Author of the publication

Runtime verification method for self-adaptive software using reachability of transition system model.

, , , , and . SAC, page 65-68. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Semantic Concept Mapping For Semantic Query Rewriting/Optimization In Ontology-Based Information Integration System., , , and . International Journal of Software Engineering and Knowledge Engineering, 14 (5): 519-542 (2004)Workflow Enactment Model for Next Generation Internet Services., , and . SNPD, page 47-54. ACIS, (2003)Multimedia information retrieval based on spatiotemporal relationships using description logics for the semantic web., , , , and . Int. J. Intell. Syst., 21 (7): 679-692 (2006)A Model for Extracting Keywords of Document Using Term Frequency and Distribution., and . CICLing, volume 2945 of Lecture Notes in Computer Science, page 437-440. Springer, (2004)Measuring Semantic Similarity Based on Weighting Attributes of Edge Counting., , , and . AIS, volume 3397 of Lecture Notes in Computer Science, page 470-480. Springer, (2004)Formal Verification of Bundle Authentication Mechanism in Osgi Service Platform: Ban Logic., , , and . Int. J. Softw. Eng. Knowl. Eng., 16 (2): 153-174 (2006)Runtime verification method for self-adaptive software using reachability of transition system model., , , , and . SAC, page 65-68. ACM, (2017)Method for Measuring Twitter Content Influence., , and . SEKE, page 659-664. Knowledge Systems Institute Graduate School, (2014)A data allocation considering data availability in distributed database systems., and . ICPADS, page 708-713. IEEE Computer Society, (1997)Access Control Policy Management Framework based on RBAC in OSGi Service Platform., , , and . CIT, page 161. IEEE Computer Society, (2006)