Author of the publication

Evaluation of virtual learning environments for the teaching of students with down syndrome.

, , , and . SMC, page 1179-1184. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Model Generation for Cloud Infrastructure Planning., , , , , and . SMC, page 4098-4103. IEEE, (2013)Execution Support to Long Running Workflows., , and . CIT, page 496-503. IEEE Computer Society, (2014)Modeling and Executing Business Processes with Annotated Security Requirements in the Cloud., , , , , , , , , and . ICWS, page 137-144. IEEE Computer Society, (2011)Towards Generating Richer Code by Binding Security Abstractions to BPMN Task Types., , , , , , , , , and 1 other author(s). RITA, 16 (2): 97-98 (2009)Realizing Quality Attributes of Service-Based Business Processes: A Model-Driven Approach., , and . CIT, page 450-457. IEEE Computer Society, (2014)Sec-MoSC Tooling - Incorporating Security Requirements into Service Composition., , , , , , , , , and 1 other author(s). ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 649-650. (2009)Dependability evaluation of cloud infrastructures., , , , and . SMC, page 1282-1287. IEEE, (2014)An Approach for Reducing the Gap between BPMN Models and Implementation Artifacts., , , , , , , , , and 1 other author(s). RITA, 16 (2): 83-86 (2009)Compliance Evaluation of Cryptographic Security Requirements on IoT Gateways., , , , , and . LADC, page 67-72. ACM, (2022)Integration and Evaluation of Blockchain Consensus Algorithms for IoT Environments., , and . AINA (2), volume 654 of Lecture Notes in Networks and Systems, page 1-13. Springer, (2023)