Author of the publication

An API-based Search System for One Click Access to Information.

, , and . NTCIR, National Institute of Informatics (NII), (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Business Ecosystem Architecture Modeling Framework., , , and . CBI (1), page 147-156. IEEE, (2019)Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach., , , , , , and . TCPS, 3 (2): 18:1-18:24 (2019)ArgueSecure: Out-of-the-Box Security Risk Assessment., , , and . RE Workshops, page 74-79. IEEE Computer Society, (2016)Value-Driven Risk Analysis of Coordination Models., , , and . PoEM, volume 267 of Lecture Notes in Business Information Processing, page 102-116. Springer, (2016)An information fusion approach for filtering GNSS data sets collected during construction operations., , , , , , and . Advanced Engineering Informatics, 28 (4): 297-310 (2014)A Study on Tangible Participative Enterprise Modelling., , , and . ER Workshops, volume 9975 of Lecture Notes in Computer Science, page 139-148. (2016)Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group., , , and . ER, volume 9381 of Lecture Notes in Computer Science, page 558-565. Springer, (2015)Towards Security Requirements: Iconicity as a Feature of an Informal Modeling Language., , , , and . REFSQ Workshops, volume 1796 of CEUR Workshop Proceedings, CEUR-WS.org, (2017)Context-sensitive Information security Risk identification and evaluation techniques.. RE, page 485-488. IEEE Computer Society, (2014)Automated Identification and Prioritization of Business Risks in e-service Networks., , and . IESS, volume 247 of Lecture Notes in Business Information Processing, page 547-560. Springer, (2016)