Author of the publication

Security model oriented attestation on dynamically reconfigurable component-based systems.

, , , , and . J. Network and Computer Applications, 35 (3): 974-981 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Interactions Induced by Data Dependencies among Entity Components., , , , and . FIW, page 252-269. IOS Press, (2005)Towards Automated Resolution of Undesired Interactions Induced by Data Dependency., , , and . ICFI, page 49-53. IOS Press, (2007)Finding the merits and drawbacks of software resources from comments., , , , and . ASE, page 432-435. IEEE Computer Society, (2011)Integrating Resource Consumption and Allocation for Infrastructure Resources on-Demand., , , and . IEEE CLOUD, page 75-82. IEEE, (2010)Towards End User Service Composition., , and . COMPSAC (1), page 676-678. IEEE Computer Society, (2007)An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism., , , , and . COMPSAC, page 443-452. IEEE Computer Society, (2010)Towards Autonomic Computing Middleware via Reflection., , , , , and . COMPSAC, page 135-140. IEEE Computer Society, (2004)Hesitant analytic hierarchy process., , , and . European Journal of Operational Research, 250 (2): 602-614 (2016)Eliminating Harmful Redundancy for Testing-Based Fault Localization Using Test Suite Reduction: An Experimental Study., , , , and . ICSM, page 683-686. IEEE Computer Society, (2005)Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis., , , , , and . ICSME, page 181-190. IEEE Computer Society, (2014)