Suchergebnisse
Katalog
Mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Weniger Treffer
Art der Quelle
Thema
- code generation 2 Treffer
- sdlc 2 Treffer
- security engineering 2 Treffer
- uml 2 Treffer
- academia 1 Treffer
-
45 weitere Werte:
- accessibility 1 Treffer
- automated software testing 1 Treffer
- change management 1 Treffer
- class diagram 1 Treffer
- cloud storage 1 Treffer
- component-based software engineering 1 Treffer
- computational linguistics 1 Treffer
- conceptual modeling 1 Treffer
- design 1 Treffer
- design analysis 1 Treffer
- design management 1 Treffer
- development process 1 Treffer
- disability 1 Treffer
- disabled people 1 Treffer
- elderly users 1 Treffer
- exploratory testing 1 Treffer
- failure analysis 1 Treffer
- formal methods 1 Treffer
- framework design 1 Treffer
- google map 1 Treffer
- gui testing 1 Treffer
- java 1 Treffer
- mda 1 Treffer
- methodologies 1 Treffer
- mobile applications 1 Treffer
- mvc architecture 1 Treffer
- natural language processing 1 Treffer
- natural language understanding 1 Treffer
- nlp 1 Treffer
- nlu 1 Treffer
- older adults 1 Treffer
- operational model 1 Treffer
- real-time systems 1 Treffer
- reliability 1 Treffer
- requirements 1 Treffer
- requirements analysis 1 Treffer
- reuse 1 Treffer
- reverse engineering 1 Treffer
- rfid 1 Treffer
- se 1 Treffer
- security 1 Treffer
- security requirement 1 Treffer
- smart phone app 1 Treffer
- social network system 1 Treffer
- software architecture 1 Treffer
Verlag
Publikation
Inhaltsanbieter
23 Treffer
-
In: International Journal of Advanced Science and Technology, Jg. 24 (2010-11-30), S. 17-26academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 10 (2016-12-31), Heft 12, S. 389-396academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 10 (2016-09-30), Heft 9, S. 149-162academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 9 (2016-07-30), Heft 7, S. 347-352academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 10 (2016-04-30), Heft 4, S. 143-160academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 10 (2016-03-31), Heft 3, S. 83-94academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-11-30), Heft 11, S. 55-70academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-07-30), Heft 7, S. 11-26academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 9 (2015-02-28), Heft 2, S. 107-124academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 8 (2014-11-30), Heft 11, S. 197-208academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 8 (2014-10-30), Heft 10, S. 95-114academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 7 (2014-09-30), Heft 5, S. 317-322academicJournalZugriff:
-
In: International Journal of Hybrid Information Technology, Jg. 7 (2014-07-30), Heft 4, S. 29-42academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 8 (2014-06-30), Heft 6, S. 287-298academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 8 (2014-04-30), Heft 4, S. 137-146academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 7 (2013-09-30), Heft 5, S. 197-208academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 6 (2012-01-30), Heft 1, S. 61-74academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 5 (2011-07-30), Heft 3, S. 47-62academicJournalZugriff:
-
In: International Journal of Software Engineering and Its Applications, Jg. 5 (2011-04-30), Heft 2, S. 123-134academicJournalZugriff:
-
In: 보안공학연구논문지, Jg. 7 (2010-12-30), Heft 6, S. 645-655academicJournalZugriff: