Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning from Accidents: A Systematic Review of Accident Analysis Methods and Models., , , and . IJISCRAM, 10 (3): 42-62 (2018)Requirements engineering - frameworks for understanding.. Wiley, (1996)Combining Static and Dynamic Modelling Methods: A Comparison of Four Methods.. Comput. J., 38 (1): 17-30 (1995)Towards middle-range usable design theories for software engineering.. GTSE, page 1-4. ACM, (2014)Integrated Specification of Values, Objects and Processes for Object-Oriented Models (Extended Abstract).. FMLDO, volume 90/3 of Informatik-Berichte des IfI, page 199-208. Technische Universität Clausthal, (1990)CRAC: Confidentiality risk assessment and IT-infrastructure comparison., , , and . CNSM, page 322-325. IEEE, (2010)Design science methodology: principles and practice.. ICSE (2), page 493-494. ACM, (2010)978-1-60558-719-6.Towards self-configuration and management of e-service provisioning in dynamic value constellations., , , and . SAC, page 566-571. ACM, (2008)Embedding Object-Oriented Design in System Engineering.. Behavioral Specifications of Businesses and Systems, volume 523 of The Kluwer International Series in Engineering and Computer Science, Springer, (1999)Validating the Raster Risk Assessment Method in Practice., , and . ISCRAM, ISCRAM Association, (2015)