Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Translating Security Policy to Executable Code for Sandboxing Linux Kernel., , , and . EMS, page 124-129. IEEE Computer Society, (2009)A model-based approach for design and verification of Industrial Internet of Things., , , , , and . Future Generation Comp. Syst., (2019)Ontology for disaster mitigation and planning., , , , and . SCSC, page 26. Simulation Councils, Inc., (2007)Supporting Location Information Privacy in Mobile Devices., , and . ICDCIT, volume 7753 of Lecture Notes in Computer Science, page 361-372. Springer, (2013)Development of Generalized HPC Simulator., , , and . ICDCIT, volume 5966 of Lecture Notes in Computer Science, page 176-179. Springer, (2010)C-FaRM: A collaborative and context aware framework for requirements management., , and . MARK@RE, page 29-30. IEEE Computer Society, (2011)A proposed sizing model for managing 3rd party code technical debt., and . TechDebt@ICSE, page 72-75. ACM, (2018)Experiences applying automated architecture analysis tool suites., , , , , and . ASE, page 779-789. ACM, (2018)Verifying design modularity, hierarchy, and interaction locality using data clustering techniques., and . ACM Southeast Regional Conference, page 419-424. ACM, (2007)On adopting multi-criteria decision-making approaches for variability management in software product lines., and . SPLC (2), page 32-35. ACM, (2012)