From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Methodologies for the development of knowledge-based systems, 1982-2002., и . Knowledge Eng. Review, 18 (1): 47-81 (2003)An architecture for cross-cloud auditing., и . CSIIRW, стр. 4. ACM, (2013)Crossing the Adaptation Boundaries of Distinct Testbeds., и . FAS*W@SASO/ICAC, стр. 36-39. IEEE, (2019)Trust in Software: Attributes of Computer Code and the Human Factors that Influence Utilization Metrics., , , , , , , и . HCI (33), том 1032 из Communications in Computer and Information Science, стр. 190-196. Springer, (2019)Augmentation of Services with Semantic Meta-Information in the Physical Web., , и . ICC Workshops, стр. 1-6. IEEE, (2018)Practical DoS Attacks on Embedded Networks in Commercial Vehicles., , , , и . ICISS, том 10063 из Lecture Notes in Computer Science, стр. 23-42. Springer, (2016)Evaluating Security Assurance Case Adaptation., , и . HICSS, стр. 1-10. ScholarSpace, (2019)Software Development for Self-Adaptation in Services, Wearables, and IoT Devices., и . HICSS, стр. 1. ScholarSpace, (2019)Examining Collaboration among Student Teams relying on Web Applications to Coordinate Software Development., , , , и . HICSS, стр. 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)Toward Predicting Secure Environments for Wearable Devices., , , , и . HICSS, стр. 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)