Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach for Requirements Elicitation using Goal, Question, and Answer., , , and . IIAI-AAI, page 847-852. IEEE, (2019)A Proposal for Developing EA Models toward Innovation., , , and . IIAI-AAI, page 853-858. IEEE, (2019)IMAF: A Visual Innovation Methodology Based on ArchiMate Framework., , , and . Int. J. Enterp. Inf. Syst., 16 (1): 31-52 (2020)Fault-Prone Module Prediction Using a Prediction Model and Manual Inspection., , and . APSEC (1), page 106-115. IEEE Computer Society, (2013)978-1-4799-2143-0.Detecting Source Code Hotspot in Games Software Using Call Flow Analysis., , , and . SNPD, page 484-489. IEEE, (2019)A Composite Dependability for Enterprise Architecture., , and . KES, volume 126 of Procedia Computer Science, page 1130-1137. Elsevier, (2018)An Exploratory Study on the Impact of Usage of Screenshot in Software Inspection Recording Activity., , and . IWSM/Mensura, page 251-256. IEEE Computer Society, (2011)Mobile Security Assurance for Automotive Software Through ArchiMate., , and . MobiSec, volume 797 of Communications in Computer and Information Science, page 10-20. Springer, (2016)A Heuristic Rule Reduction Approach to Software Fault-proneness Prediction., , , , and . APSEC, page 838-847. IEEE, (2012)Analyzing Factors of Defect Correction Effort in a Multi-Vendor Information System Development., , , and . J. Comput. Inf. Syst., 49 (1): 73-80 (2008)