Author of the publication

Performance Optimization of Exhaustive Rules in Graph Rewriting Systems.

, , , and . ICSOFT (2), page 292-295. SciTePress, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual debugging support for graph rewriting-based model transformations., , and . EUROCON, page 482-488. IEEE, (2013)Modellanimációs eljárások megvalósítása gráftranszformációval. Budapest University of Technology and Economics, Hungary, (2011)Performance Optimization of Exhaustive Rules in Graph Rewriting Systems., , , and . ICSOFT (2), page 292-295. SciTePress, (2010)Boolean Dimension, Components and Blocks, , and . Order, 37 (2): 287--298 (Jul 1, 2020)Verified Operational Patterns with Graph Transformation., and . ICST, page 954-961. IEEE Computer Society, (2012)Controlled natural languages for interface agents., and . AAMAS (2), page 1173-1174. IFAAMAS, (2009)Building an Information and Knowledge Fusion System., , , , and . IEA/AIE, volume 2070 of Lecture Notes in Computer Science, page 82-91. Springer, (2001)A flexible, declarative presentation framework for domain-specific modeling., , and . AVI, page 309-312. ACM Press, (2008)Tooling the Dynamic Behavior Models of Graphical DSLs., and . HCI (2), volume 5611 of Lecture Notes in Computer Science, page 830-839. Springer, (2009)BotSpot: Anonymous and Distributed Malware Detection., , , and . WiMo, volume 84 of Communications in Computer and Information Science, page 59-70. (2010)