Author of the publication

An Authentication Method with Spatiotemporal Interval and Partial Matching.

, , , , , , and . SNPD, page 535-542. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Script-to-Script Interactions in Call Processing Language., , , and . FIW, page 215-230. IOS Press, (2003)A Model-based Approach for Software Test Process Improvement., , , , , and . Software Quality and Productivity, volume 3 of IFIP Conference Proceedings, page 300-307. Chapman & Hall, (1994)Software Education should go from Synthesis to Analysis by a Measurenment Enviroment., and . Software Engineering Education, volume A-40 of IFIP Transactions, page 245-253. North-Holland, (1993)Design and Evaluation of the Home Network Systems Using the Service Oriented Architecture., , and . ICETE (1), page 62-69. INSTICC Press, (2004)Using search-based metric selection and oversampling to predict fault prone modules., , , , and . CCECE, page 1-6. IEEE, (2010)An analysis of developer metrics for fault prediction., , , , and . PROMISE, page 18. ACM, (2010)A Study on the Failure Intensity of Different Software Faults., , , and . ICSE, page 86-94. ACM, (1997)Detecting low usability web pages using quantitative data of users' behavior., , , and . ICSE, page 569-576. ACM, (2006)Are good code reviewers also good at design review?, , and . ESEM, page 351-353. ACM, (2008)A wearable interface for visualizing coauthor networks toward building a sustainable research community., , , and . AVI, page 492-495. ACM Press, (2006)