Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Selecting and Recommending Online Software Services by Evaluating External Attributes., and . CISRC, page 23:1-23:4. ACM, (2016)Editorial message: special track on the programming languages and object technologies., and . SAC, page 925-926. ACM, (2002)Marshaling and unmarshaling models using the entity-relationship model., , , , , , and . SAC, page 1553-1557. ACM, (2005)An Empirical Comparison of Machine Learning Techniques for Software Defect Prediction., and . BICT, ICST, (2014)Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control., , , , and . EDOC, page 159-173. IEEE Computer Society, (2003)A QoS and Trust Adaptation Framework for Composed Distributed Systems., , and . SCC, page 251-258. IEEE Computer Society, (2016)A Meta-Modeling Approach to Web Services., , , , , , and . ICWS, page 796-799. IEEE Computer Society, (2004)Managing information flow for complex, dynamic tasks using multi-agent collaboration., , , , and . ISIC, page 848-853. IEEE, (2003)Software Service Selection by Multi-level Matching and Reinforcement Learning., , , , and . BIONETICS, volume 87 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 310-324. Springer, (2010)Identification of Biological Relationships from Text Documentsusing Efficient Computational Methods., , , , and . J. Bioinformatics and Computational Biology, 1 (2): 307-342 (2003)