Author of the publication

A Basis for Analyzing Software Architecture Analysis Methods.

, , , , and . Software Quality Journal, 13 (4): 329-355 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Methodology for Mining Security Tactics from Security Patterns., , and . HICSS, page 1-5. IEEE Computer Society, (2010)Toward a Software Engineering Model of Human-Computer Interaction., , and . Engineering for Human-Computer Interaction, volume A-18 of IFIP Transactions, page 131-154. North-Holland, (1992)Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs., , and . ICSE, page 519-528. IEEE Computer Society, (2007)Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?, , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)Interface Descriptions for Enterprise Architecture., and . Software Engineering Research and Practice, page 87-93. CSREA Press, (2005)Playing Detective: Reconstructing Software Architecture from Available Evidence., and . Autom. Softw. Eng., 6 (2): 107-138 (1999)Simulating the Child's Acquisition of the Lexicon and Syntax-Experiences with Babel.. Machine Learning, 16 (1-2): 87-120 (1994)Abstraction classes in software design., , and . IEE Proceedings - Software, 153 (4): 163-182 (2006)A Principled Way to Use Frameworks in Architecture Design., , and . IEEE Software, 30 (2): 46-53 (2013)A Software Architecture Reconstruction Method., , and . WICSA, volume 140 of IFIP Conference Proceedings, page 15-34. Kluwer, (1999)