Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Ontology for Privacy Requirements via a Systematic Literature Review., , and . J. Data Semant., 9 (4): 123-149 (2020)CaRE: a refinement calculus for requirements engineering based on argumentation theory., , , and . Softw. Syst. Model., 21 (6): 2113-2132 (2022)Designing socio-technical systems: from stakeholder goals to social networks., , and . Requir. Eng., 14 (1): 47-70 (2009)Integration Issues in Implementing Semantic Data Models., and . DBPL, page 187-217. ACM Press / Addison-Wesley, (1987)Strategic Models for Business Intelligence., , , and . ER, volume 6998 of Lecture Notes in Computer Science, page 429-439. Springer, (2011)Making Data Meaningful: The Business Intelligence Model and Its Formal Semantics in Description Logics., , , , , , and . OTM Conferences (2), volume 7566 of Lecture Notes in Computer Science, page 700-717. Springer, (2012)Knowledge Bases and Databases: Current Trends and Future Directions., and . IS/KI, volume 474 of Lecture Notes in Computer Science, page 153-180. Springer, (1990)The Tropos Methodology and Software Development Environment., , , and . Social Modeling for Requirements Engineering, MIT Press, (2011)Requirements Analysis for Run-Time Service Compositions., and . Social Modeling for Requirements Engineering, MIT Press, (2011)Using Goals, Rules and Methods to Support Reasoning in Business Process Reengineering., and . Intell. Syst. Account. Finance Manag., 5 (1): 1-13 (1996)