Author of the publication

Text-Based Requirements Modeling Support System.

, , and . SEKE, page 16-22. Knowledge Systems Institute, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decomposing class responsibilities using distance-based method similarity., , , and . Frontiers Comput. Sci., 10 (4): 612-630 (2016)Using classification techniques for informal requirements in the requirements analysis-supporting system., , , and . Inf. Softw. Technol., 49 (11-12): 1128-1140 (2007)A feature-based approach for modeling role-based access control systems., , , , and . J. Syst. Softw., 84 (12): 2035-2052 (2011)An Approach to Dynamically Achieving Quality Requirements Change in Product Line Engineering., , and . SPLC (2), page 41-50. Kindai Kagaku Sha Co. Ltd., Tokyo, Japan, (2007)A Data Allocation Method over Multiple Wireless Broadcast Channels., and . J. Inf. Sci. Eng., 29 (5): 873-888 (2013)Metrics for measuring the consistencies of requirements with objectives and constraints., , , , , and . Requir. Eng., 19 (1): 89-104 (2014)A Tactic-Based Approach to Embodying Non-functional Requirements into Software Architectures., , , and . EDOC, page 139-148. IEEE Computer Society, (2008)Space Authentication in the Metaverse: A Blockchain-Based User-Centric Approach., , and . IEEE Access, (2024)Pattern-Based Model Transformation Using QVT., , and . APSEC, page 472-481. IEEE, (2012)SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse., and . Future Gener. Comput. Syst., (February 2024)