Остановите войну!
for scientists:
default search action
Mehdi Mirakhorli
- > Home > Persons > Mehdi Mirakhorli
Publications
- 2016
- [j6]Mehdi Mirakhorli, Jane Cleland-Huang:
Detecting, Tracing, and Monitoring Architectural Tactics in Code. IEEE Trans. Software Eng. 42(3): 206-221 (2016) - 2015
- [c27]Mehdi Mirakhorli, Jane Cleland-Huang:
Modifications, Tweaks, and Bug Fixes in Architectural Tactics. MSR 2015: 377-380 - [c25]Jane Cleland-Huang, Mona Rahimi, Mehdi Mirakhorli:
Ready-Set-Transfer! Technology transfer in the requirements engineering domain. RE 2015: 412-413 - 2014
- [j4]Matthias Galster, Mehdi Mirakhorli, Jane Cleland-Huang, Xavier Franch, Janet E. Burge, Roshanak Roshandel, Paris Avgeriou:
Towards bridging the twin peaks of requirements and architecture. ACM SIGSOFT Softw. Eng. Notes 39(5): 3:30-3:31 (2014) - [c22]Jane Cleland-Huang, Muhammad Ali Babar, Mehdi Mirakhorli:
An inverted classroom experience: engaging students in architectural thinking for agile projects. ICSE Companion 2014: 364-371 - [c21]Mona Rahimi, Mehdi Mirakhorli, Jane Cleland-Huang:
Automated extraction and visualization of quality concerns from requirements specifications. RE 2014: 253-262 - [c20]Mehdi Mirakhorli, Ahmed Fakhry, Artem Grechko, Mateusz Wieloch, Jane Cleland-Huang:
Archie: a tool for detecting, monitoring, and preserving architecturally significant code. SIGSOFT FSE 2014: 739-742 - [e1]Jane Cleland-Huang, Paris Avgeriou, Janet E. Burge, Xavier Franch, Matthias Galster, Mehdi Mirakhorli, Roshanak Roshandel:
Proceedings of the 4th International Workshop on Twin Peaks of Requirements and Architecture, TwinPeaks 2014, Hyderabad, India, June 1, 2014. ACM 2014, ISBN 978-1-4503-2848-7 [contents] - 2013
- [j3]Matthias Galster, Mehdi Mirakhorli, Jane Cleland-Huang, Janet E. Burge, Xavier Franch, Roshanak Roshandel, Paris Avgeriou:
Views on software engineering from the twin peaks of requirements and architecture. ACM SIGSOFT Softw. Eng. Notes 38(5): 40-42 (2013) - [j2]Mehdi Mirakhorli, Jane Cleland-Huang:
Traversing the Twin Peaks. IEEE Softw. 30(2): 30-36 (2013) - [j1]Negar Hariri, Carlos Castro-Herrera, Mehdi Mirakhorli, Jane Cleland-Huang, Bamshad Mobasher:
Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings. IEEE Trans. Software Eng. 39(12): 1736-1752 (2013) - [c19]Jane Cleland-Huang, Mehdi Mirakhorli, Adam Czauderna, Mateusz Wieloch:
Decision-Centric Traceability of architectural concerns. TEFSE@ICSE 2013: 5-11 - [c18]Paris Avgeriou, Janet E. Burge, Jane Cleland-Huang, Xavier Franch, Matthias Galster, Mehdi Mirakhorli, Roshanak Roshandel:
2nd international workshop on the twin peaks of requirements and architecture (TwinPeaks 2013). ICSE 2013: 1556-1557 - [c16]Mehdi Mirakhorli, Julia Carvalho, Jane Cleland-Huang, Patrick Mäder:
A domain-centric approach for recommending architectural tactics to satisfy quality concerns. TwinPeaks@RE 2013: 1-8 - 2012
- [c15]Mehdi Mirakhorli, Yonghee Shin, Jane Cleland-Huang, Murat Çinar:
A tactic-centric approach for automating traceability of quality concerns. ICSE 2012: 639-649 - [c14]Jane Cleland-Huang, Patrick Mäder, Mehdi Mirakhorli, Sorawit Amornborvornwong:
Breaking the big-bang practice of traceability: Pushing timely trace recommendations to project stakeholders. RE 2012: 231-240 - [c13]Mehdi Mirakhorli, Patrick Mäder, Jane Cleland-Huang:
Variability points and design pattern usage in architectural tactics. SIGSOFT FSE 2012: 52 - [p1]Mehdi Mirakhorli, Jane Cleland-Huang:
Tracing Non-Functional Requirements. Software and Systems Traceability 2012: 299-320 - 2011
- [c12]Mehdi Mirakhorli, Jane Cleland-Huang:
Transforming trace information in architectural documents into re-usable and effective traceability links. SHARK@ICSE 2011: 45-52 - [c11]Horatiu Dumitru, Marek Gibiec, Negar Hariri, Jane Cleland-Huang, Bamshad Mobasher, Carlos Castro-Herrera, Mehdi Mirakhorli:
On-demand feature recommendations derived from mining public product descriptions. ICSE 2011: 181-190 - [c10]Mehdi Mirakhorli, Jane Cleland-Huang:
Tracing architectural concerns in high assurance systems. ICSE 2011: 908-911 - [c8]Mehdi Mirakhorli, Jane Cleland-Huang:
Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance. ICSM 2011: 123-132 - [c7]Mehdi Mirakhorli, Jane Cleland-Huang:
A pattern system for tracing architectural concerns. PLoP 2011: 5:1-5:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-09 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint