From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Using uml to visualize role-based access control constraints., , , и . SACMAT, стр. 115-124. ACM, (2004)Limitations of Agile Software Processes., , и . CoRR, (2014)Assumptions Underlying Agile Software Development Processes., , и . CoRR, (2014)Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations., , , , и . DBSec, том 7964 из Lecture Notes in Computer Science, стр. 97-112. Springer, (2013)Tool Support for Aspect-Oriented Design., , и . OOIS Workshops, том 2426 из Lecture Notes in Computer Science, стр. 280-289. Springer, (2002)Is a Precise Semantics Desirable? For What Purpose?, , , и . ECOOP Workshops, том 1743 из Lecture Notes in Computer Science, стр. 37-40. Springer, (1999)Modeling for the cloud., и . Softw. Syst. Model., 9 (2): 139-140 (2010)Report on the First Workshop On the Globalization of Modeling Languages., , , , , , , , и . CoRR, (2014)Supporting Community-Driven Evolution of Model-Driven Development Knowledge Using ReMoDD.. ECBS, стр. 3. IEEE Computer Society, (2011)Decomposing feature models: language, environment, and applications., , , и . ASE, стр. 600-603. IEEE Computer Society, (2011)