Author of the publication

Automatic Recommendation of Quality Requirements for Software Services.

, , , , and . ICEBE, page 679-685. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Tzu-Ying Chen University of Stuttgart

Replication Data for: Structural development of a novel punctually supported timber building system for multi-storey construction : Experimental Data: Tension Tests of the Edge Connection, , , , , and . Dataset, (2024)Related to: Anna Krtschil, Luis Orozco, Simon Bechert, Hans Jakob Wagner, Felix Amtsberg, Tzu-Ying Chen, Anand Shah, Achim Menges, Jan Knippers, "Structural development of a novel punctually supported timber building system for multi-storey construction", Journal of Building Engineering, Volume 58, 2022, pages 104972. doi: 10.1016/j.jobe.2022.104972.
 

Other publications of authors with the same name

Dynamic Difficulty Adjustment in Computer Games Through Real-Time Anxiety-Based Affective Feedback., , , and . Int. J. Hum. Comput. Interaction, 25 (6): 506-529 (2009)Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities., , , , , , and . NDSS, The Internet Society, (2006)A dynamic-encryption authentication scheme for M2M security in cyber-physical systems., and . GLOBECOM, page 2897-2901. IEEE, (2013)Security Vulnerabilities - From Data Analysis to Protection Mechanisms., , , and . WORDS Fall, page 331-338. IEEE Computer Society, (2003)A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities., , , and . DSN, page 605-614. IEEE Computer Society, (2003)Securing Multiparty Online Services Via Certification of Symbolic Transactions., , , and . IEEE Symposium on Security and Privacy, page 833-849. IEEE Computer Society, (2015)Brahmastra: Driving Apps to Test the Security of Third-Party Components., , , , , , , , and . USENIX Security Symposium, page 1021-1036. USENIX Association, (2014)An Adaptive Framework for Multi-Vehicle Ground Speed Estimation in Airborne Videos., , , , , and . Remote Sensing, 11 (10): 1241 (2019)An Easily Fabricated Linear Piezoelectric Actuator Using Sandwich Longitudinal Vibrators With Four Driving Feet., , , , and . IEEE Access, (2019)Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks., , , and . IEEE Internet of Things Journal, 4 (1): 29-39 (2017)