Author of the publication

Reflection on Software Architecture Practices - What Works, What Remains to Be Seen, and What Are the Gaps.

, , and . WICSA, page 221-222. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework of Combining Intrusion Detection and Continuous Authentication in Mobile Ad Hoc Networks., , , and . ICC, page 1515-1519. IEEE, (2008)Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis., and . SEKE, page 418-423. (2005)A TCP Connection Establishment Filter: Symmetric Connection Detection., , and . ICC, page 247-253. IEEE, (2007)Secure Routing in IoT: Evaluation of RPL Secure Mode under Attacks., , and . CoRR, (2019)Experience on Building an Architecture Level Adaptable System., and . CAiSE Workshops, volume 112 of Lecture Notes in Business Information Processing, page 171-179. Springer, (2012)Load Balancing Using ECMP in Multi-Stage Clos Topology in a Datacenter., and . DSC, page 1-7. IEEE, (2018)A Green Computing Based Architecture Comparison and Analysis., , and . GreenCom/CPSCom, page 386-391. IEEE Computer Society, (2010)An XPath Query Aggregation Algorithm Using a Region Encoding., , and . SAINT, page 27-36. IEEE Computer Society, (2011)A Comparative Evaluation of Computation Offloading for Mobile Applications., , and . iThings/GreenCom/CPSCom, page 518-525. IEEE Computer Society, (2014)Towards Efficient Software Deployment in the Cloud Using Requirements Decomposition., , and . CloudCom (2), page 100-105. IEEE Computer Society, (2013)978-0-7695-5095-4.