Author of the publication

Value-Based Multiple Software Projects Scheduling with Genetic Algorithm.

, , , , , and . ICSP, volume 5543 of Lecture Notes in Computer Science, page 50-62. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attacking the Dimensionality Problem of Parameterized Systems via Bounded Reachability Graphs., , , and . FSEN, volume 7141 of Lecture Notes in Computer Science, page 221-235. Springer, (2011)Matryoshka: A Coalesced Delta Sequence Prefetcher., , , and . ICPP, page 5:1-5:11. ACM, (2021)On Mobility of Software Processes., , , and . SPW/ProSim, volume 3966 of Lecture Notes in Computer Science, page 105-114. Springer, (2006)BehaviorKI: Behavior Pattern Based Runtime Integrity Checking for Operating System Kernel., , , and . QRS, page 13-24. IEEE, (2018)Designing and Modeling of Covert Channels in Operating Systems., , , , , and . IEEE Trans. Computers, 65 (6): 1706-1719 (2016)DRiVeR: Diagnosing Runtime Property Violations Based on Dependency Rules., , , and . SSIRI (Companion), page 194-201. IEEE Computer Society, (2011)An Algebraic Approach for Managing Inconsistencies in Software Processes, ., , , , , , , and . ICSP, volume 4470 of Lecture Notes in Computer Science, page 121-133. Springer, (2007)Creating Process-Agents incrementally by mining process asset library., , , , and . Inf. Sci., (2013)Automatic mining of change set size information from repository for precise productivity estimation., , , and . ICSSP, page 72-80. ACM, (2011)Secure Access Policy (SAP): Invisibly Executing Speculative Unsafe Accesses in an Isolated Environment., , , , , , and . ICCD, page 80-88. IEEE, (2022)