The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bashar Nuseibeh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein
    Expressing the Relationships Between Multiple Views in Requirements Specification. [Citation Graph (2, 0)][DBLP]
    ICSE, 1993, pp:187-196 [Conf]
  2. Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein
    A Framework for Expressing the Relationships Between Multiple Views in Requirements Specification. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1994, v:20, n:10, pp:760-773 [Journal]
  3. Bashar Nuseibeh
    Crosscutting requirements. [Citation Graph (0, 0)][DBLP]
    AOSD, 2004, pp:3-4 [Conf]
  4. Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
    Deriving security requirements from crosscutting threat descriptions. [Citation Graph (0, 0)][DBLP]
    AOSD, 2004, pp:112-121 [Conf]
  5. Leonor Barroca, José Luiz Fiadeiro, Michael Jackson, Robin C. Laney, Bashar Nuseibeh
    Problem Frames: A Case for Coordination. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 2004, pp:5-19 [Conf]
  6. Bashar Nuseibeh, Steve M. Easterbrook
    The Process of Inconsistency Management: A Framework for Understanding. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:364-368 [Conf]
  7. Debra T. Hayley, Anne N. De Roeck, Bashar Nuseibeh, Marian Petre, Pete Thomas
    Gathering Requirements for a Grid-based Automatic Marking System. [Citation Graph (0, 0)][DBLP]
    ELeGI Conference, 2005, pp:- [Conf]
  8. Anthony Finkelstein, Dov M. Gabbay, Anthony Hunter, Jeff Kramer, Bashar Nuseibeh
    Inconsistency Handling in Multi-Perspective Specifications. [Citation Graph (0, 0)][DBLP]
    ESEC, 1993, pp:84-99 [Conf]
  9. Bashar Nuseibeh
    When Agents Clash. [Citation Graph (0, 0)][DBLP]
    EWSPT, 1996, pp:237-240 [Conf]
  10. Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein, Ulf Leonhardt
    Decentralised Process Modelling. [Citation Graph (0, 0)][DBLP]
    EWSPT, 1995, pp:185-188 [Conf]
  11. Alessandra Russo, Rob Miller, Bashar Nuseibeh, Jeff Kramer
    An Abductive Approach for Analysing Event-Based Requirements Specifications. [Citation Graph (0, 0)][DBLP]
    ICLP, 2002, pp:22-37 [Conf]
  12. Alessandra Russo, Bashar Nuseibeh, Jeff Kramer
    Restructuring Requirements Specifications For Managing Inconsistency And Change: A Case Study. [Citation Graph (0, 0)][DBLP]
    ICRE, 1998, pp:51-0 [Conf]
  13. Vincenzo Gervasi, Bashar Nuseibeh
    Lightweight Validation of Natural Language Requirements: A Case Study. [Citation Graph (0, 0)][DBLP]
    ICRE, 2000, pp:140-149 [Conf]
  14. William G. Griswold, Bashar Nuseibeh
    Introduction to Research Papers. [Citation Graph (0, 0)][DBLP]
    ICSE, 2005, pp:48- [Conf]
  15. Jeff Kramer, Anthony Finkelstein, Bashar Nuseibeh
    Method Integration and Support for Distributed Software Development: An Overview. [Citation Graph (0, 0)][DBLP]
    ICSE Workshop on Studies of Software Design, 1993, pp:115-126 [Conf]
  16. Ulf Leonhardt, Jeff Kramer, Bashar Nuseibeh
    Decentralised Process Enactment in a Multi-Perspective Development Environment. [Citation Graph (0, 0)][DBLP]
    ICSE, 1995, pp:255-264 [Conf]
  17. Bashar Nuseibeh, Steve M. Easterbrook
    Requirements engineering: a roadmap. [Citation Graph (0, 0)][DBLP]
    ICSE - Future of SE Track, 2000, pp:35-46 [Conf]
  18. Bashar Nuseibeh, Jeff Kramer, Anthony Finkelstein
    ViewPoints: meaningful relationships are difficult! [Citation Graph (0, 0)][DBLP]
    ICSE, 2003, pp:676-683 [Conf]
  19. Bashar Nuseibeh, Suzanne Robertson
    Making Requirements Measurable (Tutorial). [Citation Graph (0, 0)][DBLP]
    ICSE, 1997, pp:647-648 [Conf]
  20. Peri L. Tarr, William H. Harrison, Harold Ossher, Anthony Finkelstein, Bashar Nuseibeh, Dewayne E. Perry
    Workshop on multi-dimensional separation of concerns in software engineering. [Citation Graph (0, 0)][DBLP]
    ICSE, 2000, pp:809-810 [Conf]
  21. Bastian Best, Jan Jürjens, Bashar Nuseibeh
    Model-Based Security Engineering of Distributed Information Systems Using UMLsec. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:581-590 [Conf]
  22. Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
    Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:347-354 [Conf]
  23. Jeff Magee, Jeff Kramer, Bashar Nuseibeh, David Bush, Julia Sonander
    Hybrid Model Visualization in Requirements and Design: A Preliminary Investigation. [Citation Graph (0, 0)][DBLP]
    IWSSD, 2000, pp:3-10 [Conf]
  24. Bashar Nuseibeh, Anthony Finkelstein, Jeff Kramer
    Fine-Grain Process Modelling. [Citation Graph (0, 0)][DBLP]
    IWSSD, 1993, pp:42-46 [Conf]
  25. Artur S. d'Avila Garcez, Alessandra Russo, Bashar Nuseibeh, Jeff Kramer
    An Analysis-Revision Cycle to Evolve Requirements Specifications. [Citation Graph (0, 0)][DBLP]
    ASE, 2001, pp:354-358 [Conf]
  26. Debra Haley, Pete Thomas, Bashar Nuseibeh, Josie Taylor, Paul Lefrere
    E-Assessment using Latent Semantic Analysis. [Citation Graph (0, 0)][DBLP]
    LeGE-WG 3, 2003, pp:- [Conf]
  27. Robert Crook, Darrel C. Ince, Luncheng Lin, Bashar Nuseibeh
    Security Requirements Engineering: When Anti-Requirements Hit the Fan. [Citation Graph (0, 0)][DBLP]
    RE, 2002, pp:203-205 [Conf]
  28. Robert Crook, Darrel C. Ince, Bashar Nuseibeh
    On Modelling Access Policies: Relating Roles to their Organisational Context. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:157-166 [Conf]
  29. Steve M. Easterbrook, Bashar Nuseibeh
    Managing inconsistencies in an evolving specification. [Citation Graph (0, 0)][DBLP]
    RE, 1995, pp:48-55 [Conf]
  30. Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
    The Effect of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP]
    RE, 2004, pp:102-111 [Conf]
  31. Debra Haley, Bashar Nuseibeh, Helen C. Sharp, Josie Taylor
    The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move. [Citation Graph (0, 0)][DBLP]
    RE, 2004, pp:309-314 [Conf]
  32. Jon G. Hall, Michael Jackson, Robin C. Laney, Bashar Nuseibeh, Lucia Rapanotti
    Relating Software Requirements and Architectures Using Problem Frames. [Citation Graph (0, 0)][DBLP]
    RE, 2002, pp:137-144 [Conf]
  33. Anthony Hunter, Bashar Nuseibeh
    Analyzing Inconsistent Specifications. [Citation Graph (0, 0)][DBLP]
    RE, 1997, pp:78-86 [Conf]
  34. Robin C. Laney, Leonor Barroca, Michael Jackson, Bashar Nuseibeh
    Composing Requirements Using Problem Frames. [Citation Graph (0, 0)][DBLP]
    RE, 2004, pp:122-131 [Conf]
  35. Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson
    Using Abuse Frames to Bound the Scope of Security Problems. [Citation Graph (0, 0)][DBLP]
    RE, 2004, pp:354-355 [Conf]
  36. Luncheng Lin, Bashar Nuseibeh, Darrel C. Ince, Michael Jackson, Jonathan D. Moffett
    Introducing Abuse Frames for Analysing Security Requirements. [Citation Graph (0, 0)][DBLP]
    RE, 2003, pp:371-372 [Conf]
  37. Tim Menzies, Steve M. Easterbrook, Bashar Nuseibeh, Sam Waugh
    An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    RE, 1999, pp:100-0 [Conf]
  38. Bashar Nuseibeh, Suzanne Robertson
    Making Requirements Measurable. [Citation Graph (0, 0)][DBLP]
    RE, 1997, pp:262- [Conf]
  39. Lucia Rapanotti, Jon G. Hall, Michael Jackson, Bashar Nuseibeh
    Architecture-driven Problem Decomposition. [Citation Graph (0, 0)][DBLP]
    RE, 2004, pp:80-89 [Conf]
  40. Francis Chantree, Bashar Nuseibeh, Anne N. De Roeck, Alistair Willis
    Identifying Nocuous Ambiguities in Natural Language Requirements. [Citation Graph (0, 0)][DBLP]
    RE, 2006, pp:56-65 [Conf]
  41. David Bush, Bashar Nuseibeh
    Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning. [Citation Graph (0, 0)][DBLP]
    RE, 2006, pp:324- [Conf]
  42. Bashar Nuseibeh
    Editorial. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2000, v:7, n:1, pp:5- [Journal]
  43. Bashar Nuseibeh
    Report on the Second IEEE International Symposium on Requirements Engineering (RE `95), York, UK, 27-29 March 1995. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 1995, v:2, n:3, pp:249-253 [Journal]
  44. Bashar Nuseibeh, David F. Redmiles
    Introduction to Special Issue. [Citation Graph (0, 0)][DBLP]
    Autom. Softw. Eng., 2000, v:7, n:2, pp:99-100 [Journal]
  45. Bashar Nuseibeh
    Weaving Together Requirements and Architectures. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2001, v:34, n:3, pp:115-117 [Journal]
  46. Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo
    Leveraging Inconsistency in Software Development. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:4, pp:24-29 [Journal]
  47. Artur S. d'Avila Garcez, Alessandra Russo, Bashar Nuseibeh, Jeff Kramer
    Combining abductive reasoning and inductive learning to evolve requirements specifications. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 2003, v:150, n:1, pp:25-38 [Journal]
  48. Alessandra Russo, Bashar Nuseibeh, Jeff Kramer
    Restructuring requirement specifications. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 1999, v:146, n:1, pp:44-50 [Journal]
  49. Blaine A. Price, Karim Adam, Bashar Nuseibeh
    Keeping ubiquitous computing to yourself: A practical model for user control of privacy. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:228-253 [Journal]
  50. Robert Crook, Darrel C. Ince, Bashar Nuseibeh
    Modelling access policies using roles in requirements engineering. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2003, v:45, n:14, pp:979-991 [Journal]
  51. Bashar Nuseibeh, Anthony Finkelstein, Jeff Kramer
    Method engineering for multi-perspective software development. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1996, v:38, n:4, pp:267-274 [Journal]
  52. Bashar Nuseibeh, Steve M. Easterbrook, Alessandra Russo
    Making inconsistency respectable in software development. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:58, n:2, pp:171-180 [Journal]
  53. Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh
    Using trust assumptions with security requirements. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 2006, v:11, n:2, pp:138-151 [Journal]
  54. Bashar Nuseibeh
    Guest editorial. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 2003, v:8, n:1, pp:3- [Journal]
  55. Bashar Nuseibeh
    Conflicting Requirements: When the Customer is Not Always Right. [Citation Graph (0, 0)][DBLP]
    Requir. Eng., 1996, v:1, n:1, pp:- [Journal]
  56. Bashar Nuseibeh
    Soapbox: Ariane 5: Who Dunnit? [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:3, pp:15-16 [Journal]
  57. Vincenzo Gervasi, Bashar Nuseibeh
    Lightweight validation of natural language requirements. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2002, v:32, n:2, pp:113-133 [Journal]
  58. Anthony Hunter, Bashar Nuseibeh
    Managing Inconsistent Specifications: Reasoning, Analysis, and Action. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 1998, v:7, n:4, pp:335-367 [Journal]
  59. Anthony Finkelstein, Dov M. Gabbay, Anthony Hunter, Jeff Kramer, Bashar Nuseibeh
    Inconsistency Handling in Multperspective Specifications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1994, v:20, n:8, pp:569-578 [Journal]
  60. Carlo Ghezzi, Bashar Nuseibeh
    Guest Editorial: Introduction to the Special Section - Managing Inconsistency in Software Development. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1999, v:25, n:6, pp:782-783 [Journal]
  61. William G. Griswold, Bashar Nuseibeh
    Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2006, v:32, n:12, pp:929-930 [Journal]
  62. Angela Lozano, Michel Wermelinger, Bashar Nuseibeh
    Evaluating the Harmfulness of Cloning: A Change Based Experiment. [Citation Graph (0, 0)][DBLP]
    MSR, 2007, pp:18- [Conf]

  63. Contravision: exploring users' reactions to futuristic technology. [Citation Graph (, )][DBLP]


  64. ContraVision: presenting contrasting visions of future technology. [Citation Graph (, )][DBLP]


  65. A Framework for Developing Feature-Rich Software Systems. [Citation Graph (, )][DBLP]


  66. Customizing Choreography: Deriving Conversations from Organizational Dependencies. [Citation Graph (, )][DBLP]


  67. Composing Features by Managing Inconsistent Requirements. [Citation Graph (, )][DBLP]


  68. From spaces to places: emerging contexts in mobile privacy. [Citation Graph (, )][DBLP]


  69. Towards safer composition. [Citation Graph (, )][DBLP]


  70. Requirements-Driven Collaborative Choreography Customization. [Citation Graph (, )][DBLP]


  71. Assessing the impact of bad smells using historical information. [Citation Graph (, )][DBLP]


  72. Evaluating the relation between changeability decay and the characteristics of clones and methods. [Citation Graph (, )][DBLP]


  73. Automatic detection of nocuous coordination ambiguities in natural language requirements. [Citation Graph (, )][DBLP]


  74. The Learning Grid and E-Assessment using Latent Semantic Analysis. [Citation Graph (, )][DBLP]


  75. First International Modeling Security Workshop. [Citation Graph (, )][DBLP]


  76. Mobile Privacy Requirements on Demand. [Citation Graph (, )][DBLP]


  77. Building Contingencies into Specifications. [Citation Graph (, )][DBLP]


  78. Specifying Monitoring and Switching Problems in Context. [Citation Graph (, )][DBLP]


  79. Are Your Lights Off? Using Problem Frames to Diagnose System Failures. [Citation Graph (, )][DBLP]


  80. Early Identification of Problem Interactions: A Tool-Supported Approach. [Citation Graph (, )][DBLP]


  81. On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. [Citation Graph (, )][DBLP]


  82. Studying location privacy in mobile applications: 'predator vs. prey' probes. [Citation Graph (, )][DBLP]


  83. On the Structure of Problem Variability: From Feature Diagrams to Problem Frames. [Citation Graph (, )][DBLP]


  84. Using Problem Descriptions to Represent Variabilities For Context-Aware Applications. [Citation Graph (, )][DBLP]


  85. From Organizational Requirements to Service Choreography. [Citation Graph (, )][DBLP]


  86. Model-Based Argument Analysis for Evolving Security Requirements. [Citation Graph (, )][DBLP]


  87. A final editorial. [Citation Graph (, )][DBLP]


  88. Securing the Skies: In Requirements We Trust. [Citation Graph (, )][DBLP]


  89. Guest Editors' Introduction: Evolving Critical Systems. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.610secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002