Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Location Information Privacy in Mobile Devices., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 361-372. Springer, (2013)Ontology for disaster mitigation and planning., , , , and . SCSC, page 26. Simulation Councils, Inc., (2007)A P2P, Agent-Based System of Systems Architecture for Cooperative Maritime Networks., , , , , , and . CCNC, page 1-2. IEEE, (2009)A model-based approach for design and verification of Industrial Internet of Things., , , , , and . Future Gener. Comput. Syst., (2019)A proposed sizing model for managing 3rd party code technical debt., and . TechDebt@ICSE, page 72-75. ACM, (2018)Verifying design modularity, hierarchy, and interaction locality using data clustering techniques., and . ACM Southeast Regional Conference, page 419-424. ACM, (2007)Understanding Scalability Issues for a Distributed Simulation Environment Using Intelligent Coordinated Entities., , , , and . Software Engineering Research and Practice, page 758-763. CSREA Press, (2005)Analyzing Organizational Structures Using Social Network Analysis., , , , and . CIAO! / EOMAS, volume 34 of Lecture Notes in Business Information Processing, page 143-156. Springer, (2009)An approach for comparison of IEC 61131-3 graphical programs., , , , , and . ETFA, page 1-8. IEEE, (2013)C-FaRM: A collaborative and context aware framework for requirements management., , and . MARK@RE, page 29-30. IEEE Computer Society, (2011)