Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crosscutting quality attributes for requirements engineering, , and . SEKE '02: Proceedings of the 14th international conference on Software engineering and knowledge engineering, page 167--174. New York, NY, USA, ACM Press, (2002)Towards a Standardized Description and a Systematic Use of Social Patterns., , , and . CIbSE, page 195-208. (2007)Modelling Location-aware Behaviour in Web-GIS using Aspects., , , , , , and . ICEIS (3), page 416-419. (2009)Improving Multi-Agent Architectural Design., , , , , and . SELMAS (LNCS), volume 4408 of Lecture Notes in Computer Science, page 165-184. Springer, (2006)Multi-paradigm deception modeling for cyber defense., , and . J. Syst. Softw., (2018)A Traceability Method for Crosscutting Concerns with Transformation Rules., , , , and . EA@ICSE, page 7. IEEE, (2007)Comparing Value-Driven Methods: an Experiment Design., , , , and . HuFaMo@MoDELS, volume 1805 of CEUR Workshop Proceedings, page 19-26. CEUR-WS.org, (2016)A model-based representation of configuration knowledge., and . FOSD, page 43-48. ACM, (2009)Contracts for aspect-oriented design., , and . SPLAT@AOSD, page 1:1-1:6. ACM, (2008)A cover-based approach for configuration repair., and . SPLC, page 157-166. ACM, (2014)