Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UPMOA: An improved search algorithm to support user-preference multi-objective optimization., , , and . ISSRE, page 393-404. IEEE Computer Society, (2015)Energy Efficient Hierarchical Clustering Approaches in Wireless Sensor Networks: A Survey., , , , , and . Wireless Communications and Mobile Computing, (2017)Facilitating Requirements Inspection with Search-Based Selection of Diverse Use Case Scenarios., , , and . EAI Endorsed Trans. Creative Technologies, 3 (7): e4 (2016)Model-based security engineering for cyber-physical systems: A systematic mapping study., , and . Information & Software Technology, (2017)Applying UML/MARTE on industrial projects: challenges, experiences, and guidelines., , , and . Software and Systems Modeling, 14 (4): 1367-1385 (2015)Experience report: Assessing the reliability of an industrial avionics software: Results, insights and recommendations., , , and . ISSRE, page 218-227. IEEE Computer Society, (2013)Ensuring Safety of Avionics Software at the Architecture Design Level: An Industrial Case Study., , , and . QSIC, page 55-64. IEEE, (2013)Terrestrial Locomotion Modeling Bio-inspired by Elongated Animals., , and . FET, volume 7 of Procedia Computer Science, page 317-319. Elsevier, (2011)A technique for handling range and fuzzy match queries on encrypted data., , and . Int. Arab J. Inf. Technol., 10 (3): 239-244 (2013)Employing rule mining and multi-objective search for dynamic test case prioritization., , , , and . Journal of Systems and Software, (2019)