Author of the publication

Applying Software Analysis Technology to Lightweight Semantic Markup of Document Text.

, , , , and . ICAPR (1), volume 3686 of Lecture Notes in Computer Science, page 590-600. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A backtracking LR algorithm for parsing ambiguous context-dependent languages., and . CASCON, page 39-53. IBM, (2006)Practical language-independent detection of near-miss clones., , and . CASCON, page 1-12. IBM, (2004)Recovering Role-Based Access Control Security Models from Dynamic Web Applications., , and . ICWE, volume 7387 of Lecture Notes in Computer Science, page 121-136. Springer, (2012)Identifying and locating interference issues in PHP applications: the case of WordPress., , , and . ICPC, page 157-167. ACM, (2014)Submodel pattern extraction for simulink models.. SPLC, page 7-10. ACM, (2013)Towards Web Services Tagging by Similarity Detection., and . The Smart Internet, volume 6400 of Lecture Notes in Computer Science, Springer, (2010)Evaluating the evolution of small scale open source software systems, and . Advances in Computer Science and Engineering, (2006)SyVOLT: Full Model Transformation Verification Using Contracts., , , , , , and . P&D@MoDELS, volume 1554 of CEUR Workshop Proceedings, page 24-27. CEUR-WS.org, (2015)Model Transformations for Migrating Legacy Models: An Industrial Case Study., , , and . ECMFA, volume 7349 of Lecture Notes in Computer Science, page 90-101. Springer, (2012)Extracting rights and obligations from regulations: toward a tool-supported process., , , , , , and . ASE, page 429-432. ACM, (2007)