Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Rights of Data Subjects with Blockchain Technology., , , , , and . ICICT, page 284-288. IEEE, (2020)Automated Code Transformations: Dealing with the Aftermath., , , , and . SANER, page 627-631. IEEE, (2020)Ten Heuristics from Applying Agile Practices across Different Distribution Scenarios: A Multiple-Case Study., and . Computer and Information Science, 9 (2): 68-81 (2016)Introducing a Software Reuse Culture in Practice., and . CSEE, volume 750 of Lecture Notes in Computer Science, page 527-539. Springer, (1994)Outsourcing as a strategy for IT harmonization: a public sector case study proposing an approach in independent stakeholder scenarios., , and . ICEGOV, volume 351 of ACM International Conference Proceeding Series, page 245-250. ACM, (2008)Black-box approach for testing quality of service in case of security incidents on the example of a SIP-based VoIP service: work in progress., , , and . IPTComm, page 101-110. ACM, (2010)Design space for focus+context navigation in web forms., , , and . EICS, page 39-44. ACM, (2014)The Descriptor Theory - What is about?., , and . ICCI, page 418-422. IEEE Computer Society, (1993)Hyper Typer: A Serious Game for Measuring Mobile Text Entry Performance in the Wild., , and . CHI Extended Abstracts, ACM, (2019)GroFin: enhancing in-store grocery shopping with a context-aware smartphone app., , , and . MUM, page 29:1-29:11. ACM, (2019)