From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Introducing Ontology-based Security Policy Management in the Grid., и . ECIW, стр. 107-116. Academic Conferences Limited, Reading, UK, (2005)A Battery Powered Vision Sensor for Forensic Evidence Gathering., , , , , , и . ICDSC, стр. 15:1-15:6. ACM, (2019)Employing Ontologies for the Development of Security Critical Applications., , , , , , и . I3E, том 189 из IFIP, стр. 187-201. Springer, (2005)A generic Grid security policy reconciliation framework., , , и . Internet Res., 15 (5): 508-517 (2005)An ontology for secure e-government applications., , , , , , и . ARES, стр. 1033-1037. IEEE Computer Society, (2006)Incorporating Security Requirements Into the Software Development Process., , , , , и . ECIW, стр. 21-28. Academic Conferences Limited, Reading, UK, (2005)Robo-cook's Path: An online multiplayer board dietary game., , , , , и . PETRA, стр. 330-335. ACM, (2022)A survey on AI nutrition recommender systems., , , , и . PETRA, стр. 540-546. ACM, (2019)Promoting the Mediterranean Diet: A Co-design Game Approach., , , , , и . HCI (44), том 1833 из Communications in Computer and Information Science, стр. 25-32. Springer, (2023)A Framework for Exploiting Security Expertise in Application Development., , , , , и . TrustBus, том 4083 из Lecture Notes in Computer Science, стр. 62-70. Springer, (2006)