Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Source Code Modularization - Theory and Techniques, , and . Springer, (2017)Introduction to the special section on "Emerging Wireless Networks"., , and . Comput. Electr. Eng., (2015)An analytical model for source code distributability verification., , , and . J. Zhejiang Univ. Sci. C, 15 (2): 126-138 (2014)An error-propagation aware method to reduce the software mutation cost using genetic algorithm., , , , and . Data Technol. Appl., 55 (1): 118-148 (2021)New internal metric for software clustering algorithms validity., , and . IET Softw., 14 (4): 402-410 (2020)Admission Control for WebServices in Enterprise Systems Using Expert Systems., , and . WISM (1), volume 6987 of Lecture Notes in Computer Science, page 192-199. Springer, (2011)Secure Information Flow Analysis Using the PRISM Model Checker., , , and . ICISS, volume 11952 of Lecture Notes in Computer Science, page 154-172. Springer, (2019)Processor Allocation in Mesh Multiprocessors Using a Hybrid Method., and . PDCAT, page 492-496. IEEE Computer Society, (2006)An evolutionary system architecture for information protection., , and . Appl. Math. Comput., 197 (2): 687-691 (2008)Behavioural Views for Software Requirements Engineering., , and . Requir. Eng., 4 (1): 19-37 (1999)