Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ada and the evolution of software engineering., , , and . TRI-Ada, page 56-71. ACM, (1995)Understanding Software Engineering Failure as Part of the SWEBOK.. CSEE&T, page 191-. IEEE Computer Society, (2001)Automatic indexing using selective NLP and first-order thesauri., , , , and . RIAO, page 624-643. CID, (1991)Can Cybersecurity Be Proactive? A Big Data Approach and Challenges., , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Predicting and fixing vulnerabilities before they occur: a big data approach., , , and . BIGDSE@ICSE, page 72-75. ACM, (2016)Annotations and collaboration: One in service of the other., and . IWAC, page 73-82. CNRS - Programme société de l'information, (2005)Collaborative Technology in the Learning Organization: Integrating Process with Information Flow, Access, and Interpretation., and . HICSS (1), page 444-. IEEE Computer Society, (1998)Software engineering as seen through its research literature: A study in co-word analysis, , and . Journal of the American Society for Information Science, 49 (13): 1206-1223 (1998)Boundary Objects and Prototypes at the Interfaces of Engineering Design., , , , , and . Comput. Support. Cooperative Work., 12 (2): 185-203 (2003)