Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Track Report of Validating Software for Critical Systems (VSC 2014)., and . WETICE, page 365. IEEE Computer Society, (2014)Automated Conformance Testing of Java Virtual Machines., and . CISIS, page 547-552. IEEE Computer Society, (2013)Reflections on Programming with Grid Toolkits., and . RAM-SE, page 3-8. Fakultät für Informatik, Universität Magdeburg, (2004)Assisting Replace Method with Method Object: Selecting Fields and Preserving Data Access., and . COMPSAC (2), page 552-557. IEEE Computer Society, (2018)978-1-5386-2667-2.A Cloud Oriented Support for Motion Detection in Video Surveillance Systems Using Computational Intelligence., and . ICIST, volume 639 of Communications in Computer and Information Science, page 453-463. (2016)Can We Process 2D Images Using Artificial Bee Colony?, , , , , and . ICAISC (1), volume 9119 of Lecture Notes in Computer Science, page 660-671. Springer, (2015)Smart Cities and Open WiFis: When Android OS Permissions Cease to Protect Privacy., , , and . IDCS, volume 11874 of Lecture Notes in Computer Science, page 457-467. Springer, (2019)Detecting Android Malware According to Observations on User Activities., , , and . WETICE, page 241-246. IEEE Computer Society, (2018)A Framework for Updating Functionalities Based on the MAPE Loop Mechanism., , , , and . COMPSAC (1), page 38-47. IEEE Computer Society, (2018)VSC Track Report., and . WETICE, page 346. IEEE Computer Society, (2013)