Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preface., , and . J. Systems Science & Complexity, 21 (4): 485-486 (2008)A Priority-Based Negotiations Approach for Handling Inconsistencies in Multi-Perspective Software Requirements., , and . J. Systems Science & Complexity, 21 (4): 574-596 (2008)Super-Resolution of Depth Map Exploiting Planar Surfaces., , and . PCM (2), volume 9315 of Lecture Notes in Computer Science, page 632-641. Springer, (2015)Trust Analysis of Web Services Based on a Trust Ontology., and . KSEM, volume 4798 of Lecture Notes in Computer Science, page 642-648. Springer, (2007)Preface., , , , and . J. Comput. Sci. Technol., 34 (5): 939-941 (2019)Petri net based test case generation for evolved specification., , , , and . Sci. China Inf. Sci., 59 (8): 080105:1-080105:25 (2016)Automatically multi-paradigm requirements modeling and analyzing: An ontology-based approach., , and . Sci. China Ser. F Inf. Sci., 46 (4): 279-297 (2003)An experiment for showing some kind of artificial understanding., and . Expert Syst. J. Knowl. Eng., 20 (2): 100-107 (2003)Empirical study of Data Completeness in Electronic Health Records in China., , , and . Pac. Asia J. Assoc. Inf. Syst., 12 (2): 4 (2020)Measuring Inconsistency in Requirements Specifications., , , and . ECSQARU, volume 3571 of Lecture Notes in Computer Science, page 440-451. Springer, (2005)