Author of the publication

Simulating the Behavior of Software Modules by Trace Rewriting.

, and . IEEE Trans. Software Eng., 20 (10): 750-759 (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simulating the Behavior of Software Modules by Trace Rewriting., and . IEEE Trans. Software Eng., 20 (10): 750-759 (1994)A Memristor Neural Network Using Synaptic Plasticity and Its Associative Memory., , , and . Circuits Syst. Signal Process., 39 (7): 3496-3511 (2020)A Map Ontology Driven Approach to Natural Language Traffic Information Processing and Services., , , , , , , , , and 2 other author(s). ASWC, volume 4185 of Lecture Notes in Computer Science, page 696-710. Springer, (2006)Method of Multi-feature Fusion Based on Attention Mechanism in Malicious Software Detection., and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 3-13. Springer, (2020)SFNN: Semantic Features Fusion Neural Network for Multimodal Sentiment Analysis., , , and . CACRE, page 661-665. IEEE, (2020)Active tracking movements of flexion and extension on the elbow joint for an initial prototype of EMG-driven assistant exoskeleton., , , and . ROBIO, page 2687-2692. IEEE, (2017)Research on underwater location algorithm based on probability graph model., and . ICSPCC, page 1-6. IEEE, (2021)FastDet: Detecting Encrypted Malicious Traffic Faster via Early Exit., , , and . ICA3PP (1), volume 14487 of Lecture Notes in Computer Science, page 301-319. Springer, (2023)Multi-channel quantum parameter estimation., , , , and . Sci. China Inf. Sci., (2022)Simulating the Behaviour of Software Modules by Trace Rewriting., and . ICSE, page 14-23. IEEE Computer Society / ACM Press, (1993)