Author of the publication

Integrating Semi-formal and Formal Requirements.

, , and . CAiSE, volume 1250 of Lecture Notes in Computer Science, page 19-32. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Défis de la sécurité de l'information. Support à la gestion des risques de sécurité par les modèles., , , and . Ingénierie des Systèmes d'Information, 13 (1): 37-74 (2008)Enabling Technology for Distributed Multimedia Applications., , , , , , , , , and 7 other author(s). IBM Systems Journal, 36 (4): 489-507 (1997)If Business Models Could Speak! Efficient: a Framework for Appraisal, Design and Simulation of Electronic Business Transactions., , , , , and . ICEIMT/DIISM, volume 183 of IFIP, page 161-171. Springer, (2004)Requirements Engineering for Improving Business/IT Alignment in Security Risk Management Methods., , and . IESA, page 15-26. Springer, (2007)Scene sampling for the concentric mosaics technique virtual reality., and . ICIP (1), page 465-468. (2002)Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management., , , , and . J. UCS, 18 (6): 816-844 (2012)Bridging the Gap between Risk Analysis and Security Policies., and . SEC, volume 250 of IFIP Conference Proceedings, page 409-412. Kluwer, (2003)A projection method to generate anaglyph stereo images.. ICASSP, page 1661-1664. IEEE, (2001)Alignment of cubic-panorama image datasets using epipolar geometry., and . ICASSP, page 1545-1548. IEEE, (2011)A matching-based view interpolation scheme., and . ICASSP (2), page 877-880. IEEE, (2005)