Author of the publication

Requirements Elicitation by Defect Elimination: An Indian Logic Perspective.

, and . Int. J. Softw. Sci. Comput. Intell., 1 (2): 73-90 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twitter Sentiment Analysis for Large-Scale Data: An Unsupervised Approach., , and . Cogn. Comput., 7 (2): 254-262 (2015)On the Expressive Power of Scientific Manuscripts., , and . IEEE Trans. Emerg. Top. Comput., 9 (1): 269-279 (2021)Gurukulam: Reasoning based Learning System using Extended Description Logics., and . Int. J. Comput. Sci. Appl., 5 (1): 14-32 (2008)Simulation of Fire Rescue with Fire Spread using Autonomous Robot Swarms., , , and . IICAI, page 616-629. IICAI, (2009)Enhancement of co-authorship networks with content-similarity information., , and . ICACCI, page 1225-1228. ACM, (2012)Provenance based Trust computation for Recommendation in Social Network., , and . ICIA, page 114:1-114:7. ACM, (2016)Requirements Elicitation by Defect Elimination: An Indian Logic Perspective., and . Int. J. Softw. Sci. Comput. Intell., 1 (2): 73-90 (2009)Identifying trusted similar users using stochastic model and next-closure based knowledge model in online social networks., , and . Clust. Comput., 22 (6): 14625-14635 (2019)A Survey of Tools for Community Detection and Mining in Social Networks., , and . ICIA, page 71:1-71:8. ACM, (2016)Gautama - Ontology Editor Based on Nyaya Logic., , , , and . ICLA, volume 5378 of Lecture Notes in Computer Science, page 232-242. Springer, (2009)