er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
This first edition of the workshop Model-driven Software Adaptation (M-ADAPT’07) took place in the Technische Universit¨at Berlin with the International Conference ECOOP’07 i...
: Many methods in the area of Human-Computer Interaction have been developed for deriving user interfaces considering individual users. However, nowadays information systems includ...
Abstract—With the availability of the off-the-shelf quadrocopter platforms, the implementation of autonomous unmanned aerial vehicle (UAV) has substantially been simplified. Suc...
Florian Mutter, Stefanie Gareis, Bernhard Schä...
: Changing business requirements such as providing new business services lead to an ongoing need for fast and flexible adaptation of the underlying information systems and infrastr...