Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations., , and . REFSQ, volume 6182 of Lecture Notes in Computer Science, page 255-261. Springer, (2010)Agile Requirements Engineering in Practice: Status Quo and Critical Problems., , , and . CLEI Electron. J., (2018)Heuristic Methods for Searching and Clustering Hierarchical Workflows., , , , and . EUROCAST, volume 5717 of Lecture Notes in Computer Science, page 737-744. Springer, (2009)Gaining Deeper Insights in Symbolic Regression., , , , , and . GPTP, page 175-190. Springer, (2013)Knowledge Discovery through Symbolic Regression with HeuristicLab., , , , , and . ECML/PKDD (2), volume 7524 of Lecture Notes in Computer Science, page 824-827. Springer, (2012)Zoom Media Lab & The Virtual Collection of Children's Everyday Culture., and . ICHIM (2), page 113-117. Archives & Museum Informatics, Pittsburgh, PA, USA, (2001)Do We Preach What We Practice? Investigating the Practical Relevance of Requirements Engineering Syllabi - The IREB Case., , , , , , , , , and . CIbSE, page 476-487. Curran Associates, (2019)Optimising Analytical Software Quality Assurance.. SWQD, volume 371 of Lecture Notes in Business Information Processing, page 134-138. Springer, (2020)Robust Storage Assignment in Warehouses with Correlated Demand., , , and . Computational Intelligence and Efficiency in Engineering Systems, volume 595 of Studies in Computational Intelligence, Springer, (2015)Data-Flow-Based Extension of the System-Theoretic Process Analysis for Security (STPA-Sec)., , and . CoRR, (2020)