Author: Michael Jackson
Publication Overview
Publication period start: 1993
Number of co-authors: 21
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Hinchey,
Mike,
Jackson,
Michael,
Cousot,
Patrick,
Cook,
Byron,
Bowen,
Jonathan P.,
Margaria,
Tiziana
(2008):
Software engineering and formal methods.
In
Communications of the ACM,
51
(9)
pp. 54-59.
https://dl.acm.org/doi/10.1145/1378727.1378742
Jackson,
Michael
(2006):
What Can We Expect from Program Verification?.
In
IEEE Computer,
39
(10)
pp. 65-71.
https://doi.ieeecomputersociety.org/10.1109/MC.2006.363
Zave,
Pamela,
Jackson,
Michael
(1997):
Telecommunications Service Requirements: Principles for Managing Complexity.
In
Requir. Eng.,
2
(2)
pp. 92-101.
https://
Wyk,
Christopher J. Van,
Jackson,
Michael,
Wall,
David W.
(1987):
Processing Transactions.
In
Communications of the ACM,
30
(12)
pp. 1000-1010.
Hall,
Jon G.,
Jackson,
Michael,
Laney,
Robin C.,
Nuseibeh,
Bashar,
Rapanotti,
Lucia
(2002):
Relating Software Requirements and Architectures Using Problem Frames.
In:
10th Anniversary IEEE Joint International Conference on Requirements Engineering RE 2002
9-13 September,
2002,
Essen, Germany.
pp. 137-144.
https://csdl.computer.org/comp/proceedings/re/2002/1465/00/14650137abs.htm
Jackson,
Michael
(2001):
Formalism and Informality in RE.
In:
5th IEEE International Symposium on Requirements Engineering RE 2001
27-31 August,
2001,
Toronto, Canada.
pp. 269.
https://csdl.computer.org/comp/proceedings/re/2001/1125/00/11250269abs.htm
Jackson,
Michael
(1995):
Problems and requirements (software development).
In:
Second IEEE International Symposium on Requirements Engineering 1995
March 27 - 29,
1995,
York, England.
pp. 2-9.
https://csdl.computer.org/comp/proceedings/re/1995/7017/00/70170002abs.htm
Laney,
Robin C.,
Barroca,
Leonor,
Jackson,
Michael,
Nuseibeh,
Bashar
(2004):
Composing Requirements Using Problem Frames.
In:
12th IEEE International Conference on Requirements Engineering RE 2004
6-10 September,
2004,
Kyoto, Japan.
pp. 122-131.
https://doi.ieeecomputersociety.org/10.1109/RE.2004.11
Lin,
Luncheng,
Nuseibeh,
Bashar,
Ince,
Darrel C.,
Jackson,
Michael
(2004):
Using Abuse Frames to Bound the Scope of Security Problems.
In:
12th IEEE International Conference on Requirements Engineering RE 2004
6-10 September,
2004,
Kyoto, Japan.
pp. 354-355.
https://doi.ieeecomputersociety.org/10.1109/RE.2004.54
Lin,
Luncheng,
Nuseibeh,
Bashar,
Ince,
Darrel C.,
Jackson,
Michael,
Moffett,
Jonathan D.
(2003):
Introducing Abuse Frames for Analysing Security Requirements.
In:
11th IEEE International Conference on Requirements Engineering RE 2003
8-12 September,
2003,
Monterey Bay, CA, USA.
pp. 371-372.
https://csdl.computer.org/comp/proceedings/re/2003/1980/00/19800371abs.htm
Rapanotti,
Lucia,
Hall,
Jon G.,
Jackson,
Michael,
Nuseibeh,
Bashar
(2004):
Architecture-driven Problem Decomposition.
In:
12th IEEE International Conference on Requirements Engineering RE 2004
6-10 September,
2004,
Kyoto, Japan.
pp. 80-89.
https://doi.ieeecomputersociety.org/10.1109/RE.2004.7
Zave,
Pamela,
Jackson,
Michael
(1997):
Requirements for Telecommunications Services: An Attack on Complexity.
In:
3rd IEEE International Symposium on Requirements Engineering RE97
January 5-8,
1997,
Annapolis, MD, USA.
pp. 106-117.
https://csdl.computer.org/comp/proceedings/re/1997/7740/00/77400106abs.htm
Khazaei,
Babak,
Jackson,
Michael
(2002):
Is There Any Difference in Novice Comprehension of a Small Program Written in the Event-Dr.
In:
HCC 2002 - IEEE CS International Symposium on Human-Centric Computing Languages and Environments
3-6 September,
2002,
Arlington, VA, USA.
pp. 19-.
https://csdl.computer.org/comp/proceedings/hcc/2002/1644/00/16440019abs.htm
Tun,
Thein Than,
Jackson,
Michael,
Laney,
Robin C.,
Nuseibeh,
Bashar,
Yu,
Yijun
(2009):
Are Your Lights Off? Using Problem Frames to Diagnose System Failures.
In:
RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31 - September 4, 2009
,
2009,
.
pp. 343-348.
https://doi.ieeecomputersociety.org/10.1109/RE.2009.31