Author of the publication

An Approach to Analyzing the Windows and Linux Security Models.

, , , and . ACIS-ICIS, page 56-62. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Use of heuristics in rule based class modeling., , and . CATA, page 173-176. ISCA, (2000)Basic Object Distribution for Mobile Environment., , and . SERA (selected papers), volume 430 of Studies in Computational Intelligence, page 127-140. Springer, (2012)A Testing Frameworks for Mobile Embedded Systems Using MDA., and . SERA (selected papers), volume 377 of Studies in Computational Intelligence, page 77-94. Springer, (2011)An Architecture Model for Component Composition and Integration., and . SNPD, page 12-19. ACIS, (2003)Development of Mobile Location-Based Systems with Component., and . SERA (selected papers), volume 296 of Studies in Computational Intelligence, page 103-113. Springer, (2010)Frameworks for Maturity Questionnaire Selection Model., and . SERA (selected papers), volume 253 of Studies in Computational Intelligence, page 135-143. Springer, (2009)An Architecture Model for Dynamically Converting Components into Web Services., , and . APSEC, page 648-654. IEEE Computer Society, (2004)Architectural View in Software Development Life-Cycle Practices., , and . ACIS-ICIS, page 194-199. IEEE Computer Society, (2007)On the Design and Implementation of Parallel Programs Through Coordination., , and . SERA, volume 3647 of Lecture Notes in Computer Science, page 156-170. Springer, (2004)A New Approach to Software Requirements Elicitation., , , , and . SNPD, page 32-42. IEEE Computer Society, (2005)