From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A comparative assessment of peer-to-peer and server-based configuration management systems, , и . Proceedings of the Workshop on Cooperative Support for Distributed Software Engineering Processes (CSSE'04), стр. 15--26. Linz, Austria, Austrian Computer Society, (сентября 2004)SCADA Protocol Obfuscation: A Proactive Defense Line in SCADA Systems, и . Proceedings of the SCADA Security Scientific Symposium 2007, Digital Bond Press, Sunrise, FL, (2007)Validation of Reverse Engineered Web Application Models, , и . International Journal of Computer, Information, Systems and Control Engineering, 1 (4): 1073 - 1076 (2007)Querying UML/XMI Design Information, , и . Flexible Query Answering Systems, том 7 из Advances in Soft Computing, Physica-Verlag HD, (2001)Querying UML/XML Design Information., , и . FQAS, том 7 из Advances in Soft Computing, стр. 538-549. Physica-Verlag Heidelberg New York, A Springer-Verlag Company, (2000)Software reuse in-the-small: automating group rewarding., , и . Inf. Softw. Technol., 43 (11): 651-660 (2001)PNemu: An Extensible Modeling Library for Adaptable Distributed Systems., , и . Petri Nets, том 11522 из Lecture Notes in Computer Science, стр. 80-90. Springer, (2019)Corrigenda: a hierarchy-aware approach to faceted classification of object-oriented components., , и . ACM Trans. Softw. Eng. Methodol., 8 (4): 425-472 (1999)A Product Machine Model for Anomaly Detection of Interposition Attacks on Cyber-Physical Systems., и . SEC, том 278 из IFIP, стр. 285-300. Springer, (2008)How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students., , , , , и . ITiCSE, стр. 27-32. ACM, (2015)