From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AAC Services Development: From Usability Requirements to the Reusable Components., , и . KES-AMSTA, том 7327 из Lecture Notes in Computer Science, стр. 231-240. Springer, (2012)Requirements Engineering Challenges in Building AI-Based Complex Systems., , и . RE Workshops, стр. 252-255. IEEE, (2019)An Intelligent Automatic Hoax Detection System., , и . KES (1), том 5711 из Lecture Notes in Computer Science, стр. 318-325. Springer, (2009)An Industrial IoT-Based Ontology Development for Well-Being, Aging and Health: A Scoping Review., , и . HealthCom, стр. 179-185. IEEE, (2022)Augmentative Requirements Engineering - Getting Closer to Sensitive User's Needs., , и . UsARE (Revised Selected Papers), том 9312 из Lecture Notes in Computer Science, стр. 97-116. Springer, (2014)Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach., , и . KES (1), том 5177 из Lecture Notes in Computer Science, стр. 725-732. Springer, (2008)RUP-based process model for security requirements engineering in value-added service development., , и . SESS@ICSE, стр. 54-60. IEEE Computer Society, (2009)A Security Assessment Framework for e-Health: A Croatian Perspective., , и . Meeting Security Challenges Through Data Analytics and Decision Support, том 47 из NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2016)Barcodes for mobile devices by Hiroko Kato, Keng T. Tan and Douglas Chai.. ACM SIGSOFT Softw. Eng. Notes, 36 (3): 32-33 (2011)Ontology-Based Cybersecurity for Well-Being, Aging and Health: A Scoping Review., , , и . MeditCom, стр. 50-55. IEEE, (2023)