Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Comparative Study of Proposed Moving Object Detection Methods., , and . J. Next Gener. Inf. Technol., 2 (2): 56-68 (2011)Modélisation et analyse dans les entrepôts de données actifs., , , and . Technique et Science Informatiques, 30 (8): 975-994 (2011)Functional change impact analysis in use cases: An approach based on COSMIC functional size measurement., , and . Sci. Comput. Program., (2017)A Business Goals Centric Method for Automatic DW Design from UML Models ., , and . ICSOFT, page 15-23. SciTePress, (2013)EVARES: A Quality-driven Refactoring Method for Business Process Models., , and . ICEIS (3), page 409-416. SciTePress, (2017)GSM Model Construction from Enterprise Models., , , and . ICE-B, page 100-108. SciTePress, (2015)A model-driven development approach for context-aware systems., , and . Softw. Syst. Model., 17 (4): 1169-1195 (2018)Change impact analysis for software product lines., , and . J. King Saud Univ. Comput. Inf. Sci., 28 (4): 364-380 (2016)From a BPMN Model to an Aligned UML Analysis Model., , and . ICSOFT, page 657-665. SciTePress, (2018)Verification of Security Coherence in Data Warehouse Designs., , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 207-213. Springer, (2012)