Guttorm Sindre
Guttorm Sindre
E-mail megerősítve itt: idi.ntnu.no
Cím
Hivatkozott rá
Hivatkozott rá
Év
Eliciting security requirements with misuse cases
G Sindre, AL Opdahl
Requirements engineering 10 (1), 34-44, 2005
13882005
Understanding quality in conceptual modeling
OI Lindland, G Sindre, A Solvberg
IEEE software 11 (2), 42-49, 1994
12021994
Process models representing knowledge for action: a revised quality framework
J Krogstie, G Sindre, H Jørgensen
European Journal of Information Systems 15 (1), 91-102, 2006
4452006
Templates for misuse case description
G Sindre, AL Opdahl
Proceedings of the 7th International Workshop on Requirements Engineering …, 2001
2512001
Defining quality aspects for conceptual models
J Krogstie, OI Lindland, G Sindre
Information System Concepts, 216-231, 1995
2221995
Towards a deeper understanding of quality in requirements engineering
J Krogstie, OI Lindland, G Sindre
International Conference on Advanced Information Systems Engineering, 82-95, 1995
2041995
Evaluating the quality of information models: empirical testing of a conceptual model quality framework
DL Moody, G Sindre, T Brasethvik, A Solvberg
25th International Conference on Software Engineering, 2003. Proceedings …, 2003
1802003
The REBOOT approach to software reuse
G Sindre, R Conradi, EA Karlsson
Journal of Systems and Software 30 (3), 201-212, 1995
1581995
Experimental comparison of attack trees and misuse cases for security threat identification
AL Opdahl, G Sindre
Information and Software Technology 51 (5), 916-932, 2009
1562009
Capturing security requirements through misuse cases
G Sindre, AL Opdahl
NIK 2001, Norsk Informatikkonferanse 2001, http://www. nik. no/2001, 2001
1382001
On the purpose of object-oriented analysis
GM Høydalsvik, G Sindre
ACM Sigplan Notices 28 (10), 240-255, 1993
1181993
Evaluating the quality of process models: Empirical testing of a quality framework
DL Moody, G Sindre, T Brasethvik, A Sølvberg
International conference on conceptual modeling, 380-396, 2002
1162002
A reuse-based approach to determining security requirements
G Sindre, DG Firesmith, AL Opdahl
REFSQ 3, 127-136, 2003
1152003
Mal-activity diagrams for capturing attacks on business processes
G Sindre
International working conference on requirements engineering: foundation for …, 2007
1092007
An analytical evaluation of BPMN using a semiotic quality framework
T Wahl, G Sindre
Advanced Topics in Database Research, Volume 5, 94-105, 2006
942006
Experimental validation of the learning effect for a pedagogical game on computer fundamentals
G Sindre, L Natvig, M Jahre
IEEE Transactions on Education 52 (1), 10-18, 2008
882008
Evaluating the effectiveness of learning interventions: an information systems case study
DL Moody, G Sindre
722003
A domain ontology building process for guiding requirements elicitation
I Omoronyia, G Sindre, T Stålhane, S Biffl, T Moser, W Sunindyo
International working conference on requirements engineering: Foundation for …, 2010
632010
Software engineering students meet interdisciplinary project work and art
L Jaccheri, G Sindre
2007 11th International Conference Information Visualization (IV'07), 925-934, 2007
542007
Challenges and strategies for motivating software testing personnel
A Deak, T Stålhane, G Sindre
Information and software Technology 73, 1-15, 2016
532016
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20