Author of the publication

Workshop on modeling in software engineering at ICSE 2009.

, , , , , and . ACM SIGSOFT Software Engineering Notes, 34 (4): 34-37 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The 2015 "State of the Journal" report., , , and . Software and Systems Modeling, 15 (1): 1-4 (2016)Introduction to Special Issue on Risk and Trust in Embedded Critical Systems., , , , and . ACM Trans. Embedded Comput. Syst., 13 (5s): 152:1 (2014)Models for Non-functional Aspects of Component-Based Software (NfC'04)., , , , , , and . UML Satellite Activities, volume 3297 of Lecture Notes in Computer Science, page 62-66. Springer, (2004)Tool Support for Aspect-Oriented Design., , and . OOIS Workshops, volume 2426 of Lecture Notes in Computer Science, page 280-289. Springer, (2002)Verifiable composition of access control and application features., , , , , and . SACMAT, page 120-129. ACM, (2005)Experiences Developing a Requirements Language Based on the Psychological Framework Activity Theory., and . OCL@MoDELS, volume 1092 of CEUR Workshop Proceedings, page 63-72. CEUR-WS.org, (2013)MDHPCL 2012 workshop summary., , , , , and . MDHPCL@MoDELS, page 1. ACM, (2012)Model-driven security: MDsec '12 Workshop at MoDELS 2012, Innsbruck, Austria., , , , and . MDsec@MoDELS, page 1. ACM, (2012)Synergy between Activity Theory and goal/scenario modeling for requirements elicitation, analysis, and evolution., , , , , , and . Information & Software Technology, (2015)An aspect-oriented methodology for designing secure applications., , , , , and . Information & Software Technology, 51 (5): 846-864 (2009)