Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Requirements to Architectures for Better Adaptive Software Systems., , , , and . iStar, volume 978 of CEUR Workshop Proceedings, page 91-96. CEUR-WS.org, (2013)Dealing with multiple failures in zanshin: a control-theoretic approach., , and . SEAMS, page 165-174. ACM, (2014)A Metamodel for GDPR-based Privacy Level Agreements., , , and . ER Forum/Demos, volume 1979 of CEUR Workshop Proceedings, page 285-291. CEUR-WS.org, (2017)Leak detection in the pipeline network of an oil refinery - A pattern classification paradigm., , and . PCI, page 178-182. ACM, (2020)Fast convolution and correlation computational methods in leakage localization applications., and . PCI, page 172-177. ACM, (2021)Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach., , , , , and . Softw. Syst. Model., 19 (2): 467-491 (2020)Requirements-driven software evolution., , , and . Comput. Sci. Res. Dev., 28 (4): 311-329 (2013)Adaptive predictive control for software systems., , and . CTSE@SIGSOFT FSE, page 17-21. ACM, (2015)From requirements to statecharts via design refinement., , , , and . SAC, page 995-1000. ACM, (2014)Comparing Model-Based Predictive Approaches to Self-Adaptation: CobRA and PLA., , , , and . SEAMS@ICSE, page 42-53. IEEE Computer Society, (2017)