Author of the publication

AGORA: Attributed Goal-Oriented Requirements Analysis Method.

, , and . RE, page 13-22. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object-Oriented Meta Modelling.. OOER, volume 1021 of Lecture Notes in Computer Science, page 250-259. Springer, (1995)Detecting Bad Smells in Use Case Descriptions., , and . CoRR, (2020)Supporting the Elicitation of Requirements Compliant with Regulations., and . CAiSE, volume 5074 of Lecture Notes in Computer Science, page 228-242. Springer, (2008)An Integrated Tool for Supporting Ontology Driven Requirements Elicitation., , , and . ICSOFT (SE), page 73-80. INSTICC Press, (2007)Facilitating Business Improvement by Information Systems using Model Transformation and Metrics., , , , and . CAiSE Forum, volume 855 of CEUR Workshop Proceedings, page 106-113. CEUR-WS.org, (2012)Measuring Model Transformation in Model Driven Development., and . CAiSE Forum, volume 247 of CEUR Workshop Proceedings, CEUR-WS.org, (2007)Visualizing a Tangled Change for Supporting Its Decomposition and Commit Construction., , and . COMPSAC (1), page 74-79. IEEE Computer Society, (2018)Supporting Design Model Refactoring for Improving Class Responsibility Assignment., , , and . MoDELS, volume 6981 of Lecture Notes in Computer Science, page 455-469. Springer, (2011)Security Requirements Elicitation Using Method Weaving and Common Criteria., and . MoDELS (Workshops), volume 5421 of Lecture Notes in Computer Science, page 185-196. Springer, (2008)Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation., and . MODSEC@MoDELS, volume 413 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)