Author of the publication

Blockchain Access Control Ecosystem for Big Data Security.

, , , and . iThings/GreenCom/CPSCom/SmartData, page 1373-1378. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining duplicate questions in stack overflow., , , and . MSR, page 402-412. ACM, (2016)Investigating the relationship between evolutionary coupling and software bug-proneness., , , and . CASCON, page 173-182. ACM, (2019)Unveiling the Potential of Large Language Models in Generating Semantic and Cross-Language Clones., , , , , and . IWSC, page 22-28. IEEE, (2023)Requirements Engineering and the Creative Process in the Video Game Industry., , and . RE, page 240-252. IEEE Computer Society, (2005)Balancing Security Requirements and Emotional Requirements in Video Games., , and . RE, page 319-320. IEEE Computer Society, (2008)An Introduction to Experience Requirements., , and . RE, page 395-396. IEEE Computer Society, (2010)Automatic Identification of Important Clones for Refactoring and Tracking., , and . SCAM, page 11-20. IEEE Computer Society, (2014)Task Model Simulation Using Interaction Templates., and . DSV-IS, volume 3941 of Lecture Notes in Computer Science, page 78-89. Springer, (2005)Blockchain Access Control Ecosystem for Big Data Security., , , and . iThings/GreenCom/CPSCom/SmartData, page 1373-1378. IEEE, (2018)Group awareness in distributed software development., , and . CSCW, page 72-81. ACM, (2004)