Author of the publication

Verification of Security Coherence in Data Warehouse Designs.

, , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 207-213. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validation des Besoins dans les Modèles UML2.0., , and . INFORSID, page 959-974. (2006)Sécurisation des entrepôts de données contre les inférences en utilisant les réseaux Bayésiens., , , and . EDA, volume B-6 of RNTI, page 35-47. Cépaduès, (2010)Validation formelle de schéma multidimensionnel vis à vis de sa source., , and . EDA, volume B-6 of RNTI, page 137-151. Cépaduès, (2010)Automated COSMIC-Based Analysis and Consistency Verification of UML Activity and Component Diagrams., , and . ENASE (Selected Papers), volume 417 of Communications in Computer and Information Science, page 48-63. Springer, (2013)UML models change impact analysis using a text similarity technique., , and . IET Softw., 11 (1): 27-37 (2017)Tracking Moving Objects in Road Traffic Sequences., , , and . ICISP, volume 7340 of Lecture Notes in Computer Science, page 406-414. Springer, (2012)A Lane Detection and Tracking Method for Driver Assistance System., , and . KES (1), volume 6881 of Lecture Notes in Computer Science, page 407-417. Springer, (2011)Mutual information-based facial expression recognition., , and . ICMV, volume 9067 of SPIE Proceedings, page 90670G. SPIE, (2013)Analyzing UML Activity and Component Diagrams - An Approach based on COSMIC Functional Size Measurement., , and . ENASE, page 36-44. SciTePress, (2013)Reuse of Semantic Business Process Patterns., , and . ICSOFT EA, page 36-47. SciTePress, (2014)