default search action
Raymond J. A. Buhr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
1990 – 1999
- 1999
- [c25]Raymond J. A. Buhr:
Making Behaviour a Concrete Architectural Concept. HICSS 1999 - [c24]Daniel Amyot, Luigi Logrippo, Raymond J. A. Buhr, Tom Gray:
Use Case Maps for the Capture and Validation of Distributed Systems Requirements. RE 1999: 44- - 1998
- [j8]Raymond J. A. Buhr:
Use Case Maps as Architectural Entities for Complex Systems. IEEE Trans. Software Eng. 24(12): 1131-1155 (1998) - [c23]Raymond J. A. Buhr, Daniel Amyot, Mohamed Elammari, Darcy Quesnel, Tom Gray, Serge Mankovski:
Feature-Interaction Visualisation and Resolution in an Agent Environment. FIW 1998: 135-149 - [c22]Raymond J. A. Buhr, Mohamed Elammari, Tom Gray, Serge Mankovski:
Applying Use Case Maps to Multi-Agent Systems: A Feature Interaction Example. HICSS (6) 1998: 171-179 - [c21]Raymond J. A. Buhr, Mohamed Elammari, Tom Gray, Serge Mankovski:
A High Level Visual Notation for Understanding and Designing Collaborative, Adaptive Behavior in Multiagent Systems. HICSS (6) 1998: 180- - [c20]Raymond J. A. Buhr, Daniel Amyot, Mohamed Elammari, Darcy Quesnel, Tom Gray, Serge Mankovski:
High Level, Multi-Agent Prototypes from a Scenario-Path Notation: A Feature-Interaction Example. PAAM 1998: 277-296 - 1997
- [c19]Francis Bordeleau, Raymond J. A. Buhr:
UCM-ROOM modelling: from use case maps to communicating state machines. ECBS 1997: 169- - [c18]Raymond J. A. Buhr, Alex Hubbard:
Use Case Maps for Engineering Real Time and Distributed Computer. HICSS (5) 1997: 218-229 - [c17]Raymond J. A. Buhr, Mohamed Elammari, Tom Gray, Debbie Pinard, Serge Mankovski:
Understanding and Defining the Behaviour of Systems of Agents with Use-Case Maps. PAAM 1997: 527-528 - 1996
- [c16]Raymond J. A. Buhr:
Understanding Large-Scale Behavior Patterns in Complex systems. ICECCS 1996: 143-146 - 1995
- [c15]Daniel Amyot, Francis Bordeleau, Raymond J. A. Buhr, Luigi Logrippo:
Formal Support for Design Techniques: A Timethreads-LOTOS Approach. FORTE 1995: 57-72 - 1994
- [c14]Raymond J. A. Buhr, Ronald S. Casselman:
Timethread-Role Maps for Object-Oriented Design of Real-Time-and-Distributed Systems. OOPSLA 1994: 301-316 - [c13]Raymond J. A. Buhr, Gerald M. Karam, C. Murray Woodside, Ronald S. Casselman, Greg Franks, H. Scott, D. Bailey:
TimeBench: a CAD tool for real-time system design. SETA 1994: 3-15 - 1993
- [j7]Raymond J. A. Buhr:
Pictures that Play: Design Notations for Real-time and Distributed Systems. Softw. Pract. Exp. 23(8): 895-931 (1993) - 1992
- [c12]Raymond J. A. Buhr, Ronald S. Casselman:
Architectures with Pictures. OOPSLA 1992: 466-483 - 1991
- [j6]Gerald M. Karam, Raymond J. A. Buhr:
Temporal Logic-Based Deadlock Analysis For Ada. IEEE Trans. Software Eng. 17(10): 1109-1125 (1991) - [c11]Jonah Z. Lavi, Ashok K. Agrawala, Raymond J. A. Buhr, Ken Jackson, Michael Jackson, Bernard Lang:
Computer Based Systems Engineering Workshop. CSEE 1991: 149-163 - [c10]Mark Vigder, Raymond J. A. Buhr:
Using LOTOS in a Design Environment. FORTE 1991: 1-15 - 1990
- [j5]Gerald M. Karam, Raymond J. A. Buhr:
Starvation and Critical Race Analyzers for Ada. IEEE Trans. Software Eng. 16(8): 829-843 (1990) - [c9]Raymond J. A. Buhr, Gerald M. Karam, Ronald S. Casselman:
Support for specifying temporal behavior in Ada designs. SETA 1990: 91-101 - [c8]C. Murray Woodside, Elias M. Hagos, E. Neron, Raymond J. A. Buhr:
The CAEDE performance analysis tool. SETA 1990: 125-136
1980 – 1989
- 1989
- [j4]Raymond J. A. Buhr, Gerald M. Karam, Carol J. Hayes, C. Murray Woodside:
Software CAD: A Revolutionary Approach. IEEE Trans. Software Eng. 15(3): 235-249 (1989) - 1987
- [c7]Gerald M. Karam, Raymond J. A. Buhr:
Experience with the automatic temporal analysis of multitasking Ada designs. SIGAda 1987: 36-44 - 1985
- [j3]Emil F. Girczyc, Raymond J. A. Buhr, John P. Knight:
Applicability of a Subset of Ada as an Algorithmic Hardware Description Language for Graph-Based Hardware Compilation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 4(2): 134-142 (1985) - [c6]Raymond J. A. Buhr, C. Murray Woodside, Gerald M. Karam, K. Van Der Loo, D. G. Lewis:
Experiments with Prolog Design Descriptions and Tools in CAEDE: An Iconic Design Environment for Multitasking, Embdedded Systems. ICSE 1985: 62-67 - [c5]Raymond J. A. Buhr, Gerald M. Karam, C. Murray Woodside:
An overview and example of application of CAEDE: a new, experimental design environment for Ada. SIGAda 1985: 173-184 - [c4]Raymond J. A. Buhr:
Lessons from practical experience teaching hands-on, real-time, embedded system programming with Ada. SIGAda 1985: 210-216 - 1984
- [j2]C. Murray Woodside, J. R. Montealegre, Raymond J. A. Buhr:
A performance model for hardware/software issues in computer-aided design of protocol systems. Comput. Commun. Rev. 14(2): 132-139 (1984) - 1983
- [c3]Raymond J. A. Buhr, D. A. MacKinnon:
Evolving Toward Open System Interconnection. INFOCOM 1983: 491-498 - 1982
- [c2]Raymond J. A. Buhr, S. Michell:
Object-Oriented Structured Design of Layered Protocol Systems. ICDCS 1982: 288-293 - [c1]Raymond J. A. Buhr, D. A. MacKinnon:
MAILROOM: A computer-based message system model for person-to-person and process-to-process communication. ICDCS 1982: 818-823
1970 – 1979
- 1977
- [j1]D. A. Thomas, Bernard Pagurek, Raymond J. A. Buhr:
Validation Algorithms for Pointer Values in DBTG DataBases. ACM Trans. Database Syst. 2(4): 352-369 (1977)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint