From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Specifying software features for composition: A tool-supported approach., , , и . Comput. Networks, 57 (12): 2454-2464 (2013)Composing Requirements Using Problem Frames., , , и . RE, стр. 122-131. IEEE Computer Society, (2004)Introducing Abuse Frames for Analysing Security Requirements., , , , и . RE, стр. 371-372. IEEE Computer Society, (2003)Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations., , , , и . RE Workshops, стр. 102-105. IEEE Computer Society, (2016)Are Your Lights Off? Using Problem Frames to Diagnose System Failures., , , , и . RE, стр. 343-348. IEEE Computer Society, (2009)Adding static and dynamic semantics to building information models., , , , и . SEsCPS@ICSE, стр. 1-7. ACM, (2016)An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering., , , и . RE, стр. 100-. IEEE Computer Society, (1999)Evaluating the Harmfulness of Cloning: A Change Based Experiment., , и . MSR, стр. 18. IEEE Computer Society, (2007)Meet your Maker: A Social Identity Analysis of Robotics Software Engineering., , , , , и . TAS, стр. 44:1-44:5. ACM, (2023)Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements., , , и . iTrust, том 2995 из Lecture Notes in Computer Science, стр. 347-354. Springer, (2004)