Остановите войну!
for scientists:
default search action
Tor Stålhane
- > Home > Persons > Tor Stålhane
Publications
- 2016
- [j11]Anca Deak, Tor Stålhane, Guttorm Sindre:
Challenges and strategies for motivating software testing personnel. Inf. Softw. Technol. 73: 1-15 (2016) - 2014
- [j7]Tor Stålhane, Guttorm Sindre:
An Experimental Comparison of System Diagrams and Textual Use Cases for the Identification of Safety Hazards. Int. J. Inf. Syst. Model. Des. 5(1): 1-24 (2014) - 2013
- [p2]Olawande J. Daramola, Tor Stålhane, Inah Omoronyia, Guttorm Sindre:
Using Ontologies and Machine Learning for Hazard Identification and Safety Analysis. Managing Requirements Knowledge 2013: 117-141 - 2012
- [c48]Tor Stålhane, Guttorm Sindre:
Identifying Safety Hazards: An Experimental Comparison of System Diagrams and Textual Use Cases. BMMDS/EMMSAD 2012: 378-392 - [c46]Olawande J. Daramola, Guttorm Sindre, Tor Stålhane:
Pattern-based security requirements specification using ontologies and boilerplates. RePa 2012: 54-59 - 2011
- [j5]Inah Omoronyia, Guttorm Sindre, Tor Stålhane:
Exploring a Bayesian and linear approach to requirements traceability. Inf. Softw. Technol. 53(8): 851-871 (2011) - [c42]Olawande J. Daramola, Tor Stålhane, Guttorm Sindre, Inah Omoronyia:
Enabling hazard identification from requirements and reuse-oriented HAZOP analysis. MARK@RE 2011: 3-11 - [p1]Inah Omoronyia, Guttorm Sindre, Stefan Biffl, Tor Stålhane:
Understanding Architectural Elements from Requirements Traceability Networks. Relating Software Requirements and Architectures 2011: 61-83 - 2010
- [c41]Tor Stålhane, Guttorm Sindre, Lydie du Bousquet:
Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases. CAiSE 2010: 165-179 - [c38]Inah Omoronyia, Guttorm Sindre, Tor Stålhane, Stefan Biffl, Thomas Moser, Wikan Danar Sunindyo:
A Domain Ontology Building Process for Guiding Requirements Elicitation. REFSQ 2010: 188-202 - 2008
- [c37]Tor Stålhane, Guttorm Sindre:
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. MoDELS 2008: 721-735 - 2007
- [c34]Tor Stålhane, Guttorm Sindre:
A Comparison of Two Approaches to Safety Analysis Based on Use Cases. ER 2007: 423-437 - 2003
- [c12]Guttorm Sindre, Tor Stålhane, Gunnar Brataas, Reidar Conradi:
The Cross-Course Software Engineering Project at the NTNU: Four Years of Experience. CSEE&T 2003: 251- - 1993
- [c4]Guttorm Sindre, Even-André Karlsson, Tor Stålhane:
A Method for Software Reuse Through Large Component Libraries. ICCI 1993: 464-468 - 1992
- [c2]Tor Stålhane, Even-André Karlsson, Guttorm Sindre:
Software Reuse in an Educational Perspective. CSEE 1992: 99-114
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-23 23:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint