default search action
Thomas A. Alspaugh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]Walt Scacchi, Thomas A. Alspaugh:
Securing Software Ecosystem Architectures: Challenges and Opportunities. IEEE Softw. 36(3): 33-38 (2019) - 2013
- [c24]Walt Scacchi, Thomas A. Alspaugh:
Processes in securing open architecture software systems. ICSSP 2013: 126-135 - [c23]Thomas A. Alspaugh, Walt Scacchi:
Ongoing software development without classical requirements. RE 2013: 165-174 - 2012
- [j7]Walt Scacchi, Thomas A. Alspaugh:
Understanding the role of licenses and evolution in open architecture software ecosystems. J. Syst. Softw. 85(7): 1479-1494 (2012) - [c22]Walt Scacchi, Thomas A. Alspaugh:
Designing Secure Systems Based on Open Architectures with Open Source and Closed Source Components. OSS 2012: 144-159 - [c21]Thomas A. Alspaugh, Walt Scacchi, Rihoko Kawai:
Software licenses, coverage, and subsumption. RELAW 2012: 17-24 - [c20]Thomas A. Alspaugh, Walt Scacchi:
Licensing security. RELAW 2012: 25-28 - 2011
- [j6]Susan Elliott Sim, Thomas A. Alspaugh:
Getting the whole story: an experience report on analyzing data elicited using the war stories procedure. Empir. Softw. Eng. 16(4): 460-486 (2011) - [c19]Travis D. Breaux, Thomas A. Alspaugh:
Governance and accountability in the new data ecology. RELAW 2011: 5-14 - [c18]Thomas A. Alspaugh, Hazeline U. Asuncion, Walt Scacchi:
Presenting Software License Conflicts through Argumentation. SEKE 2011: 509-514 - 2010
- [j5]Thomas A. Alspaugh, Walt Scacchi, Hazeline U. Asuncion:
Software Licenses in Context: The Challenge of Heterogeneously-Licensed Systems. J. Assoc. Inf. Syst. 11(11): 2 (2010)
2000 – 2009
- 2009
- [c17]Thomas A. Alspaugh, Hazeline U. Asuncion, Walt Scacchi:
The Role of Software Licenses in Open Architecture Ecosystems. IWSECO@ICSR 2009 - [c16]Thomas A. Alspaugh, Walt Scacchi:
Heterogeneously-Licensed System Requirements, Acquisition and Governance. RELAW 2009: 13-14 - [c15]Thomas A. Alspaugh, Hazeline U. Asuncion, Walt Scacchi:
Intellectual Property Rights Requirements for Heterogeneously-Licensed Systems. RE 2009: 24-33 - 2008
- [j4]Thomas A. Alspaugh, Annie I. Antón:
Scenario support for effective requirements. Inf. Softw. Technol. 50(3): 198-220 (2008) - [c14]Amanda M. Williams, Thomas A. Alspaugh:
Articulating Software Requirements Comic Book Style. MERE 2008: 4-8 - [c13]Susan Elliott Sim, Thomas A. Alspaugh, Ban Al-Ani:
Marginal Notes on Amethodical Requirements Engineering: What Experts Learned from Experience. RE 2008: 105-114 - 2007
- [c12]Mamadou H. Diallo, Leila Naslavsky, Thomas A. Alspaugh, Hadar Ziv, Debra J. Richardson:
Toward Architecture Evaluation through Ontology-Based Requirements-Level Scenarios. WADS 2007: 225-247 - [c11]Rand Waltzman, Kristina Winbladh, Thomas A. Alspaugh, Debra J. Richardson:
In the Requirements Lies the Power. SEKE 2007: 185-190 - 2006
- [j3]Lihua Xu, Hadar Ziv, Thomas A. Alspaugh, Debra J. Richardson:
An architectural pattern for non-functional dependability requirements. J. Syst. Softw. 79(10): 1370-1378 (2006) - [c10]Eric P. S. Baumer, Bill Tomlinson, Man Lok Yau, Thomas A. Alspaugh:
Normative Echoes: Use and Manipulation of Player Generated Content by Communities of NPCs. AIIDE 2006: 139-140 - [c9]Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, Debra J. Richardson:
Architecture-based testing using goals and plans. ROSATEA 2006: 64-68 - [c8]Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, Debra J. Richardson:
An Automated Approach for Goal-driven, Specification-based Testing. ASE 2006: 289-292 - [c7]Thomas A. Alspaugh, Bill Tomlinson, Eric P. S. Baumer:
Using social agents to visualize software scenarios. SOFTVIS 2006: 87-94 - 2005
- [j2]Thomas A. Alspaugh, Debra J. Richardson, Thomas A. Standish:
Scenarios, state machines and purpose-driven testing. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [j1]Lihua Xu, Hadar Ziv, Debra J. Richardson, Thomas A. Alspaugh:
An architectural pattern for non-functional dependability requirements. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-6 (2005) - [c6]Lihua Xu, Hadar Ziv, Debra J. Richardson, Thomas A. Alspaugh:
An architectural pattern for non-functional dependability requirements. WADS@ICSE 2005: 4:1-4:6 - [c5]Leila Naslavsky, Thomas A. Alspaugh, Debra J. Richardson, Hadar Ziv:
Using scenarios to support traceability. TEFSE@ASE 2005: 25-30 - 2003
- [c4]William H. Stufflebeam, Annie I. Antón, Thomas A. Alspaugh:
SMaRT - Scenario Management and Requirements Tool. RE 2003: 351 - [c3]Thomas A. Alspaugh, Annie I. Antón:
Contrasting Use Case, Goal, and Scenario Analysis of the Euronet System. RE 2003: 355-356 - 2001
- [c2]Annie I. Antón, Julia Brande Earp, Thomas A. Alspaugh, Colin Potts:
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering. RE 2001: 138-145
1990 – 1999
- 1999
- [c1]Thomas A. Alspaugh, Annie I. Antón, Tiffany Barnes, Bradford W. Mott:
An Integrated Scenario Management Strategy. RE 1999: 142-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 18:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint