default search action
Sven Wenzel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c17]Markus Spiekermann, Sven Wenzel, Boris Otto:
A Conceptual Model of Benchmarking Data and its Implications for Data Mapping in the Data Economy. MKWI 2018: 314-324 - [c16]Markus Spiekermann, Daniel Tebernum, Sven Wenzel, Boris Otto:
A Metadata Model for Data Goods. MKWI 2018: 325-337 - 2016
- [c15]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Umlchange - specifying model changes to support security verification of potential evolution. Software Engineering 2016: 91-92 - 2015
- [j8]Jens Bürger, Jan Jürjens, Sven Wenzel:
Restoring security of evolving software models using graph transformation. Int. J. Softw. Tools Technol. Transf. 17(3): 267-289 (2015) - 2014
- [j7]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Specifying model changes with UMLchange to support security verification of potential evolution. Comput. Stand. Interfaces 36(4): 776-791 (2014) - [j6]Sven Wenzel:
Unique identification of elements in evolving software models. Softw. Syst. Model. 13(2): 679-711 (2014) - 2013
- [c14]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Using Ontologies to Analyze Compliance Requirements of Cloud-Based Processes. CLOSER (Selected Papers) 2013: 36-51 - [c13]Thorsten Humberg, Christian Wessel, Daniel Poggenpohl, Sven Wenzel, Thomas Ruhroth, Jan Jürjens:
Ontology-based Analysis of Compliance and Regulatory Requirements of Business Processes. CLOSER 2013: 553-561 - 2012
- [j5]Sven Wenzel:
Why Isn't Model Analysis Integrated with Versioning? Softwaretechnik-Trends 32(4) (2012) - [c12]Pit Pietsch, Sven Wenzel:
Comparison of BPMN2 Diagrams. BPMN 2012: 83-97 - [c11]Sven Wenzel, Christian Wessel, Thorsten Humberg, Jan Jürjens:
Securing Processes for Outsourcing into the Cloud. CLOSER 2012: 675-680 - [c10]Christian Wessel, Thorsten Humberg, Sven Wenzel, Jan Jürjens:
Frühzeitige modellbasierte Risikoanalyse für mobile, verteilte Anwendungen. Software Engineering (Workshops) 2012: 175-181 - 2011
- [c9]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, Jan Tobias Mühlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel:
Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143 - 2010
- [b1]Sven Wenzel:
Unique identification of elements in evolving models : towards fine-grained traceability in model-driven engineering. University of Siegen, 2010
2000 – 2009
- 2009
- [c8]Maik Schmidt, Sven Wenzel, Timo Kehrer, Udo Kelter:
History-based merging of models. CVSM@ICSE 2009: 13-18 - [c7]Sven Wenzel, Jens Koch, Udo Kelter, Andreas Kolb:
Evolution analysis with animated and 3D-visualizations. ICSM 2009: 475-478 - [c6]Maik Schmidt, Sven Wenzel, Udo Kelter:
Transaktionsorientiertes Mischen von Modellen. Software Engineering 2009: 165-170 - 2008
- [c5]Sven Wenzel:
Scalable visualization of model differences. CVSM@ICSE 2008: 41-46 - [c4]Sven Wenzel, Udo Kelter:
Analyzing model evolution. ICSE 2008: 831-834 - [c3]Udo Kelter, Maik Schmidt, Sven Wenzel:
Architekturen von Differenzwerkzeugen für Modelle. Software Engineering 2008: 155-168 - 2007
- [j4]Sven Wenzel:
How to Trace Model Elements? Softwaretechnik-Trends 27(2) (2007) - [j3]Sven Wenzel:
Informationsgewinnung aus Modellhistorien. Softwaretechnik-Trends 27(2) (2007) - [c2]Sven Wenzel, Hermann Hutter, Udo Kelter:
Tracing Model Elements. ICSM 2007: 104-113 - [c1]Christoph Treude, Stefan Berlik, Sven Wenzel, Udo Kelter:
Difference computation of large models. ESEC/SIGSOFT FSE 2007: 295-304 - 2006
- [j2]Sven Wenzel:
Bericht über die 13. Working Conference on Reverse Engineering, 23. - 27. Oktober 2006 in Benevento, Italien. Softwaretechnik-Trends 26(4) (2006) - 2005
- [j1]Sven Wenzel:
Automatic Detection of Incomplete Instances of Structural Patterns in UML Class Diagrams. Nord. J. Comput. 12(4): 361-378 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-31 01:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint