Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Software Project Management Framework., , , , , , , , and . IS Management, 21 (2): 78-85 (2004)Fuzzy reasoning in K-means classification method., , and . EUSFLAT-ESTYLF Joint Conf., page 275-278. Universitat de les Illes Balears, Palma de Mallorca, Spain, (1999)XBRL formula specification in the multidimensional data model., , and . Inf. Syst., (2016)A process reference model for managing living labs for ICT innovation: A proposal based on ISO/IEC 15504., , , and . Computer Standards & Interfaces, 36 (1): 33-41 (2013)Preserving Relationship Cardinality Constraints in Relational Schemata., , , , and . Database Integrity, Idea Group, (2002)An OCL-Based Approach to Derive Constraint Test Cases for Database Applications., , , and . International Journal of Software Engineering and Knowledge Engineering, 21 (5): 621-645 (2011)Analyzing Wavelets Components to Perform Face Recognition., , and . IWANN (2), volume 2085 of Lecture Notes in Computer Science, page 262-270. Springer, (2001)Automatic generation of domain representations using thesaurus structures., , , , and . J. Assoc. Inf. Sci. Technol., 55 (10): 846-858 (2004)Ten factors that impede improvement of verification and validation processes in software intensive organizations., , , and . Software Process: Improvement and Practice, 13 (4): 335-343 (2008)A Secure Perspective of Data. Including Authentication in the NewsML DTD., , , and . ICWI, page 791-794. IADIS, (2002)