From post

Blending the Sketched Use Case Scenario with License Agreements Using Semantics.

, , , и . KSEM, том 5914 из Lecture Notes in Computer Science, стр. 275-284. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Question Driven Semantics Interpretation for Collaborative Knowledge Engineering and Ontology Reuse., , и . IRI, стр. 170-176. IEEE Systems, Man, and Cybernetics Society, (2007)Ontological Mapping of Common Criteria's Security Assurance Requirements., , , и . SEC, том 232 из IFIP, стр. 85-95. Springer, (2007)Blockchains, Smart Contracts and Future Applications (Dagstuhl Seminar 18152)., , , и . Dagstuhl Reports, 8 (4): 20-31 (2018)(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice., , , , , и . IACR Cryptology ePrint Archive, (2018)Blending the Sketched Use Case Scenario with License Agreements Using Semantics., , , и . KSEM, том 5914 из Lecture Notes in Computer Science, стр. 275-284. Springer, (2009)Exploiting social networking sites for spam., , , , и . ACM Conference on Computer and Communications Security, стр. 693-695. ACM, (2010)Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171)., , , и . Dagstuhl Reports, 12 (4): 54-71 (2022)Meta-framework for Automating Static Malware Analysis., , и . ERCIM News, 2022 (129): 0 (2022)Identifying and Incorporating Affective States and Learning Styles in Web-based Learning Management Systems., , , и . IxD&A, (2010)Cybersecurity - Introduction to the Special Theme., и . ERCIM News, (2016)