default search action
Ingo Mueller 0001
Person information
- affiliation: Monash University, Clayton, Victoria, Australia
- affiliation (former): Swinburne University of Technology, Hawthorn, Australia
- affiliation (former): University of Jena, Germany
Other persons with the same name
- Ingo Müller 0002 — ETH Zurich, Switzerland (and 2 more)
- Ingo Müller 0003 — Technical University Berlin, Germany
- Ingo Müller 0004 — Technische Hochschule Leipzig, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Ingo Mueller:
The Impact of Personality on Requirements Engineering Activities: A Mixed-Methods Study. Empir. Softw. Eng. 29(1): 32 (2024) - [j6]Hashini Gunatilake, John C. Grundy, Rashina Hoda, Ingo Mueller:
The impact of human aspects on the interactions between software developers and end-users in software engineering: A systematic literature review. Inf. Softw. Technol. 173: 107489 (2024) - [j5]Hashini Gunatilake, John C. Grundy, Rashina Hoda, Ingo Mueller:
Enablers and Barriers of Empathy in Software Developer and User Interactions: A Mixed Methods Case Study. ACM Trans. Softw. Eng. Methodol. 33(4): 109:1-109:41 (2024) - [c21]Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Ingo Mueller:
What's Personality Got to Do with It? A Case Study on the Impact of Personality on Requirements Engineering-related Activities. CHASE@ICSE 2024: 182-194 - [p1]John Grundy, Tanjila Kanij, Jennifer McIntosh, Hourieh Khalijah, Ingo Mueller:
Developers' Perspective of Diverse End User Requirements. Equity, Diversity, and Inclusion in Software Engineering 2024: 105-120 - [i9]Hashini Gunatilake, John C. Grundy, Rashina Hoda, Ingo Mueller:
Enablers and Barriers of Empathy in Software Developer and User Interaction: A Mixed Methods Case Study. CoRR abs/2401.09001 (2024) - [i8]Hashini Gunatilake, John Grundy, Rashina Hoda, Ingo Mueller:
The Impact of Human Aspects on the Interactions Between Software Developers and End-Users in Software Engineering: A Systematic Literature Review. CoRR abs/2405.04787 (2024) - 2023
- [j4]Hashini Gunatilake, John C. Grundy, Ingo Mueller, Rashina Hoda:
Empathy models and software engineering - A preliminary analysis and taxonomy. J. Syst. Softw. 203: 111747 (2023) - [j3]Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Ingo Mueller:
The Influence of Human Aspects on Requirements Engineering-related Activities: Software Practitioners' Perspective. ACM Trans. Softw. Eng. Methodol. 32(5): 108:1-108:37 (2023) - [c20]Shavindra Wickramathilaka, Ingo Mueller:
Addressing Age-Related Accessibility Needs of Senior Users Through Model-Driven Engineering. CHASE 2023: 121-126 - [c19]Paul McIntosh, Ingo Mueller, Waqar Hussain:
Human Values-Driven User Requirements with the ACT Matrix: An eExam Case Study. REW 2023: 397-406 - [i7]Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Ingo Mueller:
Understanding the Influence of Motivation on Requirements Engineering-related Activities. CoRR abs/2304.08074 (2023) - [i6]Shavindra Wickramathilaka, Ingo Mueller:
Addressing Age-Related Accessibility Needs of Senior Users Through Model-Driven Engineering. CoRR abs/2305.00695 (2023) - [i5]Hashini Gunatilake, John C. Grundy, Ingo Mueller, Rashina Hoda:
Empathy Models and Software Engineering - A Preliminary Analysis and Taxonomy. CoRR abs/2305.03941 (2023) - 2022
- [j2]Ingo Müller, Bran Selic:
Stakeholders: Going Beyond Just "End Users". IEEE Softw. 39(1): 112-113 (2022) - [c18]Ingo Mueller, Waqar Hussain, John C. Grundy:
So who is impacted anyway - a preliminary study of indirect stakeholder identification in practice. CHASE@ICSE 2022: 36-40 - [i4]John C. Grundy, Tanjila Kanij, Jennifer McIntosh, Hourieh Khalajzadeh, Ingo Mueller:
Diverse End User Requirements. CoRR abs/2210.02543 (2022) - [i3]Dulaji Hidellaarachchi, John Grundy, Rashina Hoda, Ingo Mueller:
Does personality impact requirements engineering Activities? CoRR abs/2210.07807 (2022) - 2021
- [c17]John Grundy, Ingo Mueller, Anuradha Madugalla, Hourieh Khalajzadeh, Humphrey O. Obie, Jennifer McIntosh, Tanjila Kanij:
Addressing the Influence of End User Human Aspects on Software Engineering. ENASE (Selected Papers) 2021: 241-264 - [i2]Dulaji Hidellaarachchi, John C. Grundy, Rashina Hoda, Ingo Mueller:
The Influence of Human Aspects on Requirements Engineering: Software Practitioners Perspective. CoRR abs/2109.07868 (2021) - 2020
- [c16]John C. Grundy, Hourieh Khalajzadeh, Jennifer McIntosh, Tanjila Kanij, Ingo Mueller:
HumaniSE: Approaches to Achieve More Human-Centric Software Engineering. ENASE (Selected Papers) 2020: 444-468
2010 – 2019
- 2016
- [i1]Mohamed Almorsy, John C. Grundy, Ingo Müller:
An Analysis of the Cloud Computing Security Problem. CoRR abs/1609.01107 (2016) - 2011
- [c15]Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Tackling the Loss of Control: Standards-Based Conjoint Management of Security Requirements for Cloud Services. IEEE CLOUD 2011: 573-581 - [c14]Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Idea: A Reference Platform for Systematic Information Security Management Tool Support. ESSoS 2011: 256-263 - 2010
- [c13]Garth Heward, Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Assessing the Performance Impact of Service Monitoring. Australian Software Engineering Conference 2010: 192-201 - [c12]Garth Heward, Jun Han, Ingo Müller, Jean-Guy Schneider, Steven Versteeg:
A Case Study on Optimizing Web Service Monitoring Configurations. ICSOC Workshops 2010: 4-14 - [c11]Garth Heward, Jun Han, Ingo Müller, Jean-Guy Schneider, Steven Versteeg:
Optimizing the Configuration of Web Service Monitors. ICSOC 2010: 587-595
2000 – 2009
- 2009
- [c10]Tan Phan, Jun Han, Ingo Müller, Malinda Kapuruge, Steven Versteeg:
SOABSE: An approach to realizing business-oriented security requirements with Web Service security policies. SOCA 2009: 1-10 - 2008
- [c9]Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
A Conceptual Framework for Unified and Comprehensive SOA Management. ICSOC Workshops 2008: 28-40 - 2007
- [c8]Mohan Baruwal Chhetri, Ingo Müller, SukKeong Goh, Ryszard Kowalczyk:
ASAPM - An Agent-Based Framework for Adaptive Management of Composite Service Lifecycle. Web Intelligence/IAT Workshops 2007: 444-448 - [e1]Jingshan Huang, Ryszard Kowalczyk, Zakaria Maamar, David L. Martin, Ingo Müller, Suzette Stoutenburg, Katia P. Sycara:
Service-Oriented Computing: Agents, Semantics, and Engineering, AAMAS 2007 International Workshop, SOCASE 2007, Honolulu, HI, USA, May 14, 2007, Proceedings. Lecture Notes in Computer Science 4504, Springer 2007, ISBN 978-3-540-72618-0 [contents] - 2006
- [c7]Ingo Müller, Ryszard Kowalczyk, Peter Braun:
Towards Agent-Based Coalition Formation for Service Composition. IAT 2006: 73-80 - [c6]Boris Wu, Jian Ying Zhang, Mohan Baruwal Chhetri, Jian Lin, SukKeong Goh, Xuan Thang Nguyen, Ingo Müller, E. Gomes, L. Zheng, Jun Han, Ryszard Kowalczyk:
Adaptive Service Agreement and Process Management. ICWS 2006: 927-930 - 2005
- [c5]Peter Braun, Steffen Kern, Ingo Müller, Ryszard Kowalczyk:
Attacking the migration bottleneck of mobile agents. AAMAS 2005: 1239-1240 - [c4]Peter Braun, Ingo Müller, Ryszard Kowalczyk, Steffen Kern:
Increasing the Migration E.ciency of Java-based Mobile Agents. IAT 2005: 508-511 - [c3]Ingo Müller, Peter Braun, Ryszard Kowalczyk:
Design Patterns for Agent-Based Service Composition in theWeb. QSIC 2005: 425-430 - 2004
- [c2]Peter Braun, Ingo Müller, Sven Geisenhainer, Volkmar Schau, Wilhelm R. Rossak:
A Service-oriented Software Architecture for Mobile Agent Toolkits. ECBS 2004: 550-556 - [c1]Peter Braun, Ingo Müller, Sven Geisenhainer, Volkmar Schau, Wilhelm R. Rossak:
Agent Migration as an Optional Service in an Extendable Agent Toolkit Architecture. MATA 2004: 127-136 - 2003
- [j1]Ryszard Kowalczyk, Peter Braun, Ingo Müller, Wilhelm R. Rossak, Bogdan Franczyk, Andreas Speck:
Deploying Mobile and Intelligent Agents in interconnected E-Marketplaces. Trans. SDPS 7(3): 109-123 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint