Search the dblp DataBase
Bashar Nuseibeh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Bashar Nuseibeh , Jeff Kramer , Anthony Finkelstein Expressing the Relationships Between Multiple Views in Requirements Specification. [Citation Graph (2, 0)][DBLP ] ICSE, 1993, pp:187-196 [Conf ] Bashar Nuseibeh , Jeff Kramer , Anthony Finkelstein A Framework for Expressing the Relationships Between Multiple Views in Requirements Specification. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1994, v:20, n:10, pp:760-773 [Journal ] Bashar Nuseibeh Crosscutting requirements. [Citation Graph (0, 0)][DBLP ] AOSD, 2004, pp:3-4 [Conf ] Charles B. Haley , Robin C. Laney , Bashar Nuseibeh Deriving security requirements from crosscutting threat descriptions. [Citation Graph (0, 0)][DBLP ] AOSD, 2004, pp:112-121 [Conf ] Leonor Barroca , José Luiz Fiadeiro , Michael Jackson , Robin C. Laney , Bashar Nuseibeh Problem Frames: A Case for Coordination. [Citation Graph (0, 0)][DBLP ] COORDINATION, 2004, pp:5-19 [Conf ] Bashar Nuseibeh , Steve M. Easterbrook The Process of Inconsistency Management: A Framework for Understanding. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:364-368 [Conf ] Debra T. Hayley , Anne N. De Roeck , Bashar Nuseibeh , Marian Petre , Pete Thomas Gathering Requirements for a Grid-based Automatic Marking System. [Citation Graph (0, 0)][DBLP ] ELeGI Conference, 2005, pp:- [Conf ] Anthony Finkelstein , Dov M. Gabbay , Anthony Hunter , Jeff Kramer , Bashar Nuseibeh Inconsistency Handling in Multi-Perspective Specifications. [Citation Graph (0, 0)][DBLP ] ESEC, 1993, pp:84-99 [Conf ] Bashar Nuseibeh When Agents Clash. [Citation Graph (0, 0)][DBLP ] EWSPT, 1996, pp:237-240 [Conf ] Bashar Nuseibeh , Jeff Kramer , Anthony Finkelstein , Ulf Leonhardt Decentralised Process Modelling. [Citation Graph (0, 0)][DBLP ] EWSPT, 1995, pp:185-188 [Conf ] Alessandra Russo , Rob Miller , Bashar Nuseibeh , Jeff Kramer An Abductive Approach for Analysing Event-Based Requirements Specifications. [Citation Graph (0, 0)][DBLP ] ICLP, 2002, pp:22-37 [Conf ] Alessandra Russo , Bashar Nuseibeh , Jeff Kramer Restructuring Requirements Specifications For Managing Inconsistency And Change: A Case Study. [Citation Graph (0, 0)][DBLP ] ICRE, 1998, pp:51-0 [Conf ] Vincenzo Gervasi , Bashar Nuseibeh Lightweight Validation of Natural Language Requirements: A Case Study. [Citation Graph (0, 0)][DBLP ] ICRE, 2000, pp:140-149 [Conf ] William G. Griswold , Bashar Nuseibeh Introduction to Research Papers. [Citation Graph (0, 0)][DBLP ] ICSE, 2005, pp:48- [Conf ] Jeff Kramer , Anthony Finkelstein , Bashar Nuseibeh Method Integration and Support for Distributed Software Development: An Overview. [Citation Graph (0, 0)][DBLP ] ICSE Workshop on Studies of Software Design, 1993, pp:115-126 [Conf ] Ulf Leonhardt , Jeff Kramer , Bashar Nuseibeh Decentralised Process Enactment in a Multi-Perspective Development Environment. [Citation Graph (0, 0)][DBLP ] ICSE, 1995, pp:255-264 [Conf ] Bashar Nuseibeh , Steve M. Easterbrook Requirements engineering: a roadmap. [Citation Graph (0, 0)][DBLP ] ICSE - Future of SE Track, 2000, pp:35-46 [Conf ] Bashar Nuseibeh , Jeff Kramer , Anthony Finkelstein ViewPoints: meaningful relationships are difficult! [Citation Graph (0, 0)][DBLP ] ICSE, 2003, pp:676-683 [Conf ] Bashar Nuseibeh , Suzanne Robertson Making Requirements Measurable (Tutorial). [Citation Graph (0, 0)][DBLP ] ICSE, 1997, pp:647-648 [Conf ] Peri L. Tarr , William H. Harrison , Harold Ossher , Anthony Finkelstein , Bashar Nuseibeh , Dewayne E. Perry Workshop on multi-dimensional separation of concerns in software engineering. [Citation Graph (0, 0)][DBLP ] ICSE, 2000, pp:809-810 [Conf ] Bastian Best , Jan Jürjens , Bashar Nuseibeh Model-Based Security Engineering of Distributed Information Systems Using UMLsec. [Citation Graph (0, 0)][DBLP ] ICSE, 2007, pp:581-590 [Conf ] Charles B. Haley , Robin C. Laney , Jonathan D. Moffett , Bashar Nuseibeh Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP ] iTrust, 2004, pp:347-354 [Conf ] Jeff Magee , Jeff Kramer , Bashar Nuseibeh , David Bush , Julia Sonander Hybrid Model Visualization in Requirements and Design: A Preliminary Investigation. [Citation Graph (0, 0)][DBLP ] IWSSD, 2000, pp:3-10 [Conf ] Bashar Nuseibeh , Anthony Finkelstein , Jeff Kramer Fine-Grain Process Modelling. [Citation Graph (0, 0)][DBLP ] IWSSD, 1993, pp:42-46 [Conf ] Artur S. d'Avila Garcez , Alessandra Russo , Bashar Nuseibeh , Jeff Kramer An Analysis-Revision Cycle to Evolve Requirements Specifications. [Citation Graph (0, 0)][DBLP ] ASE, 2001, pp:354-358 [Conf ] Debra Haley , Pete Thomas , Bashar Nuseibeh , Josie Taylor , Paul Lefrere E-Assessment using Latent Semantic Analysis. [Citation Graph (0, 0)][DBLP ] LeGE-WG 3, 2003, pp:- [Conf ] Robert Crook , Darrel C. Ince , Luncheng Lin , Bashar Nuseibeh Security Requirements Engineering: When Anti-Requirements Hit the Fan. [Citation Graph (0, 0)][DBLP ] RE, 2002, pp:203-205 [Conf ] Robert Crook , Darrel C. Ince , Bashar Nuseibeh On Modelling Access Policies: Relating Roles to their Organisational Context. [Citation Graph (0, 0)][DBLP ] RE, 2005, pp:157-166 [Conf ] Steve M. Easterbrook , Bashar Nuseibeh Managing inconsistencies in an evolving specification. [Citation Graph (0, 0)][DBLP ] RE, 1995, pp:48-55 [Conf ] Charles B. Haley , Robin C. Laney , Jonathan D. Moffett , Bashar Nuseibeh The Effect of Trust Assumptions on the Elaboration of Security Requirements. [Citation Graph (0, 0)][DBLP ] RE, 2004, pp:102-111 [Conf ] Debra Haley , Bashar Nuseibeh , Helen C. Sharp , Josie Taylor The Conundrum of Categorising Requirements: Managing Requirements for Learning on the Move. [Citation Graph (0, 0)][DBLP ] RE, 2004, pp:309-314 [Conf ] Jon G. Hall , Michael Jackson , Robin C. Laney , Bashar Nuseibeh , Lucia Rapanotti Relating Software Requirements and Architectures Using Problem Frames. [Citation Graph (0, 0)][DBLP ] RE, 2002, pp:137-144 [Conf ] Anthony Hunter , Bashar Nuseibeh Analyzing Inconsistent Specifications. [Citation Graph (0, 0)][DBLP ] RE, 1997, pp:78-86 [Conf ] Robin C. Laney , Leonor Barroca , Michael Jackson , Bashar Nuseibeh Composing Requirements Using Problem Frames. [Citation Graph (0, 0)][DBLP ] RE, 2004, pp:122-131 [Conf ] Luncheng Lin , Bashar Nuseibeh , Darrel C. Ince , Michael Jackson Using Abuse Frames to Bound the Scope of Security Problems. [Citation Graph (0, 0)][DBLP ] RE, 2004, pp:354-355 [Conf ] Luncheng Lin , Bashar Nuseibeh , Darrel C. Ince , Michael Jackson , Jonathan D. Moffett Introducing Abuse Frames for Analysing Security Requirements. [Citation Graph (0, 0)][DBLP ] RE, 2003, pp:371-372 [Conf ] Tim Menzies , Steve M. Easterbrook , Bashar Nuseibeh , Sam Waugh An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering. [Citation Graph (0, 0)][DBLP ] RE, 1999, pp:100-0 [Conf ] Bashar Nuseibeh , Suzanne Robertson Making Requirements Measurable. [Citation Graph (0, 0)][DBLP ] RE, 1997, pp:262- [Conf ] Lucia Rapanotti , Jon G. Hall , Michael Jackson , Bashar Nuseibeh Architecture-driven Problem Decomposition. [Citation Graph (0, 0)][DBLP ] RE, 2004, pp:80-89 [Conf ] Francis Chantree , Bashar Nuseibeh , Anne N. De Roeck , Alistair Willis Identifying Nocuous Ambiguities in Natural Language Requirements. [Citation Graph (0, 0)][DBLP ] RE, 2006, pp:56-65 [Conf ] David Bush , Bashar Nuseibeh Requirements Engineering Research in Some Future Worlds: An Exercise in Scenario Planning. [Citation Graph (0, 0)][DBLP ] RE, 2006, pp:324- [Conf ] Bashar Nuseibeh Editorial. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 2000, v:7, n:1, pp:5- [Journal ] Bashar Nuseibeh Report on the Second IEEE International Symposium on Requirements Engineering (RE `95), York, UK, 27-29 March 1995. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 1995, v:2, n:3, pp:249-253 [Journal ] Bashar Nuseibeh , David F. Redmiles Introduction to Special Issue. [Citation Graph (0, 0)][DBLP ] Autom. Softw. Eng., 2000, v:7, n:2, pp:99-100 [Journal ] Bashar Nuseibeh Weaving Together Requirements and Architectures. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2001, v:34, n:3, pp:115-117 [Journal ] Bashar Nuseibeh , Steve M. Easterbrook , Alessandra Russo Leveraging Inconsistency in Software Development. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:4, pp:24-29 [Journal ] Artur S. d'Avila Garcez , Alessandra Russo , Bashar Nuseibeh , Jeff Kramer Combining abductive reasoning and inductive learning to evolve requirements specifications. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 2003, v:150, n:1, pp:25-38 [Journal ] Alessandra Russo , Bashar Nuseibeh , Jeff Kramer Restructuring requirement specifications. [Citation Graph (0, 0)][DBLP ] IEE Proceedings - Software, 1999, v:146, n:1, pp:44-50 [Journal ] Blaine A. Price , Karim Adam , Bashar Nuseibeh Keeping ubiquitous computing to yourself: A practical model for user control of privacy. [Citation Graph (0, 0)][DBLP ] International Journal of Man-Machine Studies, 2005, v:63, n:1-2, pp:228-253 [Journal ] Robert Crook , Darrel C. Ince , Bashar Nuseibeh Modelling access policies using roles in requirements engineering. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2003, v:45, n:14, pp:979-991 [Journal ] Bashar Nuseibeh , Anthony Finkelstein , Jeff Kramer Method engineering for multi-perspective software development. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 1996, v:38, n:4, pp:267-274 [Journal ] Bashar Nuseibeh , Steve M. Easterbrook , Alessandra Russo Making inconsistency respectable in software development. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:58, n:2, pp:171-180 [Journal ] Charles B. Haley , Robin C. Laney , Jonathan D. Moffett , Bashar Nuseibeh Using trust assumptions with security requirements. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 2006, v:11, n:2, pp:138-151 [Journal ] Bashar Nuseibeh Guest editorial. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 2003, v:8, n:1, pp:3- [Journal ] Bashar Nuseibeh Conflicting Requirements: When the Customer is Not Always Right. [Citation Graph (0, 0)][DBLP ] Requir. Eng., 1996, v:1, n:1, pp:- [Journal ] Bashar Nuseibeh Soapbox: Ariane 5: Who Dunnit? [Citation Graph (0, 0)][DBLP ] IEEE Software, 1997, v:14, n:3, pp:15-16 [Journal ] Vincenzo Gervasi , Bashar Nuseibeh Lightweight validation of natural language requirements. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2002, v:32, n:2, pp:113-133 [Journal ] Anthony Hunter , Bashar Nuseibeh Managing Inconsistent Specifications: Reasoning, Analysis, and Action. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 1998, v:7, n:4, pp:335-367 [Journal ] Anthony Finkelstein , Dov M. Gabbay , Anthony Hunter , Jeff Kramer , Bashar Nuseibeh Inconsistency Handling in Multperspective Specifications. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1994, v:20, n:8, pp:569-578 [Journal ] Carlo Ghezzi , Bashar Nuseibeh Guest Editorial: Introduction to the Special Section - Managing Inconsistency in Software Development. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1999, v:25, n:6, pp:782-783 [Journal ] William G. Griswold , Bashar Nuseibeh Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2006, v:32, n:12, pp:929-930 [Journal ] Angela Lozano , Michel Wermelinger , Bashar Nuseibeh Evaluating the Harmfulness of Cloning: A Change Based Experiment. [Citation Graph (0, 0)][DBLP ] MSR, 2007, pp:18- [Conf ] Contravision: exploring users' reactions to futuristic technology. [Citation Graph (, )][DBLP ] ContraVision: presenting contrasting visions of future technology. [Citation Graph (, )][DBLP ] A Framework for Developing Feature-Rich Software Systems. [Citation Graph (, )][DBLP ] Customizing Choreography: Deriving Conversations from Organizational Dependencies. [Citation Graph (, )][DBLP ] Composing Features by Managing Inconsistent Requirements. [Citation Graph (, )][DBLP ] From spaces to places: emerging contexts in mobile privacy. [Citation Graph (, )][DBLP ] Towards safer composition. [Citation Graph (, )][DBLP ] Requirements-Driven Collaborative Choreography Customization. [Citation Graph (, )][DBLP ] Assessing the impact of bad smells using historical information. [Citation Graph (, )][DBLP ] Evaluating the relation between changeability decay and the characteristics of clones and methods. [Citation Graph (, )][DBLP ] Automatic detection of nocuous coordination ambiguities in natural language requirements. [Citation Graph (, )][DBLP ] The Learning Grid and E-Assessment using Latent Semantic Analysis. [Citation Graph (, )][DBLP ] First International Modeling Security Workshop. [Citation Graph (, )][DBLP ] Mobile Privacy Requirements on Demand. [Citation Graph (, )][DBLP ] Building Contingencies into Specifications. [Citation Graph (, )][DBLP ] Specifying Monitoring and Switching Problems in Context. [Citation Graph (, )][DBLP ] Are Your Lights Off? Using Problem Frames to Diagnose System Failures. [Citation Graph (, )][DBLP ] Early Identification of Problem Interactions: A Tool-Supported Approach. [Citation Graph (, )][DBLP ] On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. [Citation Graph (, )][DBLP ] Studying location privacy in mobile applications: 'predator vs. prey' probes. [Citation Graph (, )][DBLP ] On the Structure of Problem Variability: From Feature Diagrams to Problem Frames. [Citation Graph (, )][DBLP ] Using Problem Descriptions to Represent Variabilities For Context-Aware Applications. [Citation Graph (, )][DBLP ] From Organizational Requirements to Service Choreography. [Citation Graph (, )][DBLP ] Model-Based Argument Analysis for Evolving Security Requirements. [Citation Graph (, )][DBLP ] A final editorial. [Citation Graph (, )][DBLP ] Securing the Skies: In Requirements We Trust. [Citation Graph (, )][DBLP ] Guest Editors' Introduction: Evolving Critical Systems. [Citation Graph (, )][DBLP ] Search in 0.105secs, Finished in 0.108secs