Author of the publication

A systematic review of transformation approaches between user requirements and analysis models

, , and . Requirements Engineering, (August 2010)
DOI: 10.1007/s00766-010-0111-y

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated traceability analysis for UML model refinements, , and . Information and Software Technology, (2008)Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases., , and . PST, (2005)A Comparative Study of Invariants Generated by Daikon and User-Defined Design Contracts., and . QSIC, page 174-183. IEEE, (2014)Enabling the runtime assertion checking of concurrent contracts for the Java modeling language., , and . ICSE, page 786-795. ACM, (2011)A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems., , and . MoDELS, volume 5795 of Lecture Notes in Computer Science, page 47-61. Springer, (2009)Model-Driven, Network-Context Sensitive Intrusion Detection., , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)A Multi-objective Genetic Algorithm to Rank State-Based Test Cases., , and . SSBSE, volume 8084 of Lecture Notes in Computer Science, page 66-80. Springer, (2013)Comparing transition trees test suites effectiveness for different mutation operators., and . A-TEST@ESEC/SIGSOFT FSE, page 10-16. ACM, (2020)Diagram Definition: A Case Study with the UML Class Diagram., and . MoDELS, volume 6981 of Lecture Notes in Computer Science, page 364-378. Springer, (2011)Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection., , , , and . EDCC, page 53-64. IEEE Computer Society, (2016)