Author of the publication

A self-management approach for service developers of PaaS.

, , , , , and . SOSE, page 85-92. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Specification and Runtime Verification of API Constraints on Interacting Objects., , , and . SEKE, page 101-106. Knowledge Systems Institute Graduate School, (2011)Constraint Violation Detection: A Fundamental Part of Software Cybernetics.. COMPSAC (2), page 139-142. IEEE Computer Society, (2005)0-7695-2413-3.A Visual Constraint Specifying Approach for Adaptive Software., , and . COMPSAC (2), page 252-257. IEEE Computer Society, (2006)0-7695-2655-1.DecTrans: Person Re-identification with Multifaceted Part Features via Decomposed Transformer., , , and . PRCV (12), volume 14436 of Lecture Notes in Computer Science, page 29-42. Springer, (2023)A self-management approach for service developers of PaaS., , , , , and . SOSE, page 85-92. IEEE Computer Society, (2011)Interceptor Based Constraint Violation Detection., and . ECBS, page 457-464. IEEE Computer Society, (2005)A Pattern-Based Constraint Description Approach for Web Services., , , , and . QSIC, page 60-69. IEEE Computer Society, (2007)A Hybrid Approach to Detecting Security Defects in Programs., , , , and . QSIC, page 1-10. IEEE Computer Society, (2009)Towards a rule model for self-adaptive software.. ACM SIGSOFT Softw. Eng. Notes, 30 (1): 8 (2005)Towards software architecture at runtime., , and . ACM SIGSOFT Softw. Eng. Notes, 28 (2): 8 (2003)