Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RiSD: A Methodology for Building i-Strategic Dependency Models., , , , , , , , and . SEKE, page 259-266. (2005)A Comparative Analysis of i*Agent-Oriented Modelling Techniques., , , and . SEKE, page 657-663. (2006)Extending Tropos for a Prolog Implementation: A Case Study Using the Food Collecting Agent Problem., , and . CLIMA, volume 3900 of Lecture Notes in Computer Science, page 396-405. Springer, (2005)iStarML: Principles and Implications., and . iStar, volume 766 of CEUR Workshop Proceedings, page 8-13. CEUR-WS.org, (2011)Classification of Speech Acts in Public Software Tenders., , , , and . IEEE Access, (2022)3MSF: A framework to select mobile office devices., and . Int. J. Comput. Sci. Appl., 6 (5): 121-144 (2009)Model Interchange and Tool Interoperability in the i* Framework: A Proof of Concept., , , and . WER, (2011)On Optimizing the Path to Information Security Compliance., , and . QUATIC, page 182-185. IEEE Computer Society, (2012)Definition and Uses of the i* Metamodel., , , and . iStar, volume 586 of CEUR Workshop Proceedings, page 20-25. CEUR-WS.org, (2010)On the joint use of i* with other modelling frameworks: A vision paper., , , and . RE, page 133-142. IEEE Computer Society, (2011)