Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Optimization of Exhaustive Rules in Graph Rewriting Systems., , , and . ICSOFT (2), page 292-295. SciTePress, (2010)Boolean Dimension, Components and Blocks, , and . Order, 37 (2): 287--298 (Jul 1, 2020)Visual debugging support for graph rewriting-based model transformations., , and . EUROCON, page 482-488. IEEE, (2013)Modellanimációs eljárások megvalósítása gráftranszformációval. Budapest University of Technology and Economics, Hungary, (2011)Verified Operational Patterns with Graph Transformation., and . ICST, page 954-961. IEEE Computer Society, (2012)A flexible, declarative presentation framework for domain-specific modeling., , and . AVI, page 309-312. ACM Press, (2008)Tooling the Dynamic Behavior Models of Graphical DSLs., and . HCI (2), volume 5611 of Lecture Notes in Computer Science, page 830-839. Springer, (2009)Building an Information and Knowledge Fusion System., , , , and . IEA/AIE, volume 2070 of Lecture Notes in Computer Science, page 82-91. Springer, (2001)Controlled natural languages for interface agents., and . AAMAS (2), page 1173-1174. IFAAMAS, (2009)BotSpot: Anonymous and Distributed Malware Detection., , , and . WiMo, volume 84 of Communications in Computer and Information Science, page 59-70. (2010)