From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How have we evaluated software pattern application? A systematic mapping study of research design practices., , и . Inf. Softw. Technol., (2015)DIAMOnDS - DIstributed Agents for MObile & Dynamic Services, , , , , , , и . CoRR, (2003)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , и . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment., , , и . Empir. Softw. Eng., 22 (5): 2684-2717 (2017)Quality-aware trajectory planning of cellular connected UAVs., , , , , , и . DroneCom@MOBICOM, стр. 79-85. ACM, (2020)Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach., , , и . ICCSA (2), том 3481 из Lecture Notes in Computer Science, стр. 1096-1105. Springer, (2005)Grid Access Middleware for Handheld Devices., , , , и . EGC, том 3470 из Lecture Notes in Computer Science, стр. 1002-1011. Springer, (2005)Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks., , и . ICCCN, стр. 1-11. IEEE, (2020)Towards a framework to measure security expertise in requirements analysis., , , и . ESPRE, стр. 13-18. IEEE Computer Society, (2014)TAMEC: Trusted Augmented Mobile Execution on Cloud., , , , , , и . Sci. Program., (2021)