The following publications are possibly variants of this publication:
- Combining STPA and BDD for Safety Analysis and Verification in Agile Development: A Controlled ExperimentYang Wang, Stefan Wagner 0001. xpu 2018: 37-53 [doi]
- Combining STPA and BDD for safety analysis and verification in agile developmentYang Wang, Stefan Wagner 0001. ICSE 2018: 286-287 [doi]
- Software de-pipelining techniqueBogong Su, Jian Wang, Erh-Wen Hu, Manzano, J.. In Source Code Analysis and Manipulation, 2004. Fourth IEEE International Workshop on. 2004: [doi]
- A Role and Context Based Access Control Model with UMLYubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu;. Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]
- A Role and Context Based Access Control Model with UMLYubin Bao, Jie Song, Daling Wang, Derong Shen, Ge Yu;. Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, , Oct 2008. [doi]