Geri G. Georg, Ph.D.
Affiliations: | 2001 | Colorado State University, Fort Collins, CO |
Area:
Computer ScienceGoogle:
"Geri Georg"Parents
Sign in to add mentorJames Bieman | grad student | 2001 | Colorado State | |
(Run -time configuration management specification for distributed systems.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Georg G, Mussbacher G, Amyot D, et al. (2015) Synergy between Activity Theory and goal/scenario modeling for requirements elicitation, analysis, and evolution Information and Software Technology. 59: 109-135 |
Georg G, Rumpe B, Schindler M. (2014) The 2013 State of the Journal report Software and Systems Modeling. 13: 1-3 |
Georg G, Anastasakis K, Bordbar B, et al. (2010) Verification and trade-off analysis of security properties in UML system models Ieee Transactions On Software Engineering. 36: 338-356 |
Anastasakis K, Bordbar B, Georg G, et al. (2010) On challenges of model transformation from UML to Alloy Software and Systems Modeling. 9: 69-86 |
Baillargeon R, Zschaler S, Rumpe B, et al. (2009) Workshop on modeling in software engineering at ICSE 2009 Acm Sigsoft Software Engineering Notes. 34: 34-37 |
Woodside M, Petriu DC, Petriu DB, et al. (2009) Performance analysis of security aspects by weaving scenarios extracted from UML models Journal of Systems and Software. 82: 56-74 |
Georg G, Ray I, Anastasakis K, et al. (2009) An aspect-oriented methodology for designing secure applications Information and Software Technology. 51: 846-864 |
Henderson-Sellers B, Georg G, Reddy R. (2007) A method engineering approach to developing aspect-oriented modelling processes based on the OPEN process framework Information & Software Technology. 49: 761-773 |
Georg G, Houmb SH, Ray I. (2006) Aspect-Oriented risk driven development of secure applications Lecture Notes in Computer Science. 282-296 |
Ray I, France R, Li N, et al. (2004) An aspect-based approach to modeling access control concerns Information and Software Technology. 46: 575-587 |