


default search action
Search dblp for Publications
export results for "toc:db/journals/csimq/csimq3.bht:"
@article{DBLP:journals/csimq/FleischmannSS15, author = {Albert Fleischmann and Werner Schmidt and Christian Stary}, title = {Dynamic Socio-technical System Design based on Stakeholder Interaction}, journal = {Complex Syst. Informatics Model. Q.}, volume = {3}, pages = {63--83}, year = {2015}, url = {https://doi.org/10.7250/csimq.2015-3.04}, doi = {10.7250/CSIMQ.2015-3.04}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csimq/FleischmannSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csimq/Forbrig15, author = {Peter Forbrig}, title = {Selected Topics on Requirements Engineering: Editorial Introduction to the Issue 3 of {CSIMQ}}, journal = {Complex Syst. Informatics Model. Q.}, volume = {3}, pages = {I--II}, year = {2015}, url = {https://doi.org/10.7250/csimq.2015-3.00}, doi = {10.7250/CSIMQ.2015-3.00}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csimq/Forbrig15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csimq/MatuleviciusL15, author = {Raimundas Matulevicius and Henri Lakk}, title = {A Model-driven Role-based Access Control for {SQL} Databases}, journal = {Complex Syst. Informatics Model. Q.}, volume = {3}, pages = {35--62}, year = {2015}, url = {https://doi.org/10.7250/csimq.2015-3.03}, doi = {10.7250/CSIMQ.2015-3.03}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csimq/MatuleviciusL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csimq/Oemig15, author = {Christoph Oemig}, title = {When Analysts turn into Boxers: An Introduction to Pre-Sales Requirements Engineering}, journal = {Complex Syst. Informatics Model. Q.}, volume = {3}, pages = {1--14}, year = {2015}, url = {https://doi.org/10.7250/csimq.2015-3.01}, doi = {10.7250/CSIMQ.2015-3.01}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csimq/Oemig15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csimq/SchmittL15, author = {Christian Schmitt and Peter Liggesmeyer}, title = {Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources}, journal = {Complex Syst. Informatics Model. Q.}, volume = {3}, pages = {15--34}, year = {2015}, url = {https://doi.org/10.7250/csimq.2015-3.02}, doi = {10.7250/CSIMQ.2015-3.02}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csimq/SchmittL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csimq/SupulnieceG15, author = {Inese Supulniece and Janis Grabis}, title = {Conceptual Model of User Adaptive Enterprise Application}, journal = {Complex Syst. Informatics Model. Q.}, volume = {3}, pages = {84--96}, year = {2015}, url = {https://doi.org/10.7250/csimq.2015-3.05}, doi = {10.7250/CSIMQ.2015-3.05}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csimq/SupulnieceG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.