Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the Impact of Scene Level Objects on Object Detection: Towards Quantitative Explanations of Detection Decisions., , , and . CoRR, (2024)Validating Security Requirement Specifications through the use of a Knowledge Graph., , , and . ICSC, page 244-251. IEEE, (2023)An Exploration of Explainable Machine Learning Using Semantic Web Technology., , , and . ICSC, page 143-146. IEEE, (2022)An Ontology and Management System for Learning Outcomes and Student Mastery., , and . FIE, page 1-5. IEEE, (2023)Scrum in the Classroom: An Implementation Guide., , , and . FIE, page 1-8. IEEE, (2023)Using Pairwise Testing to Verify Automatically-Generated Formal Specifications., , and . HASE, page 279-280. IEEE Computer Society, (2015)An analysis of explainability methods for convolutional neural networks., , and . Eng. Appl. Artif. Intell., 117 (Part): 105606 (2023)Towards a Tool for Generating Aspects from MEDL and PEDL Specifications for Runtime Verification., , , and . RV, volume 4839 of Lecture Notes in Computer Science, page 75-86. Springer, (2007)A Complex Networks Approach to Demographic Zonification., , and . MICAI, volume 5845 of Lecture Notes in Computer Science, page 177-188. Springer, (2009)Supporting Security Requirements Engineering through the Development of The Secure Development Ontology., and . ICSC, page 151-158. IEEE, (2022)