Publications
Filters: First Letter Of Last Name is C [Clear All Filters]
SeAAS – Introduction and Empirical Performance Evaluation,
, no. QE-2011-24: QE, 2011.
"An Access Control Model Based Testing Approach for Smart Card Applications: Results of the POSÉ Project",
JIAS, Journal of Information Assurance and Security, vol. 5, no. 1, pp. 335–351, 2010.
"Assessing architectural evolution: a case study",
Empirical Software Engineering, vol. 16, no. 5, pp. 623–666, June, 2011.
Abstract
The final version is available at the DOI given above. The zip file is the web companion mentioned in the paper.
"Guest Editors' Introduction: Evolving Critical Systems",
IEEE Computer , vol. 43, issue 5, pp. 6, 2010.
"An NFR Pattern Approach to Dealing with NFRs",
IEEE International Conference on Requirements Engineering, Los Alamitos, CA, USA, IEEE Computer Society, pp. 179-188, 2010.
"Are your sites down? Requirements-driven self-tuning for the survivability of Web systems",
Requirements Engineering Conference (RE), 2011 19th IEEE International, pp. 219 -228, 29 2011-sept. 2.
Abstract
"A Graph Query Language for EMF models",
Theory and Practice of Model Transformations, Fourth International Conference, ICMT 2011, Zurich, Switzerland, June 27-28, 2011. Proceedings, vol. 6707: Springer, pp. 167-182, 2011.
Abstract
"PrimAndroid: privacy policy modelling and analysis for Android applications",
IEEE International Symposium on Policies for Distributed Systems and Networks, June, 2011.
Abstract