default search action
Guttorm Sindre
Person information
- affiliation: Norwegian University of Science and Technology, Trondheim, Norway
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j32]Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Guttorm Sindre:
Influencing the security prioritisation of an agile software development project. Comput. Secur. 118: 102744 (2022) - [j31]Per Håkon Meland, Dag Atle Nesheim, Karin Bernsmed, Guttorm Sindre:
Assessing cyber threats for storyless systems. J. Inf. Secur. Appl. 64: 103050 (2022) - [j30]Madeleine Lorås, Guttorm Sindre, Hallvard Trætteberg, Trond Aalberg:
Study Behavior in Computing Education - A Systematic Literature Review. ACM Trans. Comput. Educ. 22(1): 9:1-9:40 (2022) - [c81]Guttorm Sindre, Børge Haugset:
Techniques for detecting and deterring cheating in home exams in programming. FIE 2022: 1-8 - 2021
- [j29]Aparna Chirumamilla, Guttorm Sindre:
E-exams in Norwegian higher education: Vendors and managers views on requirements in a digital ecosystem perspective. Comput. Educ. 172: 104263 (2021) - 2020
- [j28]Per Håkon Meland, Yara Fareed Fahmy Bayoumy, Guttorm Sindre:
The Ransomware-as-a-Service economy within the darknet. Comput. Secur. 92: 101762 (2020) - [c80]Guttorm Sindre:
Code Writing vs Code Completion Puzzles: Analyzing Questions in an E-exam. FIE 2020: 1-9 - [c79]Kristian Haga, Per Håkon Meland, Guttorm Sindre:
Breaking the Cyber Kill Chain by Modelling Resource Costs. GraMSec@CSF 2020: 111-126 - [e4]Michail N. Giannakos, Guttorm Sindre, Andrew Luxton-Reilly, Monica Divitini:
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2020, Trondheim, Norway, June 15-19, 2020. ACM 2020, ISBN 978-1-4503-6874-2 [contents] - [e3]Michail N. Giannakos, Guttorm Sindre, Andrew Luxton-Reilly, Monica Divitini:
Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education, ITiCSE-WGR 2020, Trondheim, Norway, June 15-19, 2020. ACM 2020, ISBN 978-1-4503-8293-9 [contents]
2010 – 2019
- 2019
- [j27]Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre:
An experimental evaluation of bow-tie analysis for security. Inf. Comput. Secur. 27(4) (2019) - [j26]Alfredo Perez Fernandez, Guttorm Sindre:
Mitigating the Impact on Users' Privacy Caused by over Specifications in the Design of IoT Applications. Sensors 19(19): 4318 (2019) - [c78]Alfredo Pérez Fernández, Guttorm Sindre:
Software Assisted Privacy Impact Assessment in Interactive Ubiquitous Computing Systems. I3E Workshops 2019: 60-71 - [c77]Aparna Chirumamilla, Guttorm Sindre:
E-Assessment in Programming Courses: Towards a Digital Ecosystem Supporting Diverse Needs? I3E 2019: 585-596 - [c76]Per Håkon Meland, Bent Heier Johansen, Guttorm Sindre:
An Experimental Analysis of Cryptojacking Attacks. NordSec 2019: 155-170 - 2018
- [j25]Alfredo Perez Fernandez, Guttorm Sindre:
The privacy aware transmission highway framework. Int. J. Inf. Priv. Secur. Integr. 3(4): 327-350 (2018) - [j24]Aparna Vegendla, Anh Nguyen-Duc, Shang Gao, Guttorm Sindre:
A Systematic Mapping Study on Requirements Engineering in Software Ecosystems. J. Inf. Technol. Res. 11(1): 49-69 (2018) - [c75]Yara Fareed Fahmy Bayoumy, Per Håkon Meland, Guttorm Sindre:
A Netnographic Study on the Dark Net Ecosystem for Ransomware. CyberSA 2018: 1-8 - [c74]Per Håkon Meland, Karin Bernsmed, Christian Frøystad, Jingyue Li, Guttorm Sindre:
An Experimental Evaluation of Bow-Tie Analysis for Cybersecurity Requirements. CyberICPS/SECPRE@ESORICS 2018: 173-191 - [i1]Aparna Vegendla, Anh Nguyen-Duc, Shang Gao, Guttorm Sindre:
A Systematic Mapping Study on Requirements Engineering in Software Ecosystems. CoRR abs/1801.00250 (2018) - 2017
- [c73]Michail N. Giannakos, Trond Aalberg, Monica Divitini, Letizia Jaccheri, Patrick Mikalef, Ilias O. Pappas, Guttorm Sindre:
Identifying dropout factors in information technology education: A case study. EDUCON 2017: 1187-1194 - 2016
- [j23]Anca Deak, Tor Stålhane, Guttorm Sindre:
Challenges and strategies for motivating software testing personnel. Inf. Softw. Technol. 73: 1-15 (2016) - [c72]Aparna Vegendla, Thea Marie Søgaard, Guttorm Sindre:
Extending HARM to make Test Cases for Penetration Testing. CAiSE Workshops 2016: 254-265 - [c71]Sundar Gopalakrishnan, Guttorm Sindre:
Use Case Diagrams for Mobile and Multi-channel Information Systems: Experimental Comparison of Colour and Icon Annotations. BMMDS/EMMSAD 2016: 479-493 - [c70]Sundar Gopalakrishnan, Guttorm Sindre:
Activity diagrams with location context: Experimental comparison of colour and icon annotations. ISD 2016 - [c69]Ilias O. Pappas, Trond Aalberg, Michail N. Giannakos, Letizia Jaccheri, Patrick Mikalef, Guttorm Sindre:
Gender Differences in Computer Science Education: Lessons Learnt from an Empirical Study at NTNU. NIK 2016 - 2015
- [j22]Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre:
Investigating security threats in architectural context: Experimental evaluations of misuse case maps. J. Syst. Softw. 104: 90-111 (2015) - [j21]Mohamed El-Attar, Hamza Luqman, Péter Kárpáti, Guttorm Sindre, Andreas L. Opdahl:
Extending the UML Statecharts Notation to Model Security Aspects. IEEE Trans. Software Eng. 41(7): 661-690 (2015) - [c68]Guttorm Sindre, Aparna Vegendla:
E-exams and exam process improvement. NIK 2015 - 2014
- [j20]Tor Stålhane, Guttorm Sindre:
An Experimental Comparison of System Diagrams and Textual Use Cases for the Identification of Safety Hazards. Int. J. Inf. Syst. Model. Des. 5(1): 1-24 (2014) - [j19]Péter Kárpáti, Yonathan Redda, Andreas L. Opdahl, Guttorm Sindre:
Comparing attack trees and misuse cases in an industrial setting. Inf. Softw. Technol. 56(3): 294-308 (2014) - [c67]Guttorm Sindre:
Et informatikkperspektiv på norsk lovgivning om karakterklager i høyere utdanning. NIK 2014 - 2013
- [j18]Olawande J. Daramola, Guttorm Sindre, Thomas Moser:
A Tool-based Semantic Framework for Security Requirements Specification. J. Univers. Comput. Sci. 19(13): 1940-1962 (2013) - [c66]Guttorm Sindre, John Krogstie, Sundar Gopalakrishnan:
Visually Capturing Usage Context in BPMN by Small Adaptations of Diagram Notation. BMMDS/EMMSAD 2013: 324-338 - [p4]John Krogstie, Odd Ivar Lindland, Guttorm Sindre:
Towards a Deeper Understanding of Quality in Requirements Engineering. Seminal Contributions to Information Systems Engineering 2013: 89-102 - [p3]John Krogstie, Guttorm Sindre, Odd Ivar Lindland:
20 Years of Quality of Models. Seminal Contributions to Information Systems Engineering 2013: 103-107 - [p2]Olawande J. Daramola, Tor Stålhane, Inah Omoronyia, Guttorm Sindre:
Using Ontologies and Machine Learning for Hazard Identification and Safety Analysis. Managing Requirements Knowledge 2013: 117-141 - 2012
- [j17]Sundar Gopalakrishnan, John Krogstie, Guttorm Sindre:
Capturing Location in Process Models: Comparing Small Adaptations of Mainstream Notation. Int. J. Inf. Syst. Model. Des. 3(3): 24-45 (2012) - [j16]Péter Kárpáti, Guttorm Sindre, Raimundas Matulevicius:
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks. Int. J. Secur. Softw. Eng. 3(2): 54-73 (2012) - [c65]Tor Stålhane, Guttorm Sindre:
Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases. BMMDS/EMMSAD 2012: 378-392 - [c64]Olawande J. Daramola, Guttorm Sindre, Thomas Moser:
Ontology-Based Support for Security Requirements Specification Process. OTM Workshops 2012: 194-206 - [c63]Olawande J. Daramola, Yushan Pan, Péter Kárpáti, Guttorm Sindre:
A comparative review of i∗-based and use case-based security modelling initiatives. RCIS 2012: 1-12 - [c62]Olawande J. Daramola, Guttorm Sindre, Tor Stålhane:
Pattern-based security requirements specification using ontologies and boilerplates. RePa 2012: 54-59 - [c61]Mohammad Jabed Morshed Chowdhury, Raimundas Matulevicius, Guttorm Sindre, Péter Kárpáti:
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions. REFSQ 2012: 132-139 - [c60]Olawande J. Daramola, Thomas Moser, Guttorm Sindre, Stefan Biffl:
Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview. REFSQ 2012: 172-178 - 2011
- [j15]Inah Omoronyia, Guttorm Sindre, Tor Stålhane:
Exploring a Bayesian and linear approach to requirements traceability. Inf. Softw. Technol. 53(8): 851-871 (2011) - [c59]Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre:
Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations. ARES 2011: 507-514 - [c58]Péter Kárpáti, Guttorm Sindre, Andreas L. Opdahl:
Characterising and Analysing Security Requirements Modelling Initiatives. ARES 2011: 710-715 - [c57]Sundar Gopalakrishnan, John Krogstie, Guttorm Sindre:
Adapted UML Activity Diagrams for Mobile Work Processes: Experimental Comparison of Colour and Pattern Fills. BMMDS/EMMSAD 2011: 314-331 - [c56]Sundar Gopalakrishnan, Guttorm Sindre:
Diagram Notations for Mobile Work Processes. PoEM 2011: 52-66 - [c55]Feng Luan, Mads Nygård, Guttorm Sindre, Trond Aalberg:
Using a multi-criteria decision making approach to evaluate format migration solutions. MEDES 2011: 48-52 - [c54]Olawande J. Daramola, Tor Stålhane, Guttorm Sindre, Inah Omoronyia:
Enabling hazard identification from requirements and reuse-oriented HAZOP analysis. MARK@RE 2011: 3-11 - [p1]Inah Omoronyia, Guttorm Sindre, Stefan Biffl, Tor Stålhane:
Understanding Architectural Elements from Requirements Traceability Networks. Relating Software Requirements and Architectures 2011: 61-83 - 2010
- [c53]Tor Stålhane, Guttorm Sindre, Lydie du Bousquet:
Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases. CAiSE 2010: 165-179 - [c52]Péter Kárpáti, Guttorm Sindre, Andreas L. Opdahl:
Towards a Hacker Attack Representation Method. ICSOFT (2) 2010: 92-101 - [c51]Péter Kárpáti, Andreas L. Opdahl, Guttorm Sindre:
HARM: Hacker Attack Representation Method. ICSOFT (Selected Papers) 2010: 156-175 - [c50]Sundar Gopalakrishnan, Guttorm Sindre:
Alternative Process Notations for Mobile Information Systems. I-ESA 2010: 13-23 - [c49]Vikash Katta, Péter Kárpáti, Andreas L. Opdahl, Christian Raspotnig, Guttorm Sindre:
Comparing Two Techniques for Intrusion Visualization. PoEM 2010: 1-15 - [c48]Sundar Gopalakrishnan, John Krogstie, Guttorm Sindre:
Adapting UML Activity Diagrams for Mobile Work Process Modelling: Experimental Comparison of Two Notation Alternatives. PoEM 2010: 145-161 - [c47]Inah Omoronyia, Guttorm Sindre, Tor Stålhane, Stefan Biffl, Thomas Moser, Wikan Danar Sunindyo:
A Domain Ontology Building Process for Guiding Requirements Elicitation. REFSQ 2010: 188-202 - [c46]Péter Kárpáti, Guttorm Sindre, Andreas L. Opdahl:
Visualizing Cyber Attacks with Misuse Case Maps. REFSQ 2010: 262-275
2000 – 2009
- 2009
- [j14]Lasse Natvig, Guttorm Sindre, Asbjørn Djupdal:
A compulsory yet motivating question/answer game to teach computer fundamentals. Comput. Appl. Eng. Educ. 17(2): 167-179 (2009) - [j13]Terje Wahl, Guttorm Sindre:
A Survey of Development Methods for Semantic Web Service Systems. Int. J. Inf. Syst. Serv. Sect. 1(2): 1-16 (2009) - [j12]Andreas L. Opdahl, Guttorm Sindre:
Experimental comparison of attack trees and misuse cases for security threat identification. Inf. Softw. Technol. 51(5): 916-932 (2009) - [j11]Martin Glinz, Patrick Heymans, Anne Persson, Guttorm Sindre, Aybüke Aurum, Nazim H. Madhavji, Barbara Paech, Gil Regev, Roel J. Wieringa:
Report on the working conference on requirements engineering: foundation for software quality (REFSQ'09). ACM SIGSOFT Softw. Eng. Notes 34(5): 40-45 (2009) - [j10]Guttorm Sindre, Lasse Natvig, Magnus Jahre:
Experimental Validation of the Learning Effect for a Pedagogical Game on Computer Fundamentals. IEEE Trans. Educ. 52(1): 10-18 (2009) - [c45]Sattanathan Subramanian, Guttorm Sindre:
Improving the Performance of ActiveXML Workflows: The Formal Descriptions. IEEE SCC 2009: 308-315 - [c44]Sundar Gopalakrishnan, Guttorm Sindre:
A revised taxonomy of mobility-related requirements. ICUMT 2009: 1-7 - [c43]Sattanathan Subramanian, Guttorm Sindre:
An Optimization Rule for ActiveXML Workflows. ICWE 2009: 410-418 - [c42]Sundar Gopalakrishnan, Guttorm Sindre:
Taxonomy of Mobility-Related Requirements. IESA 2009: 283-288 - [c41]Sattanathan Subramanian, Djamel Djenouri, Guttorm Sindre, Ilangko Balasingham:
CoP4V : Context-Based Protocol for Vehicle's Safety in Highways Using Wireless Sensor Networks. ITNG 2009: 613-618 - [c40]Sattanathan Subramanian, Guttorm Sindre:
Argumentative agents to handle the conflicts between web services: a prototype. MEDES 2009: 442-445 - [c39]Inah Omoronyia, Guttorm Sindre, Marc Roper, John D. Ferguson, Murray Wood:
Use Case to Source Code Traceability: The Developer Navigation View Point. RE 2009: 237-242 - 2008
- [c38]Tor Stålhane, Guttorm Sindre:
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. MoDELS 2008: 721-735 - 2007
- [j9]John Krogstie, Csaba Veres, Guttorm Sindre:
Integrating Semantic Web Technology, Web Services, and Workflow Modeling: Achieving System and Business Interoperability. Int. J. Enterp. Inf. Syst. 3(1): 22-41 (2007) - [c37]Johann Eder, Stein L. Tomassen, Andreas L. Opdahl, Guttorm Sindre:
Preface. CAiSE Forum 2007 - [c36]Tor Stålhane, Guttorm Sindre:
A Comparison of Two Approaches to Safety Analysis Based on Use Cases. ER 2007: 423-437 - [c35]Guttorm Sindre:
A Look at Misuse Cases for Safety Concerns. Situational Method Engineering 2007: 252-266 - [c34]Letizia Jaccheri, Guttorm Sindre:
Software Engineering Students meet Interdisciplinary Project work and Art. IV 2007: 925-934 - [c33]Guttorm Sindre:
Mal-Activity Diagrams for Capturing Attacks on Business Processes. REFSQ 2007: 355-366 - [c32]Rose-Mharie Åhlfeldt, Paolo Spagnoletti, Guttorm Sindre:
Improving the Information Security Model by using TFI. SEC 2007: 73-84 - [e2]Johann Eder, Stein L. Tomassen, Andreas L. Opdahl, Guttorm Sindre:
CAiSE'07 Forum, Proceedings of the CAiSE'07 Forum at the 19th International Conference on Advanced Information Systems Engineering, Trondheim, Norway, 11-15 June 2007. CEUR Workshop Proceedings 247, CEUR-WS.org 2007 [contents] - [e1]John Krogstie, Andreas L. Opdahl, Guttorm Sindre:
Advanced Information Systems Engineering, 19th International Conference, CAiSE 2007, Trondheim, Norway, June 11-15, 2007, Proceedings. Lecture Notes in Computer Science 4495, Springer 2007, ISBN 978-3-540-72987-7 [contents] - 2006
- [j8]John Krogstie, Guttorm Sindre, Håvard D. Jørgensen:
Process models representing knowledge for action: a revised quality framework. Eur. J. Inf. Syst. 15(1): 91-102 (2006) - 2005
- [j7]Guttorm Sindre, Andreas L. Opdahl:
Eliciting security requirements with misuse cases. Requir. Eng. 10(1): 34-44 (2005) - [c31]Guttorm Sindre:
Teaching Oral Communication Techniques in RE by Student-Student Role Play: Initial Experiences. CSEE&T 2005: 85-92 - [c30]Terje Wahl, Guttorm Sindre:
An Analytical Evaluation of BPMN Using a Semiotic Quality Framework. EMMSAD 2005: 147-158 - [c29]Raimundas Matulevicius, Guttorm Sindre:
Tool Support and Specification Quality: Experimental Validation of an RE-Tool Evaluation Framework. ER (Workshops) 2005: 433-443 - 2004
- [c28]Sari Hakkarainen, Raimundas Matulevicius, Darijus Strasunskas, Xiaomeng Su, Guttorm Sindre:
A Step Towards Context Insensitive Quality Control for Ontology Building Methodologies. CAiSE Workshops (3) 2004: 205-216 - [c27]Sari Hakkarainen, Arne Sølvberg, Terje Brasethvik, Yun Lin, Jennifer Sampson, Guttorm Sindre, Darijus Strasunskas, Xiaomeng Su, Csaba Veres:
COEUR-SW: Concepts On Enriching, Understanding and Retrieving the Semantics on the web. CAiSE Workshops (3) 2004: 333-336 - 2003
- [j6]Guttorm Sindre, Daniel L. Moody, Terje Brasethvik, Arne Sølvberg:
Introducing Peer Review in an IS Analysis Course. J. Inf. Syst. Educ. 14(1): 101-119 (2003) - [c26]Daniel L. Moody, Guttorm Sindre:
Managing Complexity in Object Oriented Analysis: Adapting UML for Modelling Large Scale Information Systems. ACIS 2003 - [c25]Guttorm Sindre, Tor Stålhane, Gunnar Brataas, Reidar Conradi:
The Cross-Course Software Engineering Project at the NTNU: Four Years of Experience. CSEE&T 2003: 251- - [c24]Daniel L. Moody, Guttorm Sindre:
Evaluating the effectiveness of learning interventions: an information systems case study. ECIS 2003: 1311-1326 - [c23]Daniel L. Moody, Guttorm Sindre, Terje Brasethvik, Arne Sølvberg:
Evaluating the Quality of Information Models: Empirical Testing of a Conceptual Model Quality Framework. ICSE 2003: 295-307 - [c22]Guttorm Sindre, Steinar Line, Ottar V. Valvâg:
Positive Experiences with an Open Project Assignment in an Introductory Programming Course. ICSE 2003: 608-613 - [c21]Daniel L. Moody, Guttorm Sindre:
Incorporating quality assurance processes into requirements analysis education. ITiCSE 2003: 74-78 - 2002
- [c20]Daniel L. Moody, Guttorm Sindre, Terje Brasethvik, Arne Sølvberg:
Evaluating the Quality of Process Models: Empirical Testing of a Quality Framework. ER 2002: 380-396 - 2000
- [c19]Guttorm Sindre, Andreas L. Opdahl:
Eliciting Security Requirements by Misuse Cases. TOOLS (37) 2000: 120-131
1990 – 1999
- 1997
- [j5]Andreas L. Opdahl, Guttorm Sindre:
Facet Modelling: An Approach to Flexible and Integrated Conceptual Modelling. Inf. Syst. 22(5): 291-323 (1997) - 1996
- [j4]John Krogstie, Guttorm Sindre:
Utilizing Deonetic Operators in Information Systems Specification. Requir. Eng. 1(4): 210-237 (1996) - [c18]Andreas L. Opdahl, Guttorm Sindre:
Towards an Integrated, Simulative Framework for Real-World Modelling. HICSS (3) 1996: 515-524 - 1995
- [j3]Guttorm Sindre, Reidar Conradi, Even-André Karlsson:
The REBOOT approach to software reuse. J. Syst. Softw. 30(3): 201-212 (1995) - [c17]Andreas L. Opdahl, Guttorm Sindre:
Facet Models for Problem Analysis. CAiSE 1995: 54-67 - [c16]John Krogstie, Odd Ivar Lindland, Guttorm Sindre:
Towards a Deeper Understanding of Quality in Requirements Engineering. CAiSE 1995: 82-95 - [c15]Andreas L. Opdahl, Guttorm Sindre:
Representing real-world processes. HICSS (4) 1995: 821-830 - [c14]John Krogstie, Odd Ivar Lindland, Guttorm Sindre:
Defining quality aspects for conceptual models. ISCO 1995: 216-231 - 1994
- [j2]Andreas L. Opdahl, Guttorm Sindre:
A Taxonomy for Real-World Modelling Concepts. Inf. Syst. 19(3): 229-241 (1994) - [j1]Odd Ivar Lindland, Guttorm Sindre, Arne Sølvberg:
Understanding Quality in Conceptual Modeling. IEEE Softw. 11(2): 42-49 (1994) - [c13]Rudolf Andersen, Reidar Conradi, John Krogstie, Guttorm Sindre, Arne Sølvberg:
Project Courses at the NTH: 20 Years of Experience. CSEE 1994: 177-188 - [c12]Reidar Conradi, Geir Magne Høydalsvik, Guttorm Sindre:
A Comparison of Modelling Frameworks for Software Processes and Information Systems. EWSPT 1994: 254-260 - [c11]John Krogstie, Guttorm Sindre:
Extending a temporal rule language with deontic operators. SEKE 1994: 314-321 - 1993
- [c10]Andreas L. Opdahl, Guttorm Sindre:
Concepts for Real-World Modelling. CAiSE 1993: 309-327 - [c9]Guttorm Sindre, Even-André Karlsson, Tor Stålhane:
A Method for Software Reuse Through Large Component Libraries. ICCI 1993: 464-468 - [c8]Lars Sivert Sørumgård, Guttorm Sindre, Frode Stokke:
Experiences from application of a faceted classification scheme. IWSR 1993: 116-124 - [c7]Andreas L. Opdahl, Guttorm Sindre, Vidar Vetland:
Performance considerations in object-oriented reuse. IWSR 1993: 142-151 - [c6]Rolf Lunheim, Guttorm Sindre:
Privacy and Computing: a Cultural Perspective. Security and Control of Information Technology in Society 1993: 25-40 - [c5]Geir Magne Høydalsvik, Guttorm Sindre:
On the Purpose of Object-Oriented Analysis. OOPSLA 1993: 240-255 - [c4]Guttorm Sindre:
Terminology Evolution in Component Libraries. Terminology and Knowledge Engineering 1993: 384-392 - [c3]Guttorm Sindre, Bjørn Gulla, Håkon G. Jokstad:
Onion graphs: aesthetics and layout. VL 1993: 287-291 - 1992
- [c2]Tor Stålhane, Even-André Karlsson, Guttorm Sindre:
Software Reuse in an Educational Perspective. CSEE 1992: 99-114 - [c1]Guttorm Sindre, Even-André Karlsson, Patricia Paul:
Heuristics for Maintaining Term Structures for Relaxes Search. DEXA 1992: 20-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint