Author of the publication

A two-layered-class approach for the reuse of synchronization code.

, , , and . Inf. Softw. Technol., 43 (5): 287-294 (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Context-Awareness by Predicate Detection in Asynchronous Environments., , , and . IEEE Trans. Computers, 65 (2): 522-534 (2016)Fuzzy Self-Adaptation of Mission-Critical Software Under Uncertainty., , , , , and . J. Comput. Sci. Technol., 28 (1): 165-187 (2013)An unsupervised approach to activity recognition and segmentation based on object-use fingerprints., , , and . Data Knowl. Eng., 69 (6): 533-544 (2010)Specification and Implementation of Replicated List: The Jupiter Protocol Revisited., , and . CoRR, (2017)Version-consistent dynamic reconfiguration of component-based distributed systems., , , , and . SIGSOFT FSE, page 245-255. ACM, (2011)Environmental Modeling for Automated Cloud Application Testing, , , , , and . IEEE Softw., 29 (2): 30--35 (March 2012)A hierarchical framework for parallel seismic applications, , , , , , and . Commun. ACM, 43 (10): 55--59 (October 2000)Robust Null Broadening Beamforming Based on Covariance Matrix Reconstruction via Virtual Interference Sources., , , and . Sensors, 20 (7): 1865 (2020)Homophily-aware correction framework for crowdsourced labels using heterogeneous information network., , , , and . Expert Syst. Appl., (2022)Enhancing supervised bug localization with metadata and stack-trace., , , , , , and . Knowl. Inf. Syst., 62 (6): 2461-2484 (2020)