Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Decomposing class responsibilities using distance-based method similarity., , , and . Frontiers Comput. Sci., 10 (4): 612-630 (2016)Using classification techniques for informal requirements in the requirements analysis-supporting system., , , and . Inf. Softw. Technol., 49 (11-12): 1128-1140 (2007)A feature-based approach for modeling role-based access control systems., , , , and . J. Syst. Softw., 84 (12): 2035-2052 (2011)An Approach to Dynamically Achieving Quality Requirements Change in Product Line Engineering., , and . SPLC (2), page 41-50. Kindai Kagaku Sha Co. Ltd., Tokyo, Japan, (2007)A Data Allocation Method over Multiple Wireless Broadcast Channels., and . J. Inf. Sci. Eng., 29 (5): 873-888 (2013)Space Authentication in the Metaverse: A Blockchain-Based User-Centric Approach., , and . IEEE Access, (2024)Metrics for measuring the consistencies of requirements with objectives and constraints., , , , , and . Requir. Eng., 19 (1): 89-104 (2014)Pattern-Based Model Transformation Using QVT., , and . APSEC, page 472-481. IEEE, (2012)Leverage Sidechains to Reduce the Workload of Smart Contracts through Parallelization., , and . J. Comput. Sci. Eng., 15 (3): 125-133 (2021)SBAC: Substitution cipher access control based on blockchain for protecting personal data in metaverse., and . Future Gener. Comput. Syst., (February 2024)