Author of the publication

Architectural Driven Approach for Software Product Line Testing.

, , , and . Software Engineering Research and Practice, page 198-204. CSREA Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Social Harmony Search Algorithm on Composite Web Service Selection Based on Quality Attributes., , and . ICGEC, page 526-529. IEEE, (2012)Semantic partitioning of peer-to-peer search space, , and . Comput. Commun., 32 (4): 619--633 (2009)Topology awareness of overlay P2P networks., and . Concurr. Comput. Pract. Exp., 19 (7): 999-1021 (2007)A Comparison of Metric-Based and Empirical Approaches for Cognitive Analysis of Modeling Languages., and . Fundam. Informaticae, 90 (3): 337-352 (2009)Implementing Heterogeneous Agents in Dynamic Environments, a Case Study in RoboCupRescue., , , , and . MATES, volume 2831 of Lecture Notes in Computer Science, page 95-104. Springer, (2003)SharifII Soccer Simulation Team., , , , , and . RoboCup, volume 2019 of Lecture Notes in Computer Science, page 437-440. Springer, (2000)Operational scheduling of oil products pipeline with intermediate event occurrences., , , and . CoRR, (2023)Automating feature model refactoring: A Model transformation approach., , and . Inf. Softw. Technol., (2016)Intrusion detection using a hybridization of evolutionary fuzzy systems and artificial immune systems., , , , and . IEEE Congress on Evolutionary Computation, page 3547-3553. IEEE, (2007)A Novel Method to Find Appropriate epsilon for DBSCAN., , and . ACIIDS (1), volume 5990 of Lecture Notes in Computer Science, page 93-102. Springer, (2010)