Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foiling an Attack - Defeating IPSec Tunnel Fingerprinting., , and . ISSA, page 1-14. ISSA, Pretoria, South Africa, (2005)Weak Factor Automata: Comparing (Failure) Oracles and Storacles., , and . Stringology, page 176-190. Department of Theoretical Computer Science, Faculty of Information Technology, Czech Technical University in Prague, (2013)On Implementation and Performance of Table-Driven DFA-Based String Processors., , and . Int. J. Found. Comput. Sci., 19 (1): 53-70 (2008)Agile software development: a contemporary philosophical perspective., , , , and . SAICSIT, volume 226 of ACM International Conference Proceeding Series, page 106-115. ACM, (2007)Weak factor automata: the failure of failure factor oracles?, , and . South Afr. Comput. J., (2014)A comparison of simulated traffic conditioner performance., , and . Comput. Commun., 31 (17): 3933-3940 (2008)An Algorithm for Ordering Refactorings Based on Fine-Grained Model Transformations., , and . SoMeT, volume 182 of Frontiers in Artificial Intelligence and Applications, page 225-243. IOS Press, (2008)Refactoring Tools and Complementary Techniques., , , and . AICCSA, page 685-688. IEEE Computer Society, (2006)Composite refactoring using fine-grained transformations., and . SAICSIT, page 22-29. ACM, (2009)Assessment of a framework to compare software development methodologies., , and . SAICSIT, volume 226 of ACM International Conference Proceeding Series, page 56-65. ACM, (2007)