Author of the publication

Trustworthy Refactoring via Decomposition and Schemes: A Complex Case Study.

, , and . VPT@ETAPS, volume 253 of EPTCS, page 92-108. (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Preservation of Positivity in Some Finite Element Methods for the Heat Equation., , and . Comput. Meth. in Appl. Math., 15 (4): 417-437 (2015)A MILP approach combined with clustering to solve a special petrol station replenishment problem., , , and . Central Eur. J. Oper. Res., 32 (1): 95-107 (March 2024)Towards context aware computations offloading in 5G., , and . ECSA (Companion), page 89-92. ACM, (2017)Elimination of RLAN interference on weather radars by channel allocation in 5 GHz band., and . ICUMT, page 1-6. IEEE, (2009)Extending the Sparkle Core language with object abstraction., , and . Acta Cybern., 17 (2): 419-445 (2006)Trustworthy Refactoring via Decomposition and Schemes: A Complex Case Study., , and . VPT@ETAPS, volume 253 of EPTCS, page 92-108. (2017)Introducing records by refactoring., , , and . Erlang Workshop, page 18-28. ACM, (2007)Temporal Properties of Clean Programs Proven in Sparkle-T., , and . CEFP, volume 4164 of Lecture Notes in Computer Science, page 168-190. Springer, (2005)Data access optimization on grid systems., , , and . WETICE, page 319-324. IEEE Computer Society, (2005)Smart class schedule with indoor positioning., , , and . ICSAI, page 643-648. IEEE, (2017)