Oct'14

biblio

Visible to the public Managing security requirements patterns using feature diagram hierarchies

biblio

Visible to the public Rely-Guarantee Protocols

biblio

Visible to the public Impact Models for Architecture-Based Self-Adaptive Systems