Author of the publication

Generating Scenarios with Access Permission from a Conceptual Model.

, , , and . JCKBSE, page 127-136. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward the Decision Tree for Inferring Requirements Maturation Types., , , , , and . IEICE Trans. Inf. Syst., 95-D (4): 1021-1030 (2012)A Method for Analyzing the Context of Stakeholders and their Requirements., and . ICSOFT EA, page 357-362. SciTePress, (2014)Information Flow Diagram and Analysis Method for Unexpected Obstacle Specification of Embedded Software., , , , , , and . JCKBSE, volume 140 of Frontiers in Artificial Intelligence and Applications, page 115-124. IOS Press, (2006)A Method for Extracting Unexpected Scenarios of Embedded Systems., , , , , and . JCKBSE, volume 140 of Frontiers in Artificial Intelligence and Applications, page 41-50. IOS Press, (2006)Requirements Engineering Based on REBOK (Requirements Engineering Body Of Knowledge) and Its Practice., , , and . APSEC (2), page 79-80. IEEE Computer Society, (2013)Predicting Fault Proneness of Programs with CNN., and . ICAART (1), page 321-328. SciTePress, (2019)A method to generate traverse paths for eliciting missing requirements., , , and . ACSW, page 54:1-54:10. ACM, (2019)An Idea Support Method and a Tool for New Product Development., and . HCI (33), volume 1032 of Communications in Computer and Information Science, page 95-102. Springer, (2019)Quantitative Observations on Object Evolution.. IWPSE, page 154-157. ACM, (2001)Generating Scenarios with Access Permission from a Conceptual Model., , , and . JCKBSE, page 127-136. Springer, (2018)