Author of the publication

Contracting of Web Services with Constraint Handling Rules.

, , and . SERVICES, page 211-218. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Concolic Execute Fuzzing Based on Control-Flow Analysis., , , and . CIS, page 385-389. IEEE Computer Society, (2015)Hierarchical Clustering of Group Behaviors in Cyber Situation Awareness., , , and . QRS Companion, page 400-401. IEEE, (2016)Extracting Relations from Chinese Web Documents Using Kernel Methods., and . ACIS-ICIS, page 352-356. IEEE Computer Society, (2009)Personalized Mention Probabilistic Ranking - Recommendation on Mention Behavior of Heterogeneous Social Network., , , and . WAIM Workshops, volume 9391 of Lecture Notes in Computer Science, page 41-52. Springer, (2015)Aligning Users across Social Networks Using Network Embedding., , , and . IJCAI, page 1774-1780. IJCAI/AAAI Press, (2016)Knowledge graph embedding with concepts., , and . Knowl.-Based Syst., (2019)Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings., , and . IACR Cryptology ePrint Archive, (2011)Shell Miner: Mining Organizational Phrases in Argumentative Texts in Social Media., , , , and . ICDM, page 797-802. IEEE Computer Society, (2014)Combining Syntactic Structured and Flat Features for Relation Extraction Using Co-training., , and . INCoS, page 401-404. IEEE Computer Society, (2009)Effective Fuzzing Based on Dynamic Taint Analysis., , , , , and . CIS, page 615-619. IEEE Computer Society, (2013)