Author of the publication

Using Vehicle-Mounted Camera to Collect Information for Managing Mixed Traffic.

, , , and . SITIS, page 222-230. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Test Driven Development on the Evolution of a Reusable Framework of Components - An Industrial Case Study, , , , , and . ICSEA '08: Proceedings of the 2008 The Third International Conference on Software Engineering Advances, page 214--223. Washington, DC, USA, IEEE Computer Society, (2008)Could We Issue Driving Licenses to Autonomous Vehicles?, , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 473-480. Springer, (2018)A Study of Developer Attitude to Component Reuse in Three IT Companies., , , , , , and . PROFES, volume 3009 of Lecture Notes in Computer Science, page 538-552. Springer, (2004)Identifying and Counting Vehicles in Multiple Lanes by Using a Low-Cost Vehicle-Mounted Sensor for Intelligent Traffic Management Systems., , , and . HAIS, volume 12344 of Lecture Notes in Computer Science, page 598-611. Springer, (2020)A Survey on the Business Relationship between Chinese Outsourcing Software Suppliers and Their Outsourcers., , , , , and . APSEC, page 470-477. IEEE Computer Society, (2007)Exploring the Relationship Between Data Science and Circular Economy: An Enhanced CRISP-DM Process Model., , , , and . I3E, volume 11701 of Lecture Notes in Computer Science, page 177-189. Springer, (2019)Understanding How Enterprise Architecture Contributes to Organizational Alignment., , , and . I3E, volume 12896 of Lecture Notes in Computer Science, page 383-396. Springer, (2021)An Empirical Study on Culture, Automation, Measurement, and Sharing of DevSecOps., , and . Cyber Security, page 1-8. IEEE, (2019)Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding., , and . ISSRE, page 683-693. IEEE, (2023)An Industrial Survey of Software Outsourcing in China., , , , , and . PROFES, volume 4589 of Lecture Notes in Computer Science, page 5-19. Springer, (2007)