Author of the publication

Requirements Engineering Challenges in Building AI-Based Complex Systems.

, , and . RE Workshops, page 252-255. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AAC Services Development: From Usability Requirements to the Reusable Components., , and . KES-AMSTA, volume 7327 of Lecture Notes in Computer Science, page 231-240. Springer, (2012)An Industrial IoT-Based Ontology Development for Well-Being, Aging and Health: A Scoping Review., , and . HealthCom, page 179-185. IEEE, (2022)Requirements Engineering Challenges in Building AI-Based Complex Systems., , and . RE Workshops, page 252-255. IEEE, (2019)An Intelligent Automatic Hoax Detection System., , and . KES (1), volume 5711 of Lecture Notes in Computer Science, page 318-325. Springer, (2009)Barcodes for mobile devices by Hiroko Kato, Keng T. Tan and Douglas Chai.. ACM SIGSOFT Softw. Eng. Notes, 36 (3): 32-33 (2011)A Security Assessment Framework for e-Health: A Croatian Perspective., , and . Meeting Security Challenges Through Data Analytics and Decision Support, volume 47 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2016)Ontology-Based Cybersecurity for Well-Being, Aging and Health: A Scoping Review., , , and . MeditCom, page 50-55. IEEE, (2023)A Conceptual Framework for Business Process Engineering: A Case Study., , and . ICSEA, page 29. IEEE Computer Society, (2006)Augmentative Requirements Engineering - Getting Closer to Sensitive User's Needs., , and . UsARE (Revised Selected Papers), volume 9312 of Lecture Notes in Computer Science, page 97-116. Springer, (2014)Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach., , and . KES (1), volume 5177 of Lecture Notes in Computer Science, page 725-732. Springer, (2008)