How does one become a recognized architect? Where does the inspiration come from and how is it transformed into buildings, streets and cities? With his Architectural Journal Rob Krier takes the readers on a fascinating journey, guiding one through pivotal moments of early stages of his career as an architect. With a sense of humour, empathy and charm Krier tells a story of his professional path…
Gottfried Semper’s years in exile in London (1850–1855) were a time of highly inspirational experiences. The London of the first World Expo offered the German architect an immense trove of objects for study and an intellectual surrounding that provided seminal impulses for his innovative cultural-history-based theory of architecture. That revolutionary period found not only politics and soc…
Software design patterns are evaluated and recognised architectural solutions for recurring design problems. They are often described in pattern catalogues that contain known patterns for a certain application domain, for example, patterns for object-oriented software by Gamma et al. or patterns for distributed computing by Buschmann et al.. However, design patterns are still often misunder…
Autonomous cyber-physical systems will foreseeably find their way into the reality of our lives. Will criminal law have to react when innovative, autonomous technologies cause bodily injury or homicide? To answer this question, Maximilian Münster examines the standards of criminal product liability that apply in Germany and then evaluates their application to the marketing of autonomous cyber-…
The ADMD3 approach presented in this book enchances the architectural design documentation of decision via reuse of design patterns. It combines the support for evaluation of pattern application, semi-automated documentation of decision rationale and trace links. The approach is based on a new kind of design pattern catalogue, whereby usual pattern descriptions are captured together with questi…
Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve t…
Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data f…
Abstract A news item concerning six German soldiers trapped for years in the army food storage bunker provided Rudolf Hagelstange with a plot and an effective symbol to express the tensions, emotions, and paradoxes of modern man's being. In this volume the poet Herman Salinger translates Hagelstange's poem into verse with the original German on facing pages. An introductory essay by Charles W.…
Buddhism, often described as an austere religion that condemns desire, promotes denial, and idealizes the contemplative life, actually has a thriving leisure culture in Asia. Justin McDaniel looks at the growth of Asia’s culture of Buddhist leisure through a study of architects responsible for monuments, museums, amusement parks, and other sites. In conversation with noted theorists of materi…