Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge Extraction Using Web Usage Mining., , , , and . EAI Endorsed Trans. Scalable Inf. Syst., 5 (16): e14 (2018)Key Performance Indicators for the Integration of the Service-Oriented Architecture and Scrum Process Model for IOT., , , , , , and . Sci. Program., (2021)Estimation of software features based birthmark., , , and . Clust. Comput., 21 (1): 333-346 (2018)User Interface Design for a Mobile Multimedia Application: An Iterative Approach., , , , , , , and . ACHI, page 189-194. IEEE Computer Society, (2008)Learning from Experience: The Analysis of an Extreme Programming Process.. ITNG, page 1405-1410. IEEE Computer Society, (2009)Agile User-Centered Design Applied to a Mobile Multimedia Streaming Application., , , , , , and . USAB, volume 5298 of Lecture Notes in Computer Science, page 313-330. Springer, (2008)Euclidean space based hierarchical clusterers combinations: an application to software clustering., , , and . Clust. Comput., 22 (Supplement): 7287-7311 (2019)Birthmark based identification of software piracy using Haar wavelet., , , , , , , and . Math. Comput. Simul., (2019)Modelling Features-Based Birthmarks for Security of End-to-End Communication System., , , , and . Secur. Commun. Networks, (2020)Editorial on decision support system for development of intelligent applications., , , and . Soft Comput., 26 (20): 10547-10551 (2022)