From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations., , и . AMCIS, Association for Information Systems, (2011)Advances in Software Engineering and Software Assurance., , и . Adv. Comput., (2016)Using a multi-level design method under DOD-STD-2167A., и . WADAS, стр. 21-37. ACM, (1989)Software Engineering: Graduate-Level Courses for AFIT Professional Continuing Education., и . CSEE, том 536 из Lecture Notes in Computer Science, стр. 114-126. Springer, (1991)Education Trends and Their Impact on Management of Software Engineering Education.. CSEE, том 895 из Lecture Notes in Computer Science, стр. 419-428. Springer, (1995)Requirements Definition for Survivable Network Systems., , и . ICRE, стр. 14-23. IEEE Computer Society, (1998)Designing Ada software for maintainability., , и . ICSM, стр. 214-215. IEEE, (1988)The role of software architecture in requirements engineering., , , , , и . ICRE, стр. 239-245. IEEE Computer Society, (1994)On the Feasibility of Specialization within Software Engineering Degree Programs., , , , и . CSEE&T, стр. 362-366. IEEE Computer Society, (2007)The Carnegie Mellon University Master of Software Engineering Specialization Tracks., , и . CSEE, стр. 100-118. IEEE Computer Society, (1996)