Author of the publication

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation.

, , , and . JIPS, 1 (1): 79-85 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-Role Based Access Control for Context-Aware Application., , and . HPCC, volume 4208 of Lecture Notes in Computer Science, page 572-580. Springer, (2006)Context-Aware Security Management System for Pervasive Computing Environment., , and . CONTEXT, volume 4635 of Lecture Notes in Computer Science, page 384-396. Springer, (2007)Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems., , , and . APNOMS, volume 5787 of Lecture Notes in Computer Science, page 375-384. Springer, (2009)Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor Networks., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 195-206. Springer, (2007)N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks., , , and . ICCSA (2), volume 4706 of Lecture Notes in Computer Science, page 1107-1120. Springer, (2007)Energy-Efficient Distance Based Clustering Routing Scheme for Long-Term Lifetime of Multi-hop Wireless Sensor Networks., , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 543-546. Springer, (2007)Driving Control by Based upon the Slip Pattern of the Ball Robot., , , , and . ICIRA (1), volume 9834 of Lecture Notes in Computer Science, page 334-342. Springer, (2016)Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation., , , and . JIPS, 1 (1): 79-85 (2005)Toward a stress-based topology optimization procedure with indirect calculation of internal finite element information., , , and . Computers & Mathematics with Applications, 66 (6): 1065-1081 (2013)Architecture of Context-Aware Integrated Security Management Systems for Smart Home Environment., , , , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 102-111. Springer, (2007)