Author of the publication

From run-time behavior to usage scenarios: an interaction-pattern mining approach.

, , and . KDD, page 315-324. ACM, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From run-time behavior to usage scenarios: an interaction-pattern mining approach., , and . KDD, page 315-324. ACM, (2002)A System on Web-Based Continuous Software Process Assessment (Continuous SPA)., , and . ICEIS (3), page 529-532. (2007)Application Framework Issues when Evolving Business Applications for Electronic Commerce., , , and . HICSS, IEEE Computer Society, (1999)Service Reliability Assessment in a Composition Environment., and . WEBIST (Selected Papers), volume 75 of Lecture Notes in Business Information Processing, page 30-45. Springer, (2010)Recovering software requirements from system-user interaction traces., , and . SEKE, page 447-454. ACM, (2002)User Interface Reverse Engineering in Support of Interface Migration to the Web., , , and . Autom. Softw. Eng., 10 (3): 271-301 (2003)Automatic Generation of Data Flow Diagrams From A Requirements Specification Language., , and . ICIS, page 19. Association for Information Systems, (1984)Modeling the System-User Dialog Using Interaction Traces., , , , and . WCRE, page 208-. IEEE Computer Society, (2001)The Validation of a Dynamic Service Composition Model using a Simple Game., and . KMIS, page 260-266. SciTePress, (2010)Mining System-User Interaction Traces for Use Case Models., , and . IWPC, page 21-29. IEEE Computer Society, (2002)