From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A scalable approach for malware detection through bounded feature space behavior modeling., , , , и . ASE, стр. 312-322. IEEE, (2013)Automated traceability analysis for UML model refinements, , и . Information and Software Technology, (2008)How Reuse Influences Productivity in Object-Oriented Systems., , и . Commun. ACM, 39 (10): 104-116 (1996)A replicated assessment and comparison of common software cost modeling techniques., , и . ICSE, стр. 377-386. ACM, (2000)Enabling the runtime assertion checking of concurrent contracts for the Java modeling language., , и . ICSE, стр. 786-795. ACM, (2011)A Multi-objective Genetic Algorithm to Rank State-Based Test Cases., , и . SSBSE, том 8084 из Lecture Notes in Computer Science, стр. 66-80. Springer, (2013)Change impact analysis for evolving configuration decisions in product line use case models., , , и . SST@ICSE, стр. 11. IEEE / ACM, (2019)Model-Driven, Network-Context Sensitive Intrusion Detection., , , и . MoDELS, том 4735 из Lecture Notes in Computer Science, стр. 61-75. Springer, (2007)A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems., , и . MoDELS, том 5795 из Lecture Notes in Computer Science, стр. 47-61. Springer, (2009)Can We Predict the Quality of Spectrum-based Fault Localization?, , и . ICST, стр. 4-15. IEEE, (2020)