Author of the publication

Security Requirements Elicitation Using View Points for Online System.

, and . ICETET, page 1238-1243. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Effective Social Contagion: A Micro Level Analysis of the Impact of Dyadic Network Relationship., , , and . ICIS, Association for Information Systems, (2014)Spectral Inference Networks: Unifying Spectral Methods With Deep Learning, , , , and . (2018)cite arxiv:1806.02215.Static Automatic Batching In TensorFlow.. ICML, volume 97 of Proceedings of Machine Learning Research, page 92-101. PMLR, (2019)Online Search: Identifying New Investment Habitats., , , and . ICIS, Association for Information Systems, (2012)Genetic Programming for Wafer Property Prediction After Plasma Enhanced. Genetic Algorithms and Genetic Programming at Stanford 2000, Stanford Bookstore, Stanford, California, 94305-3079 USA, (June 2000)Design for Social Sharing: The Case of Mobile Apps., , and . Inf. Syst. Res., 34 (2): 721-743 (2023)Analytical Model for Message Propagation in Delay Tolerant Vehicular Ad Hoc Networks., , and . VTC Spring, page 3067-3071. IEEE, (2008)Network Analysis of Search Dynamics: The Case of Stock Habitats., , , and . Manag. Sci., 63 (8): 2667-2687 (2017)Directional communication system for short-range vehicular communications., , , , , , , and . VNC, page 231-238. IEEE, (2010)Spillovers in Open Innovation: The Case of Cryptocurrencies., , and . ICIS, Association for Information Systems, (2021)