From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Model-driven approach to developing domain functional requirements in software product lines., , , , и . IET Softw., 6 (4): 391-401 (2012)Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation., , , и . IEEE Internet Things J., 8 (1): 357-369 (2021)Models for Mobile Application Maintenance Based on Update History., , и . ENASE, стр. 212-217. SciTePress, (2014)Characterizing Trustworthy Digital Rights Exporting., , и . BIR, том 128 из Lecture Notes in Business Information Processing, стр. 85-95. Springer, (2012)Ratings vs. Reviews in Recommender Systems: A Case Study on the Amazon Movies Dataset., , , и . ADBIS (Short Papers and Workshops), том 1064 из Communications in Computer and Information Science, стр. 68-76. Springer, (2019)Requirements Management in Students' Software Development Projects., , и . CompSysTech, стр. 203-210. ACM, (2017)An Adaptive Information Reconciliation Protocol for Physical-Layer Based Secret Key Generation., , и . VTC Spring, стр. 1-5. IEEE, (2019)Towards Lightweight Requirements Documentation., , , , , и . J. Softw. Eng. Appl., 3 (9): 882-889 (2010)Exploring Factors and Measures to Select Open Source Software., , , и . CoRR, (2021)The anatomy of a vulnerability database: A systematic mapping study., , , , и . J. Syst. Softw., (июля 2023)