Author of the publication

Continuous and Proactive Software Architecture Evaluation: An IoT Case.

, , , and . ACM Trans. Softw. Eng. Methodol., 31 (3): 46:1-46:54 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Deriving Software Architectures From Quality Attributes, , , , and . (1994)Interface Descriptions for Enterprise Architecture., and . Software Engineering Research and Practice, page 87-93. CSREA Press, (2005)A Software Architecture Reconstruction Method., , and . WICSA, volume 140 of IFIP Conference Proceedings, page 15-34. Kluwer, (1999)Toward a Software Engineering Model of Human-Computer Interaction., , and . Engineering for Human-Computer Interaction, volume A-18 of IFIP Transactions, page 131-154. North-Holland, (1992)A Life-Cycle View of Architecture Analysis and Design Methods, , and . Technical Note, CMU/SEI-2003-TN-026. Carnegie Mellon, (September 2003)Evaluating software architectures, , and . Addison-Wesley, Boston u.a., (2005)Playing Detective: Reconstructing Software Architecture from Available Evidence., and . Autom. Softw. Eng., 6 (2): 107-138 (1999)Discovering Architectures from Running Systems, , , , and . Transactions on Software Engineering, 32 (7): 454--466 (2006)WebQuery: searching and visualizing the Web through connectivity, and . Computer Networks and ISDN Systems, 29 (8-13): 1257--1267 (September 1997)Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?, , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2016)