Author of the publication

Introduction to the User Requirements Notation: learning by example.

. Computer Networks, 42 (3): 285-301 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Markthaler University of Stuttgart

Replication Data for: Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis, and . Dataset, (2024)Related to: Schneider, Andreas; Lystbæk, Thomas B.; Markthaler, Daniel; Hansen, Niels; Hauer, Bernhard (2024): Biocatalytic stereocontrolled head-to-tail cyclizations of unbiased terpenes as a tool in chemoenzymatic synthesis. In: Nature Communications, 15, 4925. doi: 10.1038/s41467-024-48993-9.
 

Other publications of authors with the same name

Introduction to the User Requirements Notation: learning by example.. Computer Networks, 42 (3): 285-301 (2003)Evolution mechanisms for goal-driven pattern families used in business process modelling., and . IJEB, 10 (3): 254-291 (2013)Formal Support for Design Techniques: A Timethreads-LOTOS Approach., , , and . FORTE, volume 43 of IFIP Conference Proceedings, page 57-72. Chapman & Hall, (1995)Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System., , , and . CCECE, page 2432-2435. IEEE, (2006)Bridging the Requirements/Design Gap in Dynamic Systems with Use Case Maps (UCMs)., and . ICSE, page 743-744. IEEE Computer Society, (2001)Comparative Analysis between Document-based and Model-based Compliance Management Approaches., , and . RELAW, page 35-39. IEEE Computer Society, (2008)Business Process Compliance Tracking Using Key Performance Indicators., , and . Business Process Management Workshops, volume 66 of Lecture Notes in Business Information Processing, page 73-84. Springer, (2010)Common Length Name Representation: An Efficient Privacy-Preserving Scheme., , and . TELERISE@ICSE, page 44-49. IEEE Computer Society, (2015)Research Paper: A Globally Optimal k-Anonymity Method for the De-Identification of Health Data., , , , , , , , , and 2 other author(s). JAMIA, 16 (5): 670-682 (2009)Requirements Engineering (RE) for Social Good: RE Cares Requirements., , , , , , , , , and 10 other author(s). IEEE Software, 36 (1): 86-94 (2019)