Author of the publication

Attuning Adaptation Rules via a Rule-Specific Neural Network.

, , , , , , , , and . ISoLA (3), volume 13703 of Lecture Notes in Computer Science, page 215-230. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conclusion., , , and . Composing Model-Based Analysis Tools, Springer, (2021)Dynamic Access Control in Industry 4.0 Systems., , , , , , , and . Digital Transformation, Springer, (2022)Concern-oriented language development (COLD): Fostering reuse in language engineering., , , , , , , , , and 6 other author(s). Comput. Lang. Syst. Struct., (2018)An Extensible Framework for Architecture-Based Data Flow Analysis for Information Security., , , and . CoRR, (2024)Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC Policies., , and . ICISSP, page 300-307. SCITEPRESS, (2021)1st Colloborative Workshop on Evolution and Maintenance of Long-Living-Systems (EMLS14)., , , , and . Software Engineering, volume P-227 of LNI, page 203-204. GI, (2014)A Taxonomy of Dynamic Changes Affecting Confidentiality., , and . Softwaretechnik-Trends, 40 (2): 35-36 (2020)Investigating Software Engineering Artifacts in DevOps Through the Lens of Boundary Objects., , and . EASE, page 12-21. ACM, (2023)Vorwort., , , and . Modellierung (Workshops), volume P-255 of LNI, page 85-86. GI, (2016)Defining the Quality of Business Processes., and . Modellierung, volume P-161 of LNI, page 133-148. GI, (2010)