Geri G. Georg, Ph.D.

Affiliations: 
2001 Colorado State University, Fort Collins, CO 
Area:
Computer Science
Google:
"Geri Georg"

Parents

Sign in to add mentor
James Bieman grad student 2001 Colorado State
 (Run -time configuration management specification for distributed systems.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Georg G, Mussbacher G, Amyot D, et al. (2015) Synergy between Activity Theory and goal/scenario modeling for requirements elicitation, analysis, and evolution Information and Software Technology. 59: 109-135
Georg G, Rumpe B, Schindler M. (2014) The 2013 State of the Journal report Software and Systems Modeling. 13: 1-3
Georg G, Anastasakis K, Bordbar B, et al. (2010) Verification and trade-off analysis of security properties in UML system models Ieee Transactions On Software Engineering. 36: 338-356
Anastasakis K, Bordbar B, Georg G, et al. (2010) On challenges of model transformation from UML to Alloy Software and Systems Modeling. 9: 69-86
Baillargeon R, Zschaler S, Rumpe B, et al. (2009) Workshop on modeling in software engineering at ICSE 2009 Acm Sigsoft Software Engineering Notes. 34: 34-37
Woodside M, Petriu DC, Petriu DB, et al. (2009) Performance analysis of security aspects by weaving scenarios extracted from UML models Journal of Systems and Software. 82: 56-74
Georg G, Ray I, Anastasakis K, et al. (2009) An aspect-oriented methodology for designing secure applications Information and Software Technology. 51: 846-864
Henderson-Sellers B, Georg G, Reddy R. (2007) A method engineering approach to developing aspect-oriented modelling processes based on the OPEN process framework Information & Software Technology. 49: 761-773
Georg G, Houmb SH, Ray I. (2006) Aspect-Oriented risk driven development of secure applications Lecture Notes in Computer Science. 282-296
Ray I, France R, Li N, et al. (2004) An aspect-based approach to modeling access control concerns Information and Software Technology. 46: 575-587
See more...