Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LIM: a layered interconnection model for improving component reuse.. SMC, page 142-147. IEEE, (2003)Legacy Software Modernization., and . SMC, page 1304-1309. IEEE, (2006)A Formal Method Applied to Reverse Engineering., and . Software Engineering Research and Practice, page 493-497. CSREA Press, (2004)An event driven architecture for application integration using Web services., , , and . IRI, page 542-547. IEEE Systems, Man, and Cybernetics Society, (2005)Passive RFID-based localization, algorithms and estimation accuracy., and . Int. J. RF Technol. Res. Appl., 4 (3-4): 147-161 (2013)An Approach Using Formal Concept Analysis to Object Extraction in Legacy Code., and . Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, volume 209 of Studies in Computational Intelligence, Springer, (2009)On the Design and Implementation of Parallel Programs Through Coordination., , and . SERA, volume 3647 of Lecture Notes in Computer Science, page 156-170. Springer, (2004)An Implementation of a Framework for Open Distributed Computing.. ICA3PP, volume 5574 of Lecture Notes in Computer Science, page 569-579. Springer, (2009)Wrapping legacy systems for use in heterogeneous computing environments.. Inf. Softw. Technol., 43 (8): 497-507 (2001)A managed security environment for enterprise iPhones., and . ACM Southeast Regional Conference, page 136-141. ACM, (2012)