Horkoff, J. (2004). T Montreux Jazz Festival i* Exercise presentation. Based on Osterwalder Ph.D. Thesis.
Horkoff, J., Yu, E., & Liu, L. (2006). Analyzing Trust in Technology Strategies presentation. Privacy, Security, Trust 2006. Markham, Ontario, Canada. October 31, 2006October 2006.
Horkoff, J. and Yu, E. (2005). Using the i* Evaluation Procedure for Model Analysis and Quality Improvement presentation. Second International Workshop on i* / Tropos. University College London, London UK.
Horkoff, J., Yu, E., & Liu, L. (2004). Trusted Computing: An i* Case Study presentation. Department of Computer Science. University of Toronto.
[NFRbook] L. Chung, B.A. Nixon, E. Yu, J. Mylopoulos. Non-Functional Requirements in Software Engineering (Monograph)
Kluwer Academic Publishers, 2000. 472 pp.
[PST06] J. Horkoff, E. Yu, L. Liu. (2006). Analyzing Trust in Technology Strategies. . Int. Conf. on Privacy, Security, and Trust (PST'06), Toronto, Canada, Oct 30— Nov 1, 2006.
[SREIS02-Sec] L. Liu, E. Yu, J. Mylopoulos. Analyzing Security Requirements as Relationships Among Strategic Actors. 2nd Symposium on Requirements Engineering for Information Security (SREIS’02). Raleigh, North Carolina, October 16, 2002
Yu. E. (2006). Computer Science Department. University of Toronto. Prof. Eric Yu Website. Retrieved on July 28, 2007 from http://www.cs.toronto.edu/%7Eeric/#Research%20Interests.
[Yu01] Yu, Eric. Presentation: Strategic Actor Relationships Modelling with i*, December 13-14, 2001, IRST, Trento, Italy.
[Yu95] E. Yu. Modelling Strategic Relationships for Process Reengineering Ph.D. Thesis. Dept. of Computer Science, University of Toronto. 1995.
The evolution of i* syntax, deviating from the original description in [Yu95] has occurred over the course of many papers. Such work can be found in the i* Roadmap.
For questions regarding i* syntax please click on the "discuss" tab. This feature is available for registered users only. For registration information please see the Registration and User Rights Policy for the i* Wiki.