Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are Web Visibility and Data Quality Related Concepts?, , and . IEEE Internet Comput., 15 (2): 43-49 (2011)Systematic literature review of implementations of precision agriculture., , , and . Comput. Electron. Agric., (2020)LIS2BP: Una propuesta para obtener Procesos de Negocio a partir de los Sistemas Heredados., and . CIbSE, page 29-42. (2009)A BPMN Extension for Including Data Quality Requirements in Business Process Modeling., , , and . BPMN, volume 125 of Lecture Notes in Business Information Processing, page 116-125. Springer, (2012)Women vs. Men: Perceptions of Data Quality in Web Portals., , , , and . QUATIC, page 293-298. IEEE Computer Society, (2012)A Probabilistic Approach to Web Portal?s Data Quality Evaluation., , , and . QUATIC, page 143-153. IEEE Computer Society, (2007)A bayesian network to structure a data quality model for web portals., , , , and . ICSOFT (2), page 147-152. INSTICC Press, (2006)Obtaining secure business process models from an enterprise architecture considering security requirements., , , and . Bus. Process. Manag. J., 28 (1): 150-177 (2022)Towards Obtaining UML Class Diagrams from Secure Business Processes Using Security Patterns., , , and . J. Univers. Comput. Sci., 24 (10): 1472-1492 (2018)Kontun: A Framework for recommendation of authentication schemes and methods., , and . Inf. Softw. Technol., (2018)