Author of the publication

Towards Verified Java Code Generation from Concurrent State Machines.

, , , , , , and . AMT@MoDELS, volume 1277 of CEUR Workshop Proceedings, page 64-69. CEUR-WS.org, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy Support Vector Machine-Enhanced Convolutional Neural Network for Recognition of Glass Defects., , , , and . Int. J. Fuzzy Syst., 21 (6): 1870-1881 (2019)Compressive tracking combined with sample weights and adaptive learning factor., , , , and . Concurr. Comput. Pract. Exp., (2018)Doubly periodic solutions of the modified Kawahara equation. Chaos, Solitons & Fractals, 25 (5): 1155--1160 (September 2005)Impact of rhythm on forensic voice comparison reliability., , , and . Odyssey, page 1-8. ISCA, (2018)Extraction of Illumination-Invariant Features in Face Recognition by Empirical Mode Decomposition., and . ICB, volume 5558 of Lecture Notes in Computer Science, page 102-111. Springer, (2009)A Congestion Avoidance Algorithm Based on Fuzzy Controlling., , , , and . SmartCom, volume 10135 of Lecture Notes in Computer Science, page 495-505. Springer, (2016)Internal Deformation Monitoring of Slope Based on BOTDR., , , , , and . J. Sensors, (2016)MILEAGE: Multiple Instance LEArning with Global Embedding., , , and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 82-90. JMLR.org, (2013)Learning to Hash with Partial Tags: Exploring Correlation between Tags and Hashing Bits for Large Scale Image Retrieval., , and . ECCV (3), volume 8691 of Lecture Notes in Computer Science, page 378-392. Springer, (2014)Global Stiffness and Well-Conditioned Workspace Optimization Analysis of 3UPU-UPU Robot Based on Pareto Front Theory., and . CDVE, volume 9320 of Lecture Notes in Computer Science, page 124-133. Springer, (2015)