Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An L1-Regression Random Forests Method for Forecasting of Hoa Binh Reservoir's Incoming Flow.. KSE, page 360-364. IEEE, (2015)Database-Aware Fault Localization for Dynamic Web Applications., , , and . ICSM, page 456-459. IEEE Computer Society, (2013)Throughput of primary user with cognitive radio function., and . ISCIT, page 122-125. IEEE, (2014)Inferring developer expertise through defect analysis., , , , and . ICSE, page 1297-1300. IEEE Computer Society, (2012)Search and surveillance in emergency situations - A gis-based approach to construct optimal visibility graphs., , , , and . ISCRAM, ISCRAM Association, (2013)Currying Self-* Actions in Autonomic Systems., and . ICTCC, volume 168 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-10. Springer, (2016)The Energy-Aware Operational Time of Wireless Ad-Hoc Sensor Networks., and . MONET, 18 (3): 454-463 (2013)Energy-Aware Optimization Model in Chain-Based Routing.. MONET, 19 (2): 249-257 (2014)Clone Management for Evolving Software., , , , and . IEEE Trans. Software Eng., 38 (5): 1008-1026 (2012)Maximizing the Lifetime of Wireless Sensor Networks with the Base Station Location., , and . ICTCC, volume 144 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 108-116. Springer, (2014)