Author of the publication

Project Courses at the NTH: 20 Years of Experience.

, , , , and . CSEE, volume 750 of Lecture Notes in Computer Science, page 177-188. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defining quality aspects for conceptual models., , and . ISCO, volume 26 of IFIP Conference Proceedings, page 216-231. Chapman & Hall, (1995)Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases., and . BMMDS/EMMSAD, volume 113 of Lecture Notes in Business Information Processing, page 378-392. Springer, (2012)A Look at Misuse Cases for Safety Concerns.. Situational Method Engineering, volume 244 of IFIP, page 252-266. Springer, (2007)Adapting UML Activity Diagrams for Mobile Work Process Modelling: Experimental Comparison of Two Notation Alternatives., , and . PoEM, volume 68 of Lecture Notes in Business Information Processing, page 145-161. Springer, (2010)Activity diagrams with location context: Experimental comparison of colour and icon annotations., and . ISD, University of Economics in Katowice / Association for Information Systems, (2016)Concepts for Real-World Modelling, and . CAiSE, volume 685 of Lecture Notes in Computer Science, page 309-327. Springer, (1993)A Systematic Mapping Study on Requirements Engineering in Software Ecosystems., , , and . CoRR, (2018)An experimental evaluation of bow-tie analysis for security., , , , and . Inf. Comput. Secur., (2019)Gender Differences in Computer Science Education: Lessons Learnt from an Empirical Study at NTNU., , , , , and . NIK, Bibsys Open Journal Systems, Norway, (2016)Et informatikkperspektiv på norsk lovgivning om karakterklager i høyere utdanning.. NIK, Bibsys Open Journal Systems, Norway, (2014)