Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach to early evaluation of informational privacy requirements., , and . SAC, page 1370-1375. ACM, (2015)On the Perspective Transformation for Efficient Relay Placement in Wireless Multicast Networks., , , and . IEEE Communications Letters, 19 (2): 275-278 (2015)A Systematic Mapping Study of the Current Practice of Indian Software Engineering., , , and . ISEC, page 89-98. ACM, (2016)A conceptual framework for enterprise agility., , , and . SAC, page 1242-1244. ACM, (2015)Domain Engineering for Software Tools., and . Domain Engineering, Product Lines, Languages, and Conceptual Models, Springer, (2013)Smart Phone Activity: Risk-Taking Behaviours and Perceptions on Data Security among Young People in England., , and . Int. J. Soc. Organ. Dyn. IT, 3 (4): 43-58 (2013)A Domain Specific Language for Contextual Design., and . HCSE, volume 6409 of Lecture Notes in Computer Science, page 46-61. Springer, (2010)Human and Value Sensitive Aspects of Mobile App Design: A Foucauldian Perspective., and . CAiSE, volume 10816 of Lecture Notes in Computer Science, page 103-118. Springer, (2018)Outsourcing service provision through step-wise transformation., and . ISEC, page 8:1-8:10. ACM, (2014)A common basis for modelling service-oriented and event-driven architecture., and . ISEC, page 23-32. ACM, (2012)