Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Semi-formal and Formal Requirements., , and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 19-32. Springer, (1997)Aligning Application Architecture to the Business Context., , , and . CAiSE, volume 2681 of Lecture Notes in Computer Science, page 209-225. Springer, (2003)An Execution Algorithm for UML Activity Graphs., and . UML, volume 2185 of Lecture Notes in Computer Science, page 47-61. Springer, (2001)Actor-Oriented System Specification with Dynamic Logic., and . TAPSOFT, Vol.2, volume 494 of Lecture Notes in Computer Science, page 337-357. Springer, (1991)Architecture Alignment., , and . Enterprise Architecture at Work, 4th ed., Springer, (2017)The Banking Industry Underestimates Costs of Cloud Migrations., , , and . CBI (1), page 300-309. IEEE, (2020)Roles and Dynamic Subclasses: A Modal Logic Approach., , and . ECOOP, volume 821 of Lecture Notes in Computer Science, page 32-59. Springer, (1994)Towards middle-range usable design theories for software engineering.. GTSE, page 1-4. ACM, (2014)Integrated Specification of Values, Objects and Processes for Object-Oriented Models (Extended Abstract).. FMLDO, volume 90/3 of Informatik-Berichte des IfI, page 199-208. Technische Universität Clausthal, (1990)CRAC: Confidentiality risk assessment and IT-infrastructure comparison., , , and . CNSM, page 322-325. IEEE, (2010)