Author of the publication

Toward a fuzzy control-based approach to design of self-adaptive software

, , , , , and . Proceedings of the Second Asia-Pacific Symposium on Internetware, page 15:1--15:4. New York, NY, USA, ACM, (2010)
DOI: 10.1145/2020723.2020738

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructing Confluent Context-sensitive Graph Grammars from Non-confluent Productions for Parsing Efficiency., , , , and . VINCI, page 135-147. Springer, (2009)Wi-Dog: Monitoring School Violence with Commodity WiFi Devices., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 47-59. Springer, (2017)FAME: A UML-based framework for modeling fuzzy self-adaptive software., , , , and . Inf. Softw. Technol., (2016)Towards Dynamic Evolution of Service Choreographies., , , , and . APSCC, page 225-232. IEEE Computer Society, (2012)Modification Impact Analysis Based Test Case Prioritization for Regression Testing of Service-Oriented Workflow Applications., , , , and . COMPSAC, page 288-297. IEEE Computer Society, (2015)Refactoring and Publishing WS-BPEL Processes to Obtain More Partners., , , , , and . ICWS, page 129-136. IEEE Computer Society, (2011)FuAET: a tool for developing fuzzy self-adaptive software systems., , , , and . Internetware, page 54-63. ACM, (2014)Generating effective test cases based on satisfiability modulo theory solvers for service-oriented workflow applications., , , , and . Softw. Test. Verification Reliab., 26 (2): 149-169 (2016)Path Feasibility Analysis of BPEL Processes under Dead Path Elimination Semantics., , , , , , and . IEICE Trans. Inf. Syst., 99-D (3): 641-649 (2016)Leakage-Resilient Certificateless Signcryption Scheme., , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)