Found 164 results
Filters: First Letter Of Last Name is P [Clear All Filters]
A Serverless Architecture for Wireless Body Area Network Applications. Model-Based Safety and Assessment.
.
2019. A Data Security And Privacy Risk Management Framework For WBAN Based Healthcare Applications*. 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops).
.
2021. Towards Design and Development of a Data Security and Privacy Risk Management Framework for WBAN Based Healthcare Applications. Applied System Innovation. 4:76.
.
2021. SLA Non-compliance Detection and Prevention in Batch Jobs . International Conference on Enterprise Information Systems .
.
2018. Historical Markings in Neuroevolution of Augmenting Topologies Revisited. Theory and Practice of Natural Computing: 6th International Conference, TPNC 2017, Prague, Czech Republic, December 18-20, 2017, Proceedings.
.
2017. Topology-Aware Access Control of Smart Spaces. Computer. 50
.
2017. Adaptive evidence collection in the cloud using attack scenarios. Adaptive evidence collection in the cloud using attack scenarios.
.
2016. Automating Trade-Off Analysis of Security Requirements. Requirements Engineering.
.
2015. Topology Aware Adaptive Security. SEAMS 2014 Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing SystemsSEAMS 2014 Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.
.
2014. Requirements Engineering Meets Physiotherapy: An Experience with Motion-Based Games. 19th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2013)19th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2013).
.
2013. Requirements-Driven Adaptive Digital Forensics. 21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track.21th International Conference on Requirements Engineering (RE 2013), Posters & Demos Track..
.
2013. On the Role of Primary and Secondary Assets in Adaptive Security An Application in Smart Grids. 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems.
.
2012. SecurTAS A Tool for Engineering Adaptive Security. 20th International Symposium on Foundations of Software Engineering FSE 201220th International Symposium on Foundations of Software Engineering FSE 2012.
.
2012. Monitoring Fuzzy Temporal Requirements for Service Compositions: Motivations, Challenges and Experimental Results. Workshop on Requirements Engineering for Systems, Services, and Systems of Systems (RES^4), co-located with RE’11.
.
2011. Topology-Aware Access Control of Smart Spaces. Computer. 50:54-63.
.
2017. Towards Forensic-ready Software Systems. International Conference on Software Engineering (NIER track).
.
2018. Digital Age of Consent and Age Verification: Can They Protect Children? IEEE Software. :0-0.
.
2020. Extracting Interactions in Component Based Systems. IEEE Transactions on Software Engineering. 34(6)
.
2008. Tackling Society's Grand Challenges with Design Science . 11th International Conference, DESRIST .
.
2016. Prediction of Sudden Cardiac Death in Implantable Cardioverter Defibrillators: A Review and Comparative Study of Heart Rate Variability Features . Biomedical Engineering.
.
2019. Heart Rate Variability Analysis to Predict Onset of Ventricular Tachyarrhythmias in Implantable Cardioverter Defibrillators*. 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
.
2019. Prediction of paroxysmal atrial fibrillation using new heart rate variability features. Computers in Biology and Medicine. 133:104367.
.
2021. Twitter users generate better ideas. MIT Sloan Management Review.
.
2015. Middleware for internet of things: an evaluation in a small-scale IoT environment. Journal of Reliable Intelligent Environments. 4:3–23.
.
2018. Stigmergic Service Composition and Adaptation in Mobile Environments. Service-Oriented Computing.
.
2018.