Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using trust assumptions with security requirements., , , and . Requir. Eng., 11 (2): 138-151 (2006)Let's jam the reactable: Peer learning during musical improvisation with a tabletop tangible interface., , , , , and . ACM Trans. Comput.-Hum. Interact., 20 (6): 36:1-36:34 (2013)Security Requirements Engineering: A Framework for Representation and Analysis., , , and . IEEE Trans. Software Eng., 34 (1): 133-153 (2008)Cross Entropy as a Measure of Musical Contrast., , and . MCM, volume 9110 of Lecture Notes in Computer Science, page 193-198. Springer, (2015)A Subsumption Agent for Collaborative Free Improvisation., , , and . Computer Music Journal, 39 (4): 96-115 (2015)Aspect Interactions: A Requirements Engineering Perspective., , , , and . Aspect-Oriented Requirements Engineering, Springer, (2013)UniPad: orchestrating collaborative activities through shared tablets and an integrated wall display., , , and . UbiComp, page 801-810. ACM, (2013)Using the event calculus to reason about problem diagrams., , , , and . IWAAPF@ICSE, page 74-77. ACM, (2008)A Comparative Evaluation of Algorithms for Discovering Translational Patterns in Baroque Keyboard Works., , , , and . ISMIR, page 3-8. International Society for Music Information Retrieval, (2010)The Effect of Trust Assumptions on the Elaboration of Security Requirements., , , and . RE, page 102-111. IEEE Computer Society, (2004)