Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk-driven Non-functional Requirement Analysis and Specification., , , and . SEKE, page 55-60. Knowledge Systems Institute Graduate School, (2012)On the Classification of UML's Meta Model Extension Mechanism., , , , , and . UML, volume 3273 of Lecture Notes in Computer Science, page 54-68. Springer, (2004)Deep Learning Based Code Completion Models for Programming Codes., , , , , and . ISCSIC, page 16:1-16:9. ACM, (2019)A web based UML modeling tool with touch screens., , , and . ASE, page 835-838. ACM, (2014)An Approach to Estimating Cost of Running Cloud Applications Based on AWS., , , , and . APSEC, page 571-576. IEEE, (2012)A Distributed System Monitoring Tool with Virtual Reality., and . CSAE, page 34:1-34:5. ACM, (2018)A metamodel for the notation of graphical modeling languages., , , and . COMPSAC (1), page 219-224. IEEE Computer Society, (2007)On Model Transformation Reuse., , , and . COMPSAC (1), page 638-639. IEEE Computer Society, (2009)Suffix tree-based approach to detecting duplications in sequence diagrams., , , and . IET Softw., 5 (4): 385-397 (2011)Scheduling of conflicting refactorings to promote quality improvement., , , and . ASE, page 489-492. ACM, (2007)