From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning to adapt requirements specifications of evolving systems., , , и . ICSE, стр. 856-859. ACM, (2011)Automatic detection of nocuous coordination ambiguities in natural language requirements., , , и . ASE, стр. 53-62. ACM, (2010)Degradation archaeology: studying software flaws' evolution., , и . EVOL, стр. 119-125. (2006)Expressing the Relationships Between Multiple Views in Requirements Specification., , и . ICSE, стр. 187-196. IEEE Computer Society / ACM Press, (1993)The Learning Grid and E-Assessment using Latent Semantic Analysis., , , , и . Towards the Learning Grid, том 127 из Frontiers in Artificial Intelligence and Applications, IOS Press, (2005)Values@Runtime: An Adaptive Framework for Operationalising Values., , , и . ICSE (SEIS), стр. 175-179. IEEE, (2023)Towards Adaptive Inspection for Fraud in I4.0 Supply Chains., , , , , и . ETFA, стр. 1-8. IEEE, (2021)When Agents Clash.. EWSPT, том 1149 из Lecture Notes in Computer Science, стр. 237-240. Springer, (1996)Talking about security with professional developers., , , , , и . CESSER-IP@ICSE, стр. 34-40. IEEE / ACM, (2019)Cautious Adaptation of Defiant Components., , , , , и . ASE, стр. 974-985. IEEE, (2019)