Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The impact of stressors on the relationship between personality traits, knowledge collection behaviour and programmer creativity intention in software engineering., , , , , and . Inf. Softw. Technol., (November 2023)Formalizing an abstract architecture for the alternative data source utilized during system availability under intrusion threat., , , and . ICWCA, page 1-6. IEEE, (2012)Graphical authentication based on anti-shoulder surfing mechanism., , , and . ICFNDS, page 20:1-20:6. ACM, (2018)A Review of Prominent Work on Agile Processes Software Process Improvement and Process Tailoring Practices., , and . ICSECS (3), volume 181 of Communications in Computer and Information Science, page 571-585. Springer, (2011)An edge-wise linear shortest path algorithm for non negative weighted undirected graphs., , , , and . FIT, page 67:1-67:4. ACM, (2009)Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR)., , , , , and . Clust. Comput., 26 (5): 2657-2680 (October 2023)A meta-model of software development project states behavioral study of software projects., , and . J. Softw. Evol. Process., (2017)Mechanism to continue system availability during cyber threat scenario., , , , , and . IMCOM, page 92. ACM, (2017)Tailoring Agile-Based Software Development Processes.. IEEE Access, (2019)