Author of the publication

Evaluating the Potential of Technology in Justice Systems Using Goal Modeling.

, , and . MCETECH, volume 289 of Lecture Notes in Business Information Processing, page 185-202. (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intensional High Performance Computing., , , and . DCW, volume 1830 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)Identifying Good Connections in an Unstructured Peer-to-Peer Network: The Case of Gnutella., , and . IICS, volume P-186 of LNI, page 48-59. GI, (2011)A Structured Peer-to-Peer System with Integrated Index and Storage Load Balancing., , and . IICS, volume 3908 of Lecture Notes in Computer Science, page 41-52. Springer, (2005)SoftwIre Integration - An Onto-Neural Perspective., , and . MCETECH, volume 78 of Lecture Notes in Business Information Processing, page 116-130. Springer, (2011)A Context-Dependent XML Compression Approach to Enable Business Applications on Mobile Devices., , and . Euro-Par, volume 4641 of Lecture Notes in Computer Science, page 911-920. Springer, (2007)An Agent-Based Architecture For Georeferenced Digital Library Interoperability., , , and . Intell. Autom. Soft Comput., 6 (3): 225-231 (2000)A Communication Framework Towards Flexible Associations of Businesses in Evolving Environments., , and . I3E, volume 139 of IFIP, page 175-186. Kluwer/Springer, (2003)SecAdvise: A Security Mechanism Advisor., , and . DCW, volume 2468 of Lecture Notes in Computer Science, page 35-41. Springer, (2002)Analysing a Segmentation Pricing Strategy for ERP Systems under Diffusion Patterns., , , , and . CENTERIS (1), volume 109 of Communications in Computer and Information Science, page 121-130. Springer, (2010)Metadatabase Meets Distributed AI., , and . CIA, volume 1202 of Lecture Notes in Computer Science, page 138-147. Springer, (1997)