Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Many-Objective Test Database Generation for SQL., , , , and . PPSN (2), volume 12270 of Lecture Notes in Computer Science, page 229-242. Springer, (2020)Exact secrecy throughput capacity study in mobile ad hoc networks., , , , and . Ad Hoc Networks, (2018)Agent-Based Social Simulation and Modeling in Social Computing., , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 401-412. Springer, (2008)Partition Based Differential Testing for Finding Embedded Code Generation Bugs in Simulink., , , and . DAC, page 1-6. IEEE, (2023)Multi-objective Evolutionary Algorithm for String SMT Solver Testing., , , , and . DSA, page 102-113. IEEE, (2021)Reinforcement learning based adaptive rate control for delay-constrained communications over fading channels., , and . IJCNN, page 1-7. IEEE, (2010)Performance evaluation of classification methods in cultural modeling., , , , and . ISI, page 248-250. IEEE, (2009)Philosophical Principles of Data Discovery., , , , , , , and . CCTA (1), volume 545 of IFIP Advances in Information and Communication Technology, page 24-30. Springer, (2017)What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing., , , and . ICSE, page 712-723. IEEE / ACM, (2017)Secure Transmission with Limited Feedback in MISOME Wiretap Channels., , , , and . NaNA, page 48-53. IEEE Computer Society, (2017)