Author of the publication

Generation of Self-Optimizing Wireless Network Applications.

, , , and . ICAC, page 310-311. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRAP/J: Transparent Generation of Adaptable Java Programs., , , and . CoopIS/DOA/ODBASE (2), volume 3291 of Lecture Notes in Computer Science, page 1243-1261. Springer, (2004)A Feature-Oriented Alternative to Implementing Reliability Connector Wrappers., and . WADS, volume 3549 of Lecture Notes in Computer Science, page 232-256. Springer, (2004)Contracts and Middleware for Safe SOA Applications., , and . SDSOA@ICSE, page 5. IEEE Computer Society, (2007)UML formalization is a traceability problem., , and . TEFSE@ASE, page 31-36. ACM, (2005)The inference validity problem in legal discovery., , and . ICSE Companion, page 303-306. IEEE, (2009)Toward tractable instantiation of conceptual data models using non-semantics-preserving model transformations., , and . MiSE, page 13-18. ACM, (2014)A Component-Oriented Model for the Design of Safe Multi-threaded Applications., , and . CBSE, volume 3489 of Lecture Notes in Computer Science, page 251-266. Springer, (2005)A Model-based Design-for-Verification Approach to Checking for Deadlock in Multi-threaded Applications., , and . SEKE, page 120-125. (2006)A Model-Based Design-for-Verification Approach to Checking for Deadlock in Multi-Threaded Applications., , and . International Journal of Software Engineering and Knowledge Engineering, 17 (2): 207-230 (2007)The RAI Way: A Technical Analysis and Design Method for Building Enterprise Semantic Layers., and . CAiSE Workshops, volume 482 of Lecture Notes in Business Information Processing, page 74-79. Springer, (2023)