Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guidance for the development of software engineering education programs., , , , , and . J. Syst. Softw., 49 (2-3): 163-169 (1999)Mechanisms and techniques to enhance the security of big data analytic framework with MongoDB and Linux Containers., , , and . Array, (2022)The assimilation of software engineering into the undergraduate computer science curriculum (panel session)., , , , and . SIGCSE, page 423-424. ACM, (2000)A network protocol analyzer with tutorial., and . SAC, page 115-119. ACM, (1996)Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux Containers., , , and . ICCDA, page 58-66. ACM, (2020)Application of Cyclomatic Complexity in Enterprise Architecture Frameworks., , and . IEEE Syst. J., 13 (3): 2166-2176 (2019)IEEE-CS/ACM Computing Curriculum Software Engineering Volume Project., , , , , , , and . CSEE&T, page 333-. IEEE Computer Society, (2003)Secure NoSQL Based Medical Data Processing and Retrieval: The Exposome Project., , , , , and . UCC (Companion"), page 99-105. ACM, (2017)Web Services for Higher Integrity Instrument Control., and . ICSOFT (2), page 151-156. SciTePress, (2010)Bumps on the information superhighway for K-12 education.. IEEE Technol. Soc. Mag., 17 (4): 25-28 (1998)