Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

25 Years of Model-Driven Web Engineering: What we achieved, What is missing., , , , and . CLEI Electron. J., 19 (3): 1 (2016)A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses., , , , and . ACM Comput. Surv., 53 (3): 57:1-57:34 (2021)Improving the Design of Existing Web Applications., , and . QUATIC, page 499-504. IEEE Computer Society, (2010)Workshop on Evolution of Software Systems in a Business Context (ESSBC)., , and . STEP, page 35-38. IEEE Computer Society, (2005)A constraint-driven approach for dynamic malware detection., , , and . PST, page 512-519. IEEE, (2016)Migrating to the Web a Legacy Application: The Sinfor Project., , and . WSE, page 85-88. IEEE Computer Society, (2002)Conceptual Modeling of Web Application Transactions: Towards a Revised and Extended Version of the UWA Transaction Design Model., and . MMM, page 439-445. IEEE Computer Society, (2005)Refactoring to Rich Internet Applications. A Model-Driven Approach., , , , and . ICWE, page 1-12. IEEE Computer Society, (2008)DataMock: An Agile Approach for Building Data Models from User Interface Mockups., , , , and . Softw. Syst. Model., 18 (1): 663-690 (2019)Dynamic malware detection and phylogeny analysis using process mining., , , , and . Int. J. Inf. Sec., 18 (3): 257-284 (2019)