Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Developing Software Across Time Zones: An Exploratory Empirical Study., and . Informatica (Slovenia), (2002)STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles., , and . Comput. Secur., (October 2023)Business Process Model Driven Approach for Automatic Use Case Model Generation., and . BMSD, volume 391 of Lecture Notes in Business Information Processing, page 123-136. Springer, (2020)Design and Development of Case Studies in Security and Privacy for Health Informatics Education., , , , and . AICCSA, page 1-6. IEEE Computer Society, (2018)Communication, Knowledge and Co-ordination Management in Globally Distributed Software Development: Informed by a scientific Software Engineering Case Study., , , and . ICGSE, page 370-375. IEEE Computer Society, (2009)An Ontology-Based Approach to Adaptive Home Careflows., , , and . DEXA Workshops, page 522-526. IEEE Computer Society, (2011)Enhanced Binary Cuckoo Search With Frequent Values and Rough Set Theory for Feature Selection., and . IEEE Access, (2021)Model Formulation: The Primary Care Research Object Model (PCROM): A Computable Information Model for Practice-based Primary Care Research., , , , , and . JAMIA, 15 (5): 661-670 (2008)An Ontolological Treatment of Clinical Prediction Rules Implementing the Alvarado Score., , , , and . EFMI-STC, volume 186 of Studies in Health Technology and Informatics, page 103-107. IOS Press, (2013)A Model for Computing Temporal Eligibility Criteria on Large and Diverse Data Repositories., , and . AICCSA, page 1-6. IEEE, (2021)