Zeige Ergebnisse 281 - 300 von 384
2015
Pohl H, Hettig M, Karras O, Ötztürk H, Rohs M. 2015. CapCouch: Home Control with a Posture-sensing Couch. in UbiComp and ISWC 2015 - Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the Proceedings of the 2015 ACM International Symposium on Wearable Computers. ACM Press. S. 229-232. https://doi.org/10.1145/2800835.2800932
Schneider K, Liskin O. 2015. Exploring FLOW Distance in Project Communication. in 8th IEEE/ACM International Workshop on Cooperative and Human Aspects of Software Engineering, CHASE 2015, Florence, Italy, May 18, 2015. IEEE. https://doi.org/10.1109/CHASE.2015.20
Schneider K, Liskin O, Paulsen HFK, Kauffeld S. 2015. Media, Mood, and Meetings: Related to Project Success?. Transactions on Computing Education. 15(4). https://doi.org/10.1145/2771440
2014
Averbakh A, Knauss E, Kiesling S, Schneider K. 2014. Dedicated support for experience sharing in distributed software projects. in Proceedings of the Twenty-Sixth International Conference on Software Engineering & Knowledge Engineering. S. 355-360. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE).
Averbakh A, Niklas K, Schneider K. 2014. Knowledge from document annotations as by-product in distributed software engineering. in 26th International Conference on Software Engineering and Knowledge Engineering, SEKE 2014. S. 350-354. (Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE).
Bürger J, Jürjens J, Ruhroth T, Gärtner S, Schneider K. 2014. Model-based security engineering: Managed co-evolution of security knowledge and software models. Aldini A, Lopez J, Martinelli F, Hrsg. in Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial Lectures. Springer, Cham. S. 34-53. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-10082-1_2
Gärtner S, Ruhroth T, Bürger J, Schneider K, Jürjens J. 2014. Maintaining requirements for long-living software systems by incorporating security knowledge. in 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc. S. 103-112. (IEEE International Conference on Requirements Engineering Proceedings). https://doi.org/10.1109/RE.2014.6912252
Gärtner S, Bürger J, Schneider K, Jürjens J. 2014. Zielgerichtete Anpassung von Software nach der Evolution von kontextspezifischem Wissen. in SE-WS 2014 Software Engineering Workshops 2014: Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2014. S. 91-109. (CEUR Workshop Proceedings).
Greenyer J, Hansen C, Kotlarski J, Ortmaier T. 2014. Towards Synthesizing Energy-Efficient Controllers for Modern Production Systems from Scenario-Based Specifications. in Proceedings of the 2nd International Conference on System-integrated Intelligence: New Challenges for Product and Production Engineering (SysInt). Bremen, Germany: Elsevier. S. 388-397. (Procedia Technology). https://doi.org/10.1016/j.protcy.2014.09.093
Herrmann A, Daneva M, Doerr J, Hoffmann A, Schneider K. 2014. CreaRE 2014: Fourth international workshop on creativity in requirements engineering. in REFSQ Workshops, Doctoral Symposium, Empirical Track, and Posters 2014: Joint Proceedings of REFSQ-2014 Workshops, Doctoral Symposium, Empirical Track, and Posters, co-located with the 20th International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2014). S. 1. (CEUR Workshop Proceedings).
Hesse TM, Gartner S, Roehm T, Paech B, Schneider K, Bruegge B. 2014. Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring. in 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014 - Proceedings. Institute of Electrical and Electronics Engineers Inc. S. 1-6. (2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014 - Proceedings). https://doi.org/10.1109/ESPRE.2014.6890520
Jürjens J, Schneider K. 2014. The SecReq approach: From security requirements to secure design while Managing Software Evolution. Hasselbring W, Ehmke NC, Hrsg. in Software Engineering 2014. Gesellschaft fur Informatik (GI). S. 89-90. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)).
Knauss A, Damian D, Schneider K. 2014. Eliciting Contextual Requirements at Design Time: A Case Study. in 2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE): Proceedings. Institute of Electrical and Electronics Engineers Inc. S. 56-63. https://doi.org/10.1109/EmpiRE.2014.6890117
Liskin O, Schneider K, Fagerholm F, Münch J. 2014. Understanding the role of requirements artifacts in Kanban. in 7th International Workshop on Cooperative and Human Aspects of Software Engineering, CHASE 2014 - Proceedings. Association for Computing Machinery, Inc. S. 56-63. https://doi.org/10.1145/2593702.2593707
Liskin O, Pham R, Kiesling S, Schneider K. 2014. Why we need a granularity concept for user stories. in Agile Processes in Software Engineering and Extreme Programming : 15th International Conference, XP 2014, Proceedings. Springer Verlag. S. 110-125. (Lecture Notes in Business Information Processing). https://doi.org/10.1007/978-3-319-06862-6_8
Pham R, Kiesling S, Liskin O, Singer L, Schneider K. 2014. Enablers, inhibitors, and perceptions of testing in novice software teams. in FSE 2014: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. Association for Computing Machinery (ACM). S. 30-40. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering). https://doi.org/10.1145/2635868.2635925
Pham R, Singer L, Liskin O, Filho FF, Schneider K. 2014. Revisited: Testing culture on a social coding site. Hasselbring W, Ehmke NC, Hrsg. in Software Engineering 2014. Gesellschaft fur Informatik (GI). S. 95-96. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI)).
Pham R, Holzmann H, Schneider K, Brüggemann C. 2014. Tailoring video recording to support efficient GUI testing and debugging. Software Quality Journal. 22(2):273-292. https://doi.org/10.1007/s11219-013-9206-2
Ruhroth T, Bürger J, Gärtner S, Schneider K, Jürjens J. 2014. Towards adaptation and evolution of domain-specific knowledge for maintaining secure systems. Jedlitschka A, Kuvaja P, Kuhrmann M, Männistö T, Münch J, Raatikainen M, Hrsg. in Product-Focused Software Process Improvement: 15th International Conference, PROFES 2014, Helsinki, Finland, December 10-12, 2014. Proceedings. Springer, Cham. S. 239-253. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-319-13835-0_17
Ruhroth T, Gärtner S, Bürger J, Jürjens J, Schneider K. 2014. Versioning and Evolution Requirements for Model-Based System Development. Softwaretechnik-Trends. 34(2).