Author of the publication

Component Security Testing Approach Based on Extended Chemical Abstract Machine.

, , and . International Journal of Software Engineering and Knowledge Engineering, 22 (1): 59-83 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time Systems., , and . ICECCS, page 176-183. IEEE Computer Society, (2005)Multi-Robot Avoidance Based on Co-Evolution Computation., , and . ICTAI, page 689-692. IEEE Computer Society, (2005)A Hybrid User and Item-Based Collaborative Filtering with Smoothing on Sparse Data., and . ICAT Workshops, page 184-189. IEEE Computer Society, (2006)Using Dependence Matrix to Support Change Impact Analysis for CBS., , and . ICCSA Workshops, page 192-200. IEEE Computer Society, (2007)Testing Approach of Component Security Based on Fault Injection., , and . CIS, page 763-767. IEEE Computer Society, (2007)Evolutionary Testing of Unstructured Programs Using a Testability Transformation Approach., and . FCST, page 59-66. IEEE Computer Society, (2008)PrefixTreeESpan: A Pattern Growth Algorithm for Mining Embedded Subtrees., , , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 499-505. Springer, (2006)A Grid-Based Subspace Clustering Algorithm for High-Dimensional Data Streams., and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 37-48. Springer, (2006)Aggregate-strength interaction test suite prioritization., , , , and . Journal of Systems and Software, (2015)AIPlayer: A Platform of Intelligent Simulation of Virtual Human in Virtual Environment., , and . HCI (12), volume 4561 of Lecture Notes in Computer Science, page 434-442. Springer, (2007)