From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Understanding User Engagement With Multi-Representational License Comprehension Interfaces., , и . Int. J. Open Source Softw. Process., 11 (4): 27-45 (2020)Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal Compliance., , и . DASC/PiCom/DataCom/CyberSciTech, стр. 657-662. IEEE Computer Society, (2017)Ontology-based Active Requirements Engineering Framework., и . APSEC, стр. 481-490. IEEE Computer Society, (2005)Incorporating Multimedia Source Materials into a Traceability Framework., , , и . MERE, стр. 7. IEEE Computer Society, (2006)The Hidden Crisis : Developing Smart Big Data pipelines to address Grand Challenges of Bridge Infrastructure health in the United States., , , , и . ISCRAM, ISCRAM Association, (2018)Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment., и . RE, стр. 231-240. IEEE Computer Society, (2007)Forecasting the Spread of Mosquito-Borne Disease using Publicly Accessible Data: A Case Study in Chikungunya., , , , , , и . AMIA, AMIA, (2016)A social dimensional cyber threat model with formal concept analysis and fact-proposition inference., , , , и . Int. J. Inf. Comput. Secur., 5 (4): 301-333 (2013)Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political., , , , , и . IEEE Technol. Soc. Mag., 30 (1): 28-38 (2011)Open Data Standards for Open Source Software Risk Management Routines: An Examination of SPDX., , и . GROUP, стр. 219-229. ACM, (2018)