From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated error log resolution: a case study., , , , , и . SAC, стр. 1298-1304. ACM, (2021)On Relating Code Smells to Security Vulnerabilities., и . BigDataSecurity/HPSC/IDS, стр. 7-12. IEEE, (2019)Filling The Gaps in Microservice Frontend Communication: Case for New Frontend Patterns., и . CLOSER, стр. 184-193. SCITEPRESS, (2023)Intelligent token-based code clone detection system for large scale source code., , и . RACS, стр. 256-260. ACM, (2019)Towards effective adaptive user interfaces design., , и . RACS, стр. 373-380. ACM, (2013)Adaptive Application Structure Design for Java EE Applications., , и . RACS, стр. 159-164. ACM, (2016)On isolation-driven automated module decomposition., , и . RACS, стр. 302-307. ACM, (2018)Survey on Compromise-Defensive System Design., и . ICISA, том 514 из Lecture Notes in Electrical Engineering, стр. 513-521. Springer, (2018)Context-Aware Security Using Internet of Things Devices., , и . ICISA, том 424 из Lecture Notes in Electrical Engineering, стр. 706-713. Springer, (2017)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , и . IEEE Access, (2020)