Ruth Breu

Orcid: 0000-0001-7093-4341

Affiliations:
  • University of Innsbruck, Austria


According to our database1, Ruth Breu authored at least 180 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GoDeploy: Portable Deployment of Serverless Functions in Federated FaaS.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024

Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Success Factors of Automated Programming Assessment Systems in Different Learning Environments.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
A Maturity Model for Digital Business Ecosystems from an IT Perspective.
J. Univers. Comput. Sci., January, 2023

Towards a Success Model for Automated Programming Assessment Systems Used as a Formative Assessment Tool.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

Lecturers' and Students' Experiences with an Automated Programming Assessment System.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

A Requirements Study on Model Repositories for Digital Twins in Construction Engineering.
Proceedings of the Cooperative Information Systems - 29th International Conference, 2023

2022
Engineering Digital Twin-Enabled Systems.
IEEE Softw., 2022

2021
Toward a Maturity Model for Digital Business Ecosystems from an IT perspective.
Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference, 2021

Rethinking Information Technology Governance for Digital Business Ecosystems.
Proceedings of the 25th IEEE International Enterprise Distributed Object Computing Conference, 2021

From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Risk management practices in information security: Exploring the status quo in the DACH region.
Comput. Secur., 2020

Mapping the State of Security Standards Mappings.
Proceedings of the Entwicklungen, 2020

Challenges in Testing Big Data Systems.
Proceedings of the Software Quality: Quality Intelligence in Software and Systems Engineering, 2020

Collecting and Integrating Unstructured Information into Enterprise Architecture Management: A Systematic Literature Review.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

Current Practices in the Information Collection for Enterprise Architecture Management.
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020

Towards an Evaluation Framework for Threat Intelligence Sharing Platforms.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Current Practices in the Usage of Inter-Enterprise Architecture Models for the Management of Business Ecosystems.
Proceedings of the 24th IEEE International Enterprise Distributed Object Computing Conference, 2020

2019
Knowledge-based security testing of web applications by logic programming.
Int. J. Softw. Tools Technol. Transf., 2019

ChronoSphere: a graph-based EMF model repository for IT landscape models.
Softw. Syst. Model., 2019

Experience: Data and Information Quality Challenges in Governance, Risk, and Compliance Management.
ACM J. Data Inf. Qual., 2019

An analysis and classification of public information security data sources used in research and practice.
Comput. Secur., 2019

Enabling change-driven workflows in continuous information security management.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

An Enterprise Architecture Planning Process for Industry 4.0 Transformations.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

2018
Towards data-driven decision support for organizational IT security audits.
it Inf. Technol., 2018

Evaluation of an Integrated Tool Environment for Experimentation in DSL Engineering.
Proceedings of the Software Quality: Methods and Tools for Better Software and Systems, 2018

Combining Versioning and Metamodel Evolution in the ChronoSphere Model Repository.
Proceedings of the SOFSEM 2018: Theory and Practice of Computer Science - 44th International Conference on Current Trends in Theory and Practice of Computer Science, Krems, Austria, January 29, 2018

The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Roadblocks on the Highway to Secure Cars: An Exploratory Survey on the Current Safety and Security Practice of the Automotive Industry.
Proceedings of the Computer Safety, Reliability, and Security, 2018

Introduction of a Tool-Based Continuous Information Security Management System: An Exploratory Case Study.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Analysis of Enterprise Architecture Tool Support for Industry 4.0 Transformation Planning.
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Workshop, 2018

Enterprise Architecture Planning in the Context of Industry 4.0 Transformations.
Proceedings of the 22nd IEEE International Enterprise Distributed Object Computing Conference, 2018

Post-Merger IT Integration Success and Performance Measurement: A Systematic Literature Study.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Model-based regression testing by OCL.
Int. J. Softw. Tools Technol. Transf., 2017

Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives.
Proceedings of the Towards Thought Leadership in Digital Transformation: 13. Internationale Tagung Wirtschaftsinformatik, 2017

Arguing on Software-Level Verification Techniques Appropriateness.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Towards Automation in Information Security Management Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Enterprise Architecture Planning: Analyses of Requirements from Practice and Research.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

ChronoGraph: A Versioned TinkerPop Graph Database.
Proceedings of the Data Management Technologies and Applications, 2017

ChronoGraph - Versioning Support for OLTP TinkerPop Graphs.
Proceedings of the 6th International Conference on Data Science, 2017

2016
Model-based security testing: a taxonomy and systematic classification.
Softw. Test. Verification Reliab., 2016

A situational method for semi-automated Enterprise Architecture Documentation.
Softw. Syst. Model., 2016

Security im Produkt-Lifecycle - Lästige Pflicht oder Chance?
Inform. Spektrum, 2016

Is business domain language support beneficial for creating test case specifications: A controlled experiment.
Inf. Softw. Technol., 2016

Traceability Types for Mastering Change in Collaborative Software Quality Management.
LNCS Trans. Found. Mastering Chang., 2016

Security Testing: A Survey.
Adv. Comput., 2016

Integrating a Lightweight Risk Assessment Approach into an Industrial Development Process.
Proceedings of the Software Quality. The Future of Systems- and Software Development, 2016

A Systematic Literature Review of Crowdsourcing-Based Research in Information Security.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Providing Support for Automated Product Data Quality Assurance: A Case Study.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

Software-Engineering für Multi-Plattform-Umgebungen.
Proceedings of the 46. Jahrestagung der Gesellschaft für Informatik, 2016

An Information System Agnostic Environment for Reproducible Experiments.
Proceedings of the 24th European Conference on Information Systems, 2016

An integrated tool environment for experimentation in domain specific language engineering.
Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, 2016

Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
Using Business Process Model Awareness to improve Stakeholder Participation in Information Systems Security Risk Management Processes.
Proceedings of the Smart Enterprise Engineering: 12. Internationale Tagung Wirtschaftsinformatik, 2015

Improving the Requirement Engineering Process with Speed-Reviews: An Industrial Case Study.
Proceedings of the Software Quality. Software and Systems Quality in Distributed and Mobile Environments, 2015

An Exploratory Study on Risk Estimation in Risk-Based Testing Approaches.
Proceedings of the Software Quality. Software and Systems Quality in Distributed and Mobile Environments, 2015

Using Stakeholder Knowledge for Data Quality Assessment in IS Security Risk Management Processes.
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

Assessing Real-Time Malware Threats.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

A situational method for semi-automated enterprise architecture documentation (SoSyM abstract).
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Identifying Blind Spots in IS Security Risk Management Processes Using Qualitative Model Analysis.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Using Green KPIs for Large IT Infrastructures' Energy and Cost Optimization.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

A Bayesian Prediction Model for Risk-Based Test Selection.
Proceedings of the 41st Euromicro Conference on Software Engineering and Advanced Applications, 2015

Living Modeling of IT Architectures: Challenges and Solutions.
Proceedings of the Software, 2015

2014
New Perspectives on Software Quality.
IEEE Softw., 2014

Evolution of Security Engineering Artifacts: A State of the Art Survey.
Int. J. Secur. Softw. Eng., 2014

Security Test Generation by Answer Set Programming.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Improvement Methods for Software Requirement Specifications: A Mapping Study.
Proceedings of the 9th International Conference on the Quality of Information and Communications Technology, 2014

Test Process Improvement with Documentation Driven Integration Testing.
Proceedings of the 9th International Conference on the Quality of Information and Communications Technology, 2014

The Relevance of Model-Driven Engineering Thirty Years from Now.
Proceedings of the Model-Driven Engineering Languages and Systems, 2014

Tool Support for Collaborative Software Quality Management.
Proceedings of the Demonstrations Track of the ACM/IEEE 17th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2014), 2014

A Risk Assessment Framework for Software Testing.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications, 2014

Factors of Access Control Management in Electronic Healthcare: The Patients' Perspective.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Software paradigms, assessment types and non-functional requirements in model-based integration testing: a systematic literature review.
Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, 2014

Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Enterprise Architecture Documentation: Current Practices and Future Directions.
Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik, 2013

Towards Living Inter-organizational Processes.
Proceedings of the IEEE 15th Conference on Business Informatics, 2013

A Concept for Language-Oriented Security Testing.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Security Risk Analysis by Logic Programming.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

The Impact of Knowledge Sharing Platforms in Distributed Requirements Engineering Scenarios: A Systematic Review.
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013

Improving Near-Duplicate Detection in Multi-Layered Collaborative Requirements Engineering Discussions Through Discussion Clustering.
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013

Enterprise Architecture Documentation: Empirical Analysis of Information Sources for Automation.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

RisCal - A Risk Estimation Tool for Software Engineering Purposes.
Proceedings of the 39th Euromicro Conference on Software Engineering and Advanced Applications, 2013

Towards Collaborative Requirements Engineering Tool for ERP Product Customization.
Proceedings of the Novel Methods and Technologies for Enterprise Information Systems, 2013

Towards an Architecture for Collaborative Cross-Organizational Security Requirements Management.
Proceedings of the Business Information Systems - 16th International Conference, 2013

2012
Managing Privacy and Effectiveness of Patient-Administered Authorization Policies.
Int. J. Comput. Model. Algorithms Medicine, 2012

On Enterprise Architecture Change Events.
Proceedings of the Trends in Enterprise Architecture Research and Practice-Driven Research on Enterprise Transformation, 2012

Integrating Manual and Automatic Risk Assessment for Risk-Based Testing.
Proceedings of the Software Quality. Process Automation in Software Development, 2012

Towards a Model Based Security Testing Approach of Cloud Computing Environments.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Towards Risk - Driven Security Testing of Service Centric Systems.
Proceedings of the 2012 12th International Conference on Quality Software, 2012

Cloud risk analysis by textual models.
Proceedings of the 1st International Workshop on Model-Driven Engineering for High Performance and CLoud computing co-located with 15th International Conference on Model Driven Engineering Languages and Systems (MODELS 2012), Innsbruck, Austria, October 01, 2012

Understanding and Modeling Usage Decline in Social Networking Services.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

A Generic Platform for Model-Based Regression Testing.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change, 2012

Considering privacy and effectiveness of authorization policies for shared electronic health records.
Proceedings of the ACM International Health Informatics Symposium, 2012

Managing legal compliance through security requirements across service provider chains: A case study on the German Federal Data Protection Act.
Proceedings of the 57. Jahrestagung der Deutschen Gesellschaft für Medizinische Informatik, Biometrie und Epidemiologie, 42. Jahrestagung der Gesellschaft für Informatik, Was bewegt uns in der/die Zukunft?, 2012

A Quality Analysis Procedure for Request Data of ERP Systems.
Proceedings of the Innovation and Future of Enterprise Information Systems, 2012

A Meta-Model for Automated Enterprise Architecture Model Maintenance.
Proceedings of the 16th IEEE International Enterprise Distributed Object Computing Conference, 2012

Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning.
Proceedings of the Trustworthy Eternal Systems via Evolving Software, Data and Knowledge, 2012

2011
Living Models - Ten Principles for Change-Driven Software Engineering.
Int. J. Softw. Informatics, 2011

Monitoring Anomalies in IT-Landscapes Using Clustering Techniques and Complex Event Processing.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2011

Requirements for Automated Enterprise Architecture Model Maintenance - A Requirements Analysis based on a Literature Review and an Exploratory Survey.
Proceedings of the ICEIS 2011, 2011

Enhancing Model Driven Security through Pattern Refinement Techniques.
Proceedings of the Formal Methods for Components and Objects, 10th International Symposium, 2011

Towards a Model- and Learning-Based Framework for Security Anomaly Detection.
Proceedings of the Formal Methods for Components and Objects, 10th International Symposium, 2011

Evolution of Security Requirements Tests for Service-Centric Systems.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

The Process of Policy Authoring of Patient-Controlled Privacy Preferences.
Proceedings of the Electronic Healthcare - 4th International Conference, 2011

Automation Processes for Enterprise Architecture Management.
Proceedings of the Workshops Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference, 2011

2010
Meeting EHR Security Requirements: Authentication as a Security Service.
Proceedings of the perspeGKtive 2010, 2010

Supporting Role Based Provisioning with Rules Using OWL and F-Logic.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

Security Testing by Telling TestStories.
Proceedings of the Modellierung 2010, 24.-26. März 2010, Klagenfurt, Österreich, 2010

A Web-Based Collaborative Metamodeling Environment with Secure Remote Model Access.
Proceedings of the Web Engineering, 10th International Conference, 2010

Living on the MoVE: Towards an Architecture for a Living Models Infrastructure.
Proceedings of the Fifth International Conference on Software Engineering Advances, 2010

Model-Driven System Testing of Service Oriented Systems - A Standard-aligned Approach based on Independent System and Test Models.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira, Portugal, June 8, 2010

Meeting EHR Security Requirements: SeAAS Approach.
Proceedings of the Seamless Care - Safe Care - The Challenges of Interoperability and Patient Safety in Health Care, 2010

Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering.
Proceedings of the CISIS 2010, 2010

Towards Living Landscape Models: Automated Integration of Infrastructure Cloud in Enterprise Architecture Management.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
SeAAS - A Reference Architecture for Security Services in SOA.
J. Univers. Comput. Sci., 2009

Potential Rating Indicators for Cyberinsurance: An Exploratory Qualitative Study.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Security as a Service - A Reference Architecture for SOA Security.
Proceedings of the Security in Information Systems, 2009

Towards Adaptive Test Code Generation for Service Oriented Systems.
Proceedings of the Ninth International Conference on Quality Software, 2009

Model-Driven Configuration of SELinux Policies.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

09073 Abstracts Collection - Model-Based Design of Trustworthy Health Information Systems.
Proceedings of the Model-Based Design of Trustworthy Health Information Systems, 11.02., 2009

User-Oriented Quality Assessment of IT-Supported Healthcare Processes - A Position Paper.
Proceedings of the Business Process Management Workshops, 2009

An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents.
Proceedings of the The Forth International Conference on Availability, 2009

Security engineering for service-oriented architectures.
Springer, ISBN: 978-3-540-79538-4, 2009

2008
Telling TestStories - Modellbasiertes Akzeptanz-Testen Serviceorientierter Systeme.
Softwaretechnik-Trends, 2008

Constraint based role based access control in the SECTET-frameworkA model-driven approach.
J. Comput. Secur., 2008

A fair Non-repudiation service in a web services peer-to-peer environment.
Comput. Stand. Interfaces, 2008

A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

SECTISSIMO: A Platform-Independent Framework for Security Services.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

Second International Workshop on the Model-Based Design of Trustworthy Health Information Systems MOTHIS 2008.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MODELS 2008, Toulouse, France, September 28, 2008

Vorwort zum Doktorandensymposium der Modellierung 2008.
Proceedings of the Modellierung 2008, 12.-14. März 2008, Berlin, 2008

Model-Driven Security Engineering of Service Oriented Systems.
Proceedings of the Information Systems and e-Business Technologies, 2008

Workflow Testing.
Proceedings of the Leveraging Applications of Formal Methods, 2008

Workflow Inspector - A Test Tool for Microsoft Workflow Foundation.
Proceedings of the First International Conference on Software Testing, 2008

TestStories - Ausführbare Requirements für Serviceorientierte Architekturen.
Proceedings of the 38. Jahrestagung der Gesellschaft für Informatik, Beherrschbare Systeme, 2008

Privacy and Access Control for IHE-Based Systems.
Proceedings of the Electronic Healthcare, First International Conference, 2008

Quantitative Assessment of Enterprise Security System.
Proceedings of the The Third International Conference on Availability, 2008

2007
Model based development of access policies.
Int. J. Softw. Tools Technol. Transf., 2007

Model-Driven Security Engineering for Trust Management in SECTET.
J. Softw., 2007

A framework for modelling restricted delegation of rights in the SECTET.
Comput. Syst. Sci. Eng., 2007

A technical architecture for enforcing usage control requirements in service-oriented architectures.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Model-Driven Approaches to Security.
Proceedings of the Security in Information Systems, 2007

First International Workshop on the Model-Based Design of Trustworthy Health Information Systems.
Proceedings of the Models in Software Engineering, Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30, 2007

Towards Operationalizing Strategic Alignment of IT by Usage of Software Engineering Methods.
Proceedings of the Business Information Systems, 10th International Conference, 2007

2006
Sectet: an extensible framework for the realization of secure inter-organizational workflows.
Internet Res., 2006

A Framework for Modeling Restricted Delegation in Service Oriented Architecture.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET.
Proceedings of the 2006 International Conference on Privacy, 2006

A constraint based role based access control in the SECTET a model-driven approach.
Proceedings of the 2006 International Conference on Privacy, 2006

Towards a MOF/QVT-Based Domain Architecture for Model Driven Security.
Proceedings of the Model Driven Engineering Languages and Systems, 2006

E-Health Approach to Link-up Actors in the Health Care System of Austria.
Proceedings of the Ubiquity: Technologies for Better Health in Aging Societies, 2006

Using an Enterprise Architecture for IT Risk Management.
Proceedings of the ISSA 2006 from Insight to Foresight Conference, 2006

Modeling Authorization in an SOA based Application Scenario.
Proceedings of the IASTED International Conference on Software Engineering, 2006

Integration der Open Business Intelligence-Suite Pentaho in ein modellgetriebenes Analyse-Framework am Beispiel des Strategic Alignment.
Proceedings of the Integration, Informationslogistik und Architektur, 2006

Modeling permissions in a (U/X)ML world.
Proceedings of the The First International Conference on Availability, 2006

2005
Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0.
Proceedings of the Model Driven Engineering Languages and Systems, 2005

Model Driven Security for Inter-organizational Workflows in e-Government.
Proceedings of the E-Government: Towards Electronic Democracy, International Conference, 2005

Modelling Inter-organizational Workflow Security in a Peer-to-Peer Environment.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

Web Service Engineering - Advancing a New Software Engineering Discipline.
Proceedings of the Web Engineering, 5th International Conference, 2005

A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together.
Proceedings of the ICEIS 2005, 2005

Towards Systematic Model Assessment.
Proceedings of the Perspectives in Conceptual Modeling, 2005

2004
Towards a Systematic Development of Secure Systems.
Inf. Secur. J. A Glob. Perspect., 2004

Modeling and Realizing Security-Critical Inter-Organizational Workflows.
Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2004

Actor-Centric Modeling of User Rights.
Proceedings of the Fundamental Approaches to Software Engineering, 2004

CBRFlow: Enabling Adaptive Workflow Management Through Conversational Case-Based Reasoning.
Proceedings of the Advances in Case-Based Reasoning, 7th European Conference, 2004

2003
Security-Critical System Development with Extended Use Cases.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2001
A conformity model of software processes.
Inf. Softw. Technol., 2001

Methodik, Sprachen und Grundlagen des Software Engineering, Abschlussbericht des Forschungslabors SYSLAB (1.10.1994 - 30.9.1999).
Inform. Forsch. Entwickl., 2001

1999
Applied Software Engineering Principles for UML.
Proceedings of the TOOLS Europe 1999: 29th International Conference on Technology of Object-Oriented Languages and Systems, 1999

1998
Exemplary and complete object interaction descriptions.
Comput. Stand. Interfaces, 1998

1997
Systems, Views and Models of UML.
Proceedings of the Unified Modeling Language, 1997

Modeling the Dynamic Behavior of Objects on Events, Messages and Methods (Extended Abstract).
Proceedings of the Euro-Par '97 Parallel Processing, 1997

Towards a Precise Semantics for Object-Oriented Modeling Techniques.
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997

Towards a Formalization of the Unified Modeling Language.
Proceedings of the ECOOP'97, 1997

1996
An Algebraic Semantic Framework for Object Oriented Languages with Concurrency (Extended Abstract).
Formal Aspects Comput., 1996

1995
A Methodology of Inheritance.
Softw. Concepts Tools, 1995

1993
Abstract and Concrete Objects - An Algebraic Design Method for Object-Based Systems.
Proceedings of the Algebraic Methodology and Software Technology (AMAST '93), 1993

1992
Ein Konzept der Modul- und Typvererbung.
Proceedings of the Eiffel, 1992

1991
Algebraic Specification Techniques in Object Oriented Programming Environments
Lecture Notes in Computer Science 562, Springer, ISBN: 3-540-54972-2, 1991

1989
An Algebraic Compositional Semantics of an Object Oriented Notation with Concurrency.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1989

1988
Reusable Specification Components.
Proceedings of the Mathematical Foundations of Computer Science 1988, 1988


  Loading...