Author of the publication

An End-User Development Approach to Secure Smart Environments.

, , , , and . IS-EUD, volume 12724 of Lecture Notes in Computer Science, page 36-52. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guaranteeing integrity constraints during interactive map editing with visual language parsing., , and . ICDIM, page 19-24. IEEE, (2007)Automating Conceptual Schema Reconciliation through a DL-based Schema Matcher., , and . SEBD, page 48-59. Curran Associates, Inc., (2015)Petroglyph Classification using the Image Distortion Model., , and . VAST, page 1-8. Eurographics Association, (2012)Using extended positional grammars to develop visual modeling languages., , , and . SEKE, page 201-208. ACM, (2002)Using Error Recovery Techniques to Improve Sketch Recognition Accuracy., , and . GREC, volume 5046 of Lecture Notes in Computer Science, page 157-168. Springer, (2007)Visual data integration based on description logic reasoning., , and . IDEAS, page 19-28. ACM, (2014)Learning Effective Query Management Strategies from Big Data., , and . ICMLA, page 643-648. IEEE, (2017)Discovering Relaxed Functional Dependencies based on Multi-attribute Dominance Extended Abstract., , , and . ICDE, page 2354-2355. IEEE, (2021)On the User Perception of Security Risks of TAP Rules: A User Study., , , , and . IS-EUD, volume 13917 of Lecture Notes in Computer Science, page 162-179. Springer, (2023)Democratizing Cybersecurity in Smart Environments: Investigating the Mental Models of Novices and Experts., , , and . IS-EUD, volume 13917 of Lecture Notes in Computer Science, page 145-161. Springer, (2023)