Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TGVisor: A Tiny Hypervisor-Based Trusted Geolocation Framework for Mobile Cloud Clients., , , , and . MobileCloud, page 99-108. IEEE Computer Society, (2015)Iterative inversion of fuzzified neural networks., and . IEEE Trans. Fuzzy Syst., 8 (3): 266-280 (2000)An Analytical Method for Parallelization of Recursive Functions., and . Parallel Process. Lett., 10 (1): 87-98 (2000)Refining schizophrenia via graph reachability in Esterel., , , , and . MEMOCODE, page 18-27. IEEE, (2009)A Static Java Birthmark Based on Control Flow Edges., , , and . COMPSAC (1), page 413-420. IEEE Computer Society, (2009)Detecting Common Modules in Java Packages Based on Static Object Trace Birthmark., , , and . Comput. J., 54 (1): 108-124 (2011)Efficient Bottom-Up Execution of Logic Programs Using Abstract Interpretation., , and . Inf. Process. Lett., 47 (3): 149-157 (1993)A Static Birthmark of Binary Executables Based on API Call Structure., , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 2-16. Springer, (2007)Detecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns., , , and . IEICE Trans. Inf. Syst., 91-D (9): 2323-2332 (2008)A bottom-up pointer analysis using the update history., and . Inf. Softw. Technol., 51 (4): 691-707 (2009)