Author of the publication

Goal Modelling for Security Problem Matching and Pattern Enforcement.

, , , , , , and . Int. J. Secur. Softw. Eng., 8 (3): 42-57 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calculating Accumulations., , and . New Gener. Comput., 17 (2): 153-173 (1999)Generic recursive lens combinators and their calculation laws., and . Theor. Comput. Sci., (2022)Engineering Adaptive Software Systems (EASSy) (NII Shonan Meeting 2013-7)., , , , and . NII Shonan Meet. Rep., (2013)How functional programming mattered, , and . National Science Review, 2 (3): 349--370 (Sep 1, 2015)Towards Manipulation of Mutually Recursive Functions., , and . Fuji International Symposium on Functional and Logic Programming, page 61-79. World Scientific, Singapore, (1998)Toward Co-existing Database Schemas based on Bidirectional Transformation., , , and . CoRR, (2019)Design and Engineering of Adaptive Software Systems., , , , , , , and . Engineering Adaptive Software Systems, Springer, (2019)Towards Bidirectional Higher-Order Transformation for Model-Driven Co-evolution., , and . MODELSWARD (Revised Selected Papers), volume 506 of Communications in Computer and Information Science, page 153-167. Springer, (2014)Mining Optimized Ranges., , and . APLAS, page 119-127. (2000)FastSV: A Distributed-Memory Connected Component Algorithm with Fast Convergence., , and . PPSC, page 46-57. SIAM, (2020)