Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Test case selection-prioritization approach based on memoization dynamic programming algorithm.. Inf. Softw. Technol., (2019)The drawbacks of statement code coverage test case prioritization related to domain testing.. SACI, page 221-224. IEEE, (2016)Clone detection algorithm based on the Abstract Syntax Tree approach., and . SACI, page 73-78. IEEE, (2014)Integrated System for Malicious Node Discovery and Self-destruction in Wireless Sensor Networks., , , , , and . CoRR, (2018)A knowledge based system approach in securing distributed wireless sensor networks., , , and . CoRR, (2018)Structural health monitoring with distributed wireless sensor networks., , and . CoRR, (2018)Hybrid Design Tools - Image Quality Assessment of a Digitally Augmented Blackboard Integrated System., and . Informatics, 6 (1): 6 (2019)Cities of the Future: Employing Wireless Sensor Networks for Efficient Decision Making in Complex Environments., , , , , , , , and . CoRR, (2018)Automated Specification-Based Testing of REST APIs., , , and . Sensors, 21 (16): 5375 (2021)Multiagent architecture applied in decentralized real-time urban road traffic control., , and . SACI, page 271-276. IEEE, (2009)