Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an effective integrated reuse environment., , , and . GPCE, page 95-100. ACM, (2006)An experimental study to evaluate a SPL architecture regression testing approach., , , , , and . IRI, page 608-615. IEEE, (2012)A Support Tool for Domain Analysis., , , and . VaMoS, volume 37 of ICB-Research Report, page 175-178. Universität Duisburg-Essen, (2010)Heuristic-based strategy for Phishing prediction: A survey of URL-based approach., , and . Comput. Secur., (2020)SMADL: The Social Machines Architecture Description Language., , and . SLE (Doctoral Symposium), volume 935 of CEUR Workshop Proceedings, page 35-52. CEUR-WS.org, (2012)SmartCluster: Utilizando Dados Públicos para Agrupar Cidades Inteligentes por Domínios SmartCluster: Using Public Data to Group Smart Cities by Domains., , , and . SBSI, page 699-702. ACM, (2015)A web-based platform for scavenger hunt games using the Internet of Things., , , and . CCNC, page 835-840. IEEE, (2015)A Privacy Maturity Model for Cloud Storage Services., , , , , , , and . IEEE CLOUD, page 944-945. IEEE Computer Society, (2014)Brazilian smart cities: using a maturity model to measure and compare inequality in cities., , , , and . DG.O, page 230-238. ACM, (2015)VeloZ: A Charging Policy Specification Language for Infrastructure Clouds., , , , and . ICCCN, page 1-7. IEEE, (2013)