From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mining Objective Process Metrics from Repository Data., и . SEKE, стр. 514-519. Knowledge Systems Institute Graduate School, (2009)Goal-Directed Design for Proactive and Intelligent Device Collaboration., и . KES, том 2774 из Lecture Notes in Computer Science, стр. 841-848. Springer, (2003)A Multi-Dimensional Classification for Users of Security Patterns., , и . WOSIS, стр. 89-98. INSTICC Press, (2008)Role oriented programming for software evolution.. University of Washington, USA, (1997)Patterns for WiMax security., и . EuroPLoP, стр. 707-720. UVK - Universitaetsverlag Konstanz, (2007)Repository mining and Six Sigma for process improvement., , и . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-4 (2005)A pattern for a sensor node., , , и . PLoP, стр. 7:1-7:7. ACM, (2010)Eliciting Security Requirements through Misuse Activities., , и . DEXA Workshops, стр. 328-333. IEEE Computer Society, (2008)Using Role Components to Implement Collaboration-Based Designs., и . OOPSLA, стр. 359-369. ACM, (1996)SIGPLAN Notices 31(10).Defining Security Requirements Through Misuse Actions., , , и . IFIP Workshop on Advanced Software Engineering, том 219 из IFIP, стр. 123-137. Springer, (2006)