From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementing database access control policy from unconstrained natural language text.. ICSE, стр. 1357-1360. IEEE Computer Society, (2013)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , и . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)Classifying Natural Language Sentences for Policy., и . POLICY, стр. 33-36. IEEE Computer Society, (2012)Learning Contextual Embeddings for Knowledge Graph Completion., , , и . PACIS, стр. 248. (2017)Using templates to elicit implied security requirements from functional requirements - a controlled experiment., , , и . ESEM, стр. 22:1-22:10. ACM, (2014)DIGS: A Framework for Discovering Goals for Security Requirements Engineering., , , , и . ESEM, стр. 35:1-35:10. ACM, (2016)Relation extraction for inferring access control rules from natural language artifacts., , , и . ACSAC, стр. 366-375. ACM, (2014)Fuse: A Reproducible, Extendable, Internet-Scale Corpus of Spreadsheets., , , , и . MSR, стр. 486-489. IEEE Computer Society, (2015)Evolving FinTech 512 'Software Engineering For Financial Technology'., и . SEENG, стр. 17-24. IEEE, (2023)Access Control Policy Extraction from Unconstrained Natural Language Text., и . SocialCom, стр. 435-440. IEEE Computer Society, (2013)