Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design Patterns for Web Services., , , and . SNPD, page 342-348. IEEE Computer Society, (2004)Is teaching with security in mind working?, and . InfoSecCD, page 15-20. ACM, (2010)Introducton to Android development, and . J. Comput. Sci. Coll., 28 (2): 224--224 (December 2012)On Inter-Method and Intra-Method Object-Oriented Class Cohesion., , , and . IJITSA, 2 (1): 15-32 (2009)Software protection with increased complexity and obfuscation., , and . ACM Southeast Regional Conference, page 341-342. ACM, (2012)A Smart Pointer Technique for Distributed Spatial Databases., , and . IEA/AIE, volume 1821 of Lecture Notes in Computer Science, page 645-650. Springer, (2000)Essentials of software engineering., and . Jones and Bartlett Publishers, (2007)Poster: Issues in functional characterization and clustering of genes by literature mining., , and . ICCABS, page 239. IEEE Computer Society, (2011)Optimizing distributed spatial joins using R-Trees., and . ACM Southeast Regional Conference (1), page 222-226. ACM, (2005)Teaching with security in mind., and . ACM Southeast Regional Conference, ACM, (2009)