Author of the publication

Requirements Negotiation Using Multi-Criteria Preference Analysis.

, and . J. UCS, 10 (4): 306-325 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A seamless lawful interception architecture for mobile users in IEEE 802.16e networks., , , , and . Journal of Communications and Networks, 11 (6): 626-633 (2009)Adaptive pattern mining model for early detection of botnet-propagation scale., , , , and . Security and Communication Networks, 5 (8): 917-927 (2012)Probabilistic Approach to Predicting Risk in Software Projects Using Software Repository Data., , and . International Journal of Software Engineering and Knowledge Engineering, 25 (6): 1017-1032 (2015)An adaptive loss protection for video transmission over content-centric networks., , and . Multimedia Tools Appl., 74 (19): 8279-8292 (2015)Customer Requirements Elicitation based on Social Network Service., , , , and . TIIS, 5 (10): 1733-1750 (2011)Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks., , , and . TIIS, 8 (11): 3775-3788 (2014)Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing., , , and . MUE, page 384-389. IEEE Computer Society, (2008)Scalable attack graph for risk assessment., , and . ICOIN, page 1-5. IEEE, (2009)Conflict Resolution Model Based on Weight in Situation Aware Collaboration System., , , and . FTDCS, page 99-106. IEEE Computer Society, (2007)Mobile user-preference-based data dissemination on mobile P2P networks., , and . EURASIP J. Wireless Comm. and Networking, (2011)