From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Specification and Runtime Verification of API Constraints on Interacting Objects., , , и . SEKE, стр. 101-106. Knowledge Systems Institute Graduate School, (2011)Constraint Violation Detection: A Fundamental Part of Software Cybernetics.. COMPSAC (2), стр. 139-142. IEEE Computer Society, (2005)0-7695-2413-3.A Visual Constraint Specifying Approach for Adaptive Software., , и . COMPSAC (2), стр. 252-257. IEEE Computer Society, (2006)0-7695-2655-1.DecTrans: Person Re-identification with Multifaceted Part Features via Decomposed Transformer., , , и . PRCV (12), том 14436 из Lecture Notes in Computer Science, стр. 29-42. Springer, (2023)A self-management approach for service developers of PaaS., , , , , и . SOSE, стр. 85-92. IEEE Computer Society, (2011)Interceptor Based Constraint Violation Detection., и . ECBS, стр. 457-464. IEEE Computer Society, (2005)A Pattern-Based Constraint Description Approach for Web Services., , , , и . QSIC, стр. 60-69. IEEE Computer Society, (2007)A Hybrid Approach to Detecting Security Defects in Programs., , , , и . QSIC, стр. 1-10. IEEE Computer Society, (2009)A Performance Guarantee Approach for Cloud Applications Based on Monitoring., и . COMPSAC Workshops, стр. 25-30. IEEE Computer Society, (2011)Inferring dependency constraints on parameters for web services., , , , , и . WWW, стр. 1421-1432. International World Wide Web Conferences Steering Committee / ACM, (2013)