Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge Extraction Using Web Usage Mining., , , , and . EAI Endorsed Trans. Scalable Inf. Syst., 5 (16): e14 (2018)Estimation of software features based birthmark., , , and . Clust. Comput., 21 (1): 333-346 (2018)Learning from Experience: The Analysis of an Extreme Programming Process.. ITNG, page 1405-1410. IEEE Computer Society, (2009)User Interface Design for a Mobile Multimedia Application: An Iterative Approach., , , , , , , and . ACHI, page 189-194. IEEE Computer Society, (2008)Fuzzy logic based decision support system for component security evaluation., , , and . Int. Arab J. Inf. Technol., 15 (2): 224-231 (2018)Cyclomatic complexity: The nesting problem., , and . ICDIM, page 274-279. IEEE, (2013)Inside View of an Extreme Process., , , and . XP, volume 9 of Lecture Notes in Business Information Processing, page 226-227. Springer, (2008)Concept and Design of a Contextual Mobile Multimedia Content Usability Study., , , , , , and . ACHI, page 277-282. IEEE, (2009)Modelling Features-Based Birthmarks for Security of End-to-End Communication System., , , , and . Secur. Commun. Networks, (2020)Evaluating Security of Software Components Using Analytic Network Process., , , and . FIT, page 183-188. IEEE Computer Society, (2013)