Author of the publication

Quality and comprehension of UML interaction diagrams-an experimental comparison.

, , , and . Inf. Softw. Technol., 47 (10): 675-692 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey., , , and . Inf. Secur. Tech. Rep., 14 (1): 16-29 (2009)A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks., , , , and . ACM Trans. Model. Comput. Simul., 22 (1): 5:1-5:26 (2011)A conceptual model for increasing utilization of dependable computer networks., , and . Data Knowl. Eng., 46 (3): 247-269 (2003)A Conceptual Model of an Intelligent Catalog Search System., and . J. Organ. Comput. Electron. Commer., 11 (1): 31-46 (2001)A contingency model for estimating success of strategic information systems planning., , , and . Inf. Manag., 47 (1): 17-29 (2010)Top Management Toolbox for Managing Corporate IT., , and . Commun. ACM, 42 (4): 93-99 (1999)Automation of Facility Management Processes Using Machine-to-Machine Technologies., , , , , , and . IOT, volume 4952 of Lecture Notes in Computer Science, page 68-86. Springer, (2008)M2MGen- An Application Generator for Machine to Machine (M2M) Applications., , , , and . IWRT, page 133-140. INSTICC PRESS, (2007)The metaknowledge-based intelligent routing system (MIRS)., , , , and . Data Knowl. Eng., 34 (2): 189-217 (2000)Personalized Cognitive Passwords: An Exploratory Assessment., , , and . Inf. Manag. Comput. Secur., 19 (1): 25-41 (2011)