Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inspection effectiveness for different quality attributes of software requirement specifications: An industrial case study., , and . WoSQ@ICSE, page 15-21. IEEE Computer Society, (2009)Online Intrusion Alert Aggregation with Generative Data Stream Modeling., and . IEEE Trans. Dependable Sec. Comput., 8 (2): 282-294 (2011)An FPGA based on-board processor platform for space application., , , and . AHS, page 17-22. IEEE, (2012)Filterless TRF Reader with CMOS Sensor ASIC for Lateral Flow Immunoassays., , , , , , , , and . BioCAS, page 1-6. IEEE, (2021)Intrusion Detection in Computer Networks with Neural and Fuzzy Classifiers., , and . ICANN, volume 2714 of Lecture Notes in Computer Science, page 316-324. Springer, (2003)Assessments in global software development: a tailorable framework for industrial projects., , and . ICSE (2), page 29-38. ACM, (2010)978-1-60558-719-6.A Holistic Software Engineering Method for Service-Oriented Application Landscape Development., , , , and . PRET, volume 28 of Lecture Notes in Business Information Processing, page 1-17. Springer, (2009)Alarmaggregation und Interessantheitsbewertung in einem dezentralisierten Angriffserkennungssystem.. University of Passau, (2012)Software Controlling., , , and . Informatik Spektrum, 31 (6): 556-565 (2008)Will There be Light? - Simulative Prediction of Fluorescence Measurements., , and . SMACD, page 157-160. IEEE, (2019)