Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved standard FPA method--resolving problems with upper boundaries in the rating complexity process., , , and . J. Syst. Softw., 77 (2): 81-90 (2005)Improving mobile operator information system efficiency through EAI., , , , and . Int. J. Inf. Technol. Manag., 3 (2/3/4): 315-332 (2004)A Preliminary Review of Blockchain-Based Solutions in Higher Education., , , and . LTEC, volume 1011 of Communications in Computer and Information Science, page 114-124. Springer, (2019)Password security - No change in 35 years?, , and . MIPRO, page 1360-1365. IEEE, (2014)Quantitative Management of OO Development., , , , and . ICEIS, page 452-460. (1999)Using Object Oriented Software Metrics for Mobile Application Development., , and . SQAMIA, volume 1053 of CEUR Workshop Proceedings, page 17-27. CEUR-WS.org, (2013)Performance Assesment Framework for Distributed Object Architectures., , , , , , and . ADBIS, volume 1691 of Lecture Notes in Computer Science, page 349-366. Springer, (1999)XML schema metrics for quality evaluation., , , and . Comput. Sci. Inf. Syst., 11 (4): 1271-1289 (2014)Differences between prospective, existing, and former users of interactive whiteboards on external factors affecting their adoption, usage and abandonment., , , and . Comput. Hum. Behav., (2017)An Ontology-Based Advisement Approach for SOA Design Patterns., , , , and . KMO, page 73-84. Springer, (2013)