prioritization of requirements.. RecSys, page 329-332. ACM, (2012)Anonymous Preference Elicitation for Requirements Prioritization., , and . ISMIS, volume 7661 of Lecture Notes in Computer Science, page 349-356. Springer, (2012)Recommender Systems for Configuration Knowledge Engineering., , , , , and . CoRR, (2021)Resolving Anomalies in Configuration Knowledge Bases., , and . ISMIS, volume 7661 of Lecture Notes in Computer Science, page 311-320. Springer, (2012)