Author of the publication

What you need is what you get!: The vision of view-based requirements specifications

, and . Requirements Engineering Conference (RE), 2012 20th IEEE International, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What you need is what you get!: The vision of view-based requirements specifications, and . Requirements Engineering Conference (RE), 2012 20th IEEE International, (2012)Lessons Learned from Best Practice-Oriented Process Improvement in Requirements Engineering: A Glance into Current Industrial RE Application, , and . Requirements Engineering Education and Training (REET), 2009 Fourth International Workshop on, (2009)A comparative study of +/- steganalyzers., , , and . MMSP, page 791-796. IEEE Signal Processing Society, (2008)Detection of motion-incoherent components in video streams., , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 49-58 (2009)Next-Generation Access Tokens to Fight CDN Leeching., and . MHV, page 111-112. ACM, (2024)Exploring color information to characterize camcorder piracy., , , and . WIFS, page 132-137. IEEE, (2013)A population of eagles, horses, and moles: Perceptual sensitivity to watermark disparity coherence., and . WIFS, page 1-6. IEEE, (2015)Semi-blind automatic temporal registration for video watermarking systems., , and . ICASSP, page 2853-2856. IEEE, (2013)Exploiting self-similarities to defeat digital watermarking systems: a case study on still images., , and . MM&Sec, page 133-142. ACM, (2004)On the Need for Signal-Coherent Watermarks., , and . IEEE Trans. Multim., 8 (5): 896-904 (2006)