Bashar Nuseibeh

According to our database1, Bashar Nuseibeh authored at least 219 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Text Filtering and Ranking for Security Bug Report Prediction.
IEEE Trans. Software Eng., 2019

Dragonfly: a tool for simulating self-adaptive drone behaviours.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

An anatomy of security conversations in stack overflow.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Society, 2019

Talking about security with professional developers.
Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice, 2019

"Hopefully we are mostly secure": views on secure code in professional practice.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

Won't take no for an answer: resource-driven requirements adaptation.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

Modelling and analysing resilient cyber-physical systems.
Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2019

Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action.
Proceedings of the Human-Computer Interaction. Design Practice in Contemporary Societies, 2019

Requirements Engineering.
Proceedings of the Handbook of Software Engineering., 2019

2018
CrowdService: Optimizing Mobile Crowdsourcing and Service Composition.
ACM Trans. Internet Techn., 2018

On the Interplay Between Cyber and Physical Spaces for Adaptive Security.
IEEE Trans. Dependable Sec. Comput., 2018

Feature-Driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things.
TCPS, 2018

Editorial: The First.
TAAS, 2018

Generating Privacy Zones in Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2018

Requirements and specifications for adaptive security: concepts and analysis.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

Towards forensic-ready software systems.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

An investigation of security conversations in stack overflow: perceptions of security and community involvement.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

Compositional verification of self-adaptive cyber-physical systems.
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018

I've seen this before: sharing cyber-physical incident knowledge.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018

Engineering Software for Life in Cyber-Physical-Social Spaces.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

2017
Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers.
IMWUT, 2017

Front Matter - SEAMS 2017 Artifacts, Table of Contents, Preface, Artifact Evaluation Committee.
DARTS, 2017

Topology-Aware Access Control of Smart Spaces.
IEEE Computer, 2017

Use of organisational topologies for forensic investigations.
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, 2017

On evidence preservation requirements for forensic-ready systems.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Using Argumentation to Explain Ambiguity in Requirements Elicitation Interviews.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Adaptive information security and privacy.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Are you ready? Towards the engineering of forensic-ready systems.
Proceedings of the 11th International Conference on Research Challenges in Information Science, 2017

Learning to share: engineering adaptive decision-support for online social networks.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

O2O service composition with social collaboration.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Crossing Boundaries: On the Inevitable Intertwining of Digital, Physical, and Social Spaces.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2017

Software Engineering Challenges for Investigating Cyber-Physical Incidents.
Proceedings of the 3rd IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2017

On the Disappearing Boundary Between Digital, Physical, and Social Spaces: Who, What, Where and When?
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Enabling End-Users to Protect their Privacy.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Automating trade-off analysis of security requirements.
Requir. Eng., 2016

Protecting Privacy in the Cloud: Current Practices, Future Directions.
IEEE Computer, 2016

Adaptive evidence collection in the cloud using attack scenarios.
Computers & Security, 2016

Examining active error in software development.
Proceedings of the 2016 IEEE Symposium on Visual Languages and Human-Centric Computing, 2016

Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

CrowdService: serving the individuals through mobile crowdsourcing and service composition.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms.
Proceedings of the 6th International Conference on the Internet of Things, 2016

Adding static and dynamic semantics to building information models.
Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2016

Towards adaptive compliance.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Privacy dynamics: learning privacy norms for social software.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Feed me, feed me: an exemplar for engineering adaptive software.
Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2016

Wearables for physical privacy.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Privacy Itch and Scratch: On Body Privacy Warnings and Controls.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

2015
Engineering Adaptive Software Systems (EASSy) (NII Shonan Meeting 2015-11).
NII Shonan Meet. Rep., 2015

"Why can't I do that?": Tracing Adaptive Security Decisions.
EAI Endorsed Trans. Self-Adaptive Systems, 2015

Automated analysis of security requirements through risk-based argumentation.
Journal of Systems and Software, 2015

The Role of Environmental Assumptions in Failures of DNA Nanosystems.
Proceedings of the 1st IEEE/ACM International Workshop on Complex Faults and Failures in Large Software Systems, 2015

Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Managing Security Control Assumptions Using Causal Traceability.
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015

2014
Signing Off: The State of the Journal.
IEEE Trans. Software Eng., 2014

Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Engineering topology aware adaptive security: Preventing requirements violations at runtime.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Distilling privacy requirements for mobile applications.
Proceedings of the 36th International Conference on Software Engineering, 2014

Topology aware adaptive security.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Self-adaptation through incremental generative model transformations at runtime.
Proceedings of the 36th International Conference on Software Engineering, 2014

Requirements-driven mediation for collaborative security.
Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2014

Personal informatics for non-geeks: lessons learned from ordinary people.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

Traceability for Adaptive Information Security in the Cloud.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
In Memoriam: Mary Jean Harrold (1947-2013).
IEEE Trans. Software Eng., 2013

Editorial.
IEEE Trans. Software Eng., 2013

In Memoriam - David Notkin (1953-2013).
IEEE Trans. Software Eng., 2013

Editorial [new associate editors].
IEEE Trans. Software Eng., 2013

Editorial: State of the Journal.
IEEE Trans. Software Eng., 2013

Characterizing Architecturally Significant Requirements.
IEEE Software, 2013

Resolving vulnerability identification errors using security requirements on business process models.
Inf. Manag. Comput. Security, 2013

Specifying software features for composition: A tool-supported approach.
Computer Networks, 2013

Requirements-driven adaptive digital forensics.
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013

Engineering adaptive privacy: on the role of privacy awareness requirements.
Proceedings of the 35th International Conference on Software Engineering, 2013

Unpacking Tacit Knowledge for Requirements Engineering.
Proceedings of the Managing Requirements Knowledge., 2013

Aspect Interactions: A Requirements Engineering Perspective.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies.
Proceedings of the Aspect-Oriented Requirements Engineering, 2013

2012
State of the Journal.
IEEE Trans. Software Eng., 2012

Analysing monitoring and switching problems for adaptive systems.
Journal of Systems and Software, 2012

The thin line between products.
Proceedings of the 16th International Software Product Line Conference, 2012

SecuriTAS: a tool for engineering adaptive security.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Speculative requirements: Automatic detection of uncertainty in natural language requirements.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Privacy arguments: Analysing selective disclosure requirements for mobile applications.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Requirements-driven adaptive security: Protecting variable assets at runtime.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

Thrashing, Tolerating and Compromising in Software Development.
Proceedings of the 24th Annual Workshop of the Psychology of Programming Interest Group, 2012

Caprice: a tool for engineering adaptive privacy.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Adaptive security and privacy in smart grids: a software engineering vision.
Proceedings of the First International Workshop on Software Engineering Challenges for the Smart Grid, 2012

On the role of primary and secondary assets in adaptive security: An application in smart grids.
Proceedings of the 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2012

Getting at ephemeral flaws.
Proceedings of the 5th International Workshop on Co-operative and Human Aspects of Software Engineering, 2012

Social Adaptation at Runtime.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2012

Social Adaptation - When Software Gives Users a Voice.
Proceedings of the ENASE 2012, 2012

An Aspect-Oriented Approach to Relating Security Requirements and Access Control.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

2011
Editorial: What Makes a Publication Archival?
IEEE Trans. Software Eng., 2011

Editorial: State of the Journal.
IEEE Trans. Software Eng., 2011

Analysing anaphoric ambiguity in natural language requirements.
Requir. Eng., 2011

Social sensing: when users become monitors.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Problem Analysis of Traditional IT-Security Risk Assessment Methods - An Experience Report from the Insurance and Auditing Domain.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

OpenArgue: Supporting argumentation to evolve secure software systems.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Unknown knowns: Tacit knowledge in requirements engineering.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Risk and argument: A risk-based argumentation method for practical security.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Social Software Product Lines.
Proceedings of the First International Workshop on Requirements Engineering for Social Computing, 2011

PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications.
Proceedings of the POLICY 2011, 2011

Specifying and detecting meaningful changes in programs.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Learning to adapt requirements specifications of evolving systems.
Proceedings of the 33rd International Conference on Software Engineering, 2011

From Model-Driven Software Development Processes to Problem Diagnoses at Runtime.
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011

In the best families: tracking and relationships.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

A Reference Architecture for Consumer Electronics Products and its Application in Requirements Engineering.
Proceedings of the Relating Software Requirements and Architectures., 2011

2010
Editorial.
IEEE Trans. Software Eng., 2010

Editorial: How Special Should Issues Be?
IEEE Trans. Software Eng., 2010

In Memoriam: Robin Milner and Amir Pnueli.
IEEE Trans. Software Eng., 2010

Editorial: Readers, Writers, Reviewers, and Editors.
IEEE Trans. Software Eng., 2010

Editorial: A New Decade of TSE.
IEEE Trans. Software Eng., 2010

Requirements-Driven Design of Service-Oriented Interactions.
IEEE Software, 2010

Security Requirements Engineering for Evolving Software Systems: A Survey.
IJSSE, 2010

Guest Editors' Introduction: Evolving Critical Systems.
IEEE Computer, 2010

Model-Based Argument Analysis for Evolving Security Requirements.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

On the impact of real-time feedback on users' behaviour in mobile location-sharing applications.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

Mobile Privacy Requirements on Demand.
Proceedings of the Product-Focused Software Process Improvement, 2010

"Privacy-shake", : a haptic interface for managing privacy settings in mobile location sharing applications.
Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, 2010

Automatic detection of nocuous coordination ambiguities in natural language requirements.
Proceedings of the ASE 2010, 2010

A Methodology for Automatic Identification of Nocuous Ambiguity.
Proceedings of the COLING 2010, 2010

ContraVision: presenting contrasting visions of future technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Contravision: exploring users' reactions to futuristic technology.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Specifying features of an evolving software system.
Softw., Pract. Exper., 2009

Securing the Skies: In Requirements We Trust.
IEEE Computer, 2009

Studying location privacy in mobile applications: 'predator vs. prey' probes.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

From Organizational Requirements to Service Choreography.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Early Identification of Problem Interactions: A Tool-Supported Approach.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

Are Your Lights Off? Using Problem Frames to Diagnose System Failures.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

On Presuppositions in Requirements.
Proceedings of the Second International Workshop on Managing Requirements Knowledge, 2009

Making Tacit Requirements Explicit.
Proceedings of the Second International Workshop on Managing Requirements Knowledge, 2009

Requirements-Driven Collaborative Choreography Customization.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

Towards safer composition.
Proceedings of the 31st International Conference on Software Engineering, 2009

From spaces to places: emerging contexts in mobile privacy.
Proceedings of the UbiComp 2009: Ubiquitous Computing, 2009

Feature Interaction as a Context Sharing Problem.
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009

A Framework for Developing Feature-Rich Software Systems.
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009

2008
Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.
IEEE Trans. Software Eng., 2008

Security Requirements Engineering: A Framework for Representation and Analysis.
IEEE Trans. Software Eng., 2008

A final editorial.
Autom. Softw. Eng., 2008

Building Contingencies into Specifications.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

First International Modeling Security Workshop.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008

Evaluating the relation between changeability decay and the characteristics of clones and methods.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, 2008

The five W's (and one "H") of Security: Software Engineering of Secure Systems.
Proceedings of the XIII Jornadas de Ingeniería del Software y Bases de Datos (JISBD 2008), 2008

Customizing Choreography: Deriving Conversations from Organizational Dependencies.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2007
Using Problem Descriptions to Represent Variabilities For Context-Aware Applications.
Proceedings of the First International Workshop on Variability Modelling of Software-Intensive Systems, 2007

On the Structure of Problem Variability: From Feature Diagrams to Problem Frames.
Proceedings of the First International Workshop on Variability Modelling of Software-Intensive Systems, 2007

Specifying Monitoring and Switching Problems in Context.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Evaluating the Harmfulness of Cloning: A Change Based Experiment.
Proceedings of the Fourth International Workshop on Mining Software Repositories, 2007

Assessing the impact of bad smells using historical information.
Proceedings of the 9th International Workshop on Principles of Software Evolution (IWPSE 2007), 2007

Model-Based Security Engineering of Distributed Information Systems Using UMLsec.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Composing Features by Managing Inconsistent Requirements.
Proceedings of the Feature Interactions in Software and Communication Systems IX, 2007

2006
Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering.
IEEE Trans. Software Eng., 2006

Learning Software Engineering at a Distance.
IEEE Software, 2006

Using trust assumptions with security requirements.
Requir. Eng., 2006

Towards Context-Aware Product-Family Architectures.
Proceedings of the International Workshop on Software Product Management, 2006

Identifying Nocuous Ambiguities in Natural Language Requirements.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

A framework for security requirements engineering.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

2005
Keeping ubiquitous computing to yourself: A practical model for user control of privacy.
International Journal of Man-Machine Studies, 2005

Relating software requirements and architectures.
IEE Proceedings - Software, 2005

On Modelling Access Policies: Relating Roles to their Organisational Context.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

The Learning Grid and E-Assessment using Latent Semantic Analysis.
Proceedings of the Towards the Learning Grid - Advances in Human Learning Services, 2005

Introduction to Research Papers.
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Gathering Requirements for a Grid-based Automatic Marking System.
Proceedings of the 1st International ELeGI Conference on Advanced Technology for Enhanced Learning, 2005

2004
Architecture-driven Problem Decomposition.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Using Abuse Frames to Bound the Scope of Security Problems.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Composing Requirements Using Problem Frames.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

The Effect of Trust Assumptions on the Elaboration of Security Requirements.
Proceedings of the 12th IEEE International Conference on Requirements Engineering (RE 2004), 2004

Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements.
Proceedings of the Trust Management, Second International Conference, 2004

Problem Frames: A Case for Coordination.
Proceedings of the Coordination Models and Languages, 6th International Conference, 2004

Crosscutting requirements.
Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, 2004

Deriving security requirements from crosscutting threat descriptions.
Proceedings of the 3rd International Conference on Aspect-Oriented Software Development, 2004

2003
Guest editorial.
Requir. Eng., 2003

Modelling access policies using roles in requirements engineering.
Information & Software Technology, 2003

Combining abductive reasoning and inductive learning to evolve requirements specifications.
IEE Proceedings - Software, 2003

Introducing Abuse Frames for Analysing Security Requirements.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

E-Assessment using Latent Semantic Analysis.
Proceedings of the 3rd International LeGE-WG Workshop: GRID Infrastructure to Support Future Technology Enhanced Learning, 2003

ViewPoints: meaningful relationships are difficult!
Proceedings of the 25th International Conference on Software Engineering, 2003

2002
Lightweight validation of natural language requirements.
Softw., Pract. Exper., 2002

Relating Software Requirements and Architectures Using Problem Frames.
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002

Security Requirements Engineering: When Anti-Requirements Hit the Fan.
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002

An Abductive Approach for Analysing Event-Based Requirements Specifications.
Proceedings of the Logic Programming, 18th International Conference, 2002

2001
Making inconsistency respectable in software development.
Journal of Systems and Software, 2001

Weaving Together Requirements and Architectures.
IEEE Computer, 2001

An Analysis-Revision Cycle to Evolve Requirements Specifications.
Proceedings of the 16th IEEE International Conference on Automated Software Engineering (ASE 2001), 2001

2000
Leveraging Inconsistency in Software Development.
IEEE Computer, 2000

Introduction to Special Issue.
Autom. Softw. Eng., 2000

Editorial.
Autom. Softw. Eng., 2000

Hybrid Model Visualization in Requirements and Design: A Preliminary Investigation.
Proceedings of the 10th International Workshop on Software Specification and Design, 2000

Workshop on multi-dimensional separation of concerns in software engineering.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Requirements engineering: a roadmap.
Proceedings of the 22nd International Conference on on Software Engineering, 2000

Lightweight Validation of Natural Language Requirements: A Case Study.
Proceedings of the 4th International Conference on Requirements Engineering, 2000

1999
Guest Editorial: Introduction to the Special Section - Managing Inconsistency in Software Development.
IEEE Trans. Software Eng., 1999

Restructuring requirement specifications.
IEE Proceedings - Software, 1999

Using Abduction to Evolve Inconsistent Requirements Specification.
Australasian J. of Inf. Systems, 1999

An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering.
Proceedings of the 4th IEEE International Symposium on Requirements Engineering (RE '99), 1999

How Multi-Disciplinary Is RE (really)?
Proceedings of the 4th IEEE International Symposium on Requirements Engineering (RE '99), 1999

The Process of Inconsistency Management: A Framework for Understanding.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
Managing Inconsistent Specifications: Reasoning, Analysis, and Action.
ACM Trans. Softw. Eng. Methodol., 1998

Restructuring Requirements Specifications For Managing Inconsistency And Change: A Case Study.
Proceedings of the 3rd International Conference on Requirements Engineering (ICRE '98), 1998

1997
Soapbox: Ariane 5: Who Dunnit?
IEEE Software, 1997

Making Requirements Measurable.
Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), 1997

Analyzing Inconsistent Specifications.
Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), 1997

Making Requirements Measurable (Tutorial).
Proceedings of the Pulling Together, 1997

1996
Conflicting Requirements: When the Customer is Not Always Right.
Requir. Eng., 1996

Method engineering for multi-perspective software development.
Information & Software Technology, 1996

Using ViewPoints for inconsistency management.
Software Engineering Journal, 1996

When Agents Clash.
Proceedings of the Software Process Technology, 5th European Workshop, 1996

1995
Report on the Second IEEE International Symposium on Requirements Engineering (RE '95), York, UK, 27-29 March 1995.
Autom. Softw. Eng., 1995

Managing inconsistencies in an evolving specification.
Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 27, 1995

Decentralised Process Enactment in a Multi-Perspective Development Environment.
Proceedings of the 17th International Conference on Software Engineering, 1995

Decentralised Process Modelling.
Proceedings of the Software Process Technology, 4th European Workshop, 1995

1994
A Framework for Expressing the Relationships Between Multiple Views in Requirements Specification.
IEEE Trans. Software Eng., 1994

Inconsistency Handling in Multperspective Specifications.
IEEE Trans. Software Eng., 1994

1993
Fine-Grain Process Modelling.
Proceedings of the 7th International Workshop on Software Specification and Design, 1993

Expressing the Relationships Between Multiple Views in Requirements Specification.
Proceedings of the 15th International Conference on Software Engineering, 1993

Method Integration and Support for Distributed Software Development: An Overview.
Proceedings of the Studies of Software Design, 1993

Inconsistency Handling in Multi-Perspective Specifications.
Proceedings of the Software Engineering, 1993

1992
Viewpoints: A Framework for Integrating Multiple Perspectives in System Development.
International Journal of Software Engineering and Knowledge Engineering, 1992


  Loading...