From post

Understanding the Role of Formal Specification Techniques in Requirements Engineering.

, и . CSEE, том 895 из Lecture Notes in Computer Science, стр. 207-221. Springer, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Policies in Object-Oriented Databases., , , и . DBSec, стр. 257-268. North-Holland, (1989)Guidelines for Formalizing Fusion Object-Oriented Analysis Methods ., , , и . CAiSE, том 1080 из Lecture Notes in Computer Science, стр. 222-233. Springer, (1996)Patterns and Pattern Diagrams for Access Control., , и . TrustBus, том 5185 из Lecture Notes in Computer Science, стр. 38-47. Springer, (2008)Online Access and Control of Laboratory Stations using Video Conference Systems., , и . FIE, стр. 1-7. IEEE, (2021)xAPI-Based Model for Tracking On-line Laboratory Applications., и . FIE, стр. 1-9. IEEE, (2018)Design of a Latin American and Caribbean remote laboratories network., и . FIE, стр. 1-5. IEEE Computer Society, (2016)Some Security Issues of Wireless Systems., , , и . ISSADS, том 3563 из Lecture Notes in Computer Science, стр. 388-396. Springer, (2005)Approaches to teaching introductory computer graphics., , , , и . SIGGRAPH, стр. 479-480. ACM, (1994)Understanding the Role of Formal Specification Techniques in Requirements Engineering., и . CSEE, том 895 из Lecture Notes in Computer Science, стр. 207-221. Springer, (1995)Towards a Rigorous Object-Oriented Analysis and Design Method., , , , и . ICFEM, стр. 7-16. IEEE Computer Society, (1997)