From post

Comparing Apples with Oranges? The Perceived Differences between Agile and Lean Software Development Processes.

, и . ICIS, Association for Information Systems, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm., , , и . Future Gener. Comput. Syst., 27 (8): 1124-1134 (2011)Analysis and Improvement of AC-BM Algorithm in Intrusion Detection System., , и . J. Networks, 8 (5): 1191-1196 (2013)Semidefinite programming relaxation approach for multiuser detection of QAM signals., , и . IEEE Trans. Wirel. Commun., 6 (12): 4275-4279 (2007)Binary Code Retrofitting and Hardening Using SGX., , , , , и . FEAST@CCS, стр. 43-49. ACM, (2017)Learning your identity and disease from research papers: information leaks in genome wide association study., , , , и . ACM Conference on Computer and Communications Security, стр. 534-544. ACM, (2009)Identity, location, disease and more: inferring your secrets from android public resources., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 1017-1028. ACM, (2013)Event-Triggering in Distributed Networked Systems with Data Dropouts and Delays., и . HSCC, том 5469 из Lecture Notes in Computer Science, стр. 366-380. Springer, (2009)Decentralized Event-Triggered Broadcasts over Networked Control Systems., и . HSCC, том 4981 из Lecture Notes in Computer Science, стр. 674-677. Springer, (2008)Self-Triggering Under State-Independent Disturbances., и . IEEE Trans. Autom. Control., 55 (6): 1494-1500 (2010)NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment., , и . ISCC, стр. 1-6. IEEE, (2020)