Author of the publication

Software Business in the Telecommunications Sector.

, , , , and . Telecommunication Economics, volume 7216 of Lecture Notes in Computer Science, Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost Efficiency of Hybrid Cloud Storage: Shortening Acquisition Cycle to Mitigate Volume Variation., , and . ICIS, Association for Information Systems, (2015)Hybrid Cloud Architecture for Short Message Services., , , , and . CLOSER, page 489-500. SciTePress, (2012)Evaluating Classifiers for Mobile-Masquerader Detection., , and . SEC, volume 201 of IFIP, page 271-283. Springer, (2006)Role of acquisition intervals in private and public cloud storage costs., , and . Decis. Support Syst., (2014)Analyzing Impact of Interface Implementation Efforts on the Structure of a Software Market - OSS/BSS Market Polarization Scenario., , and . ICSOFT (SE/MUSE/GSDCA), page 80-87. INSTICC Press, (2008)Information Security Culture: A Survey., and . INC, page 153-157. University of Plymouth, (2010)A framework for evaluating Internet-of-Things platforms: Application provider viewpoint., and . WF-IoT, page 147-152. IEEE Computer Society, (2014)Learning Temporal Regularities of User Behavior for Anomaly Detection., , and . MMM-ACNS, volume 2052 of Lecture Notes in Computer Science, page 143-152. Springer, (2001)Real-time recognition of personal routes using instance-based learning.. Intelligent Vehicles Symposium, page 619-624. IEEE, (2011)One-class classifiers : a review and analysis of suitability in the context of mobile-masquerader detection.. South Afr. Comput. J., (2006)