Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eigenvalue Bounds of a Stochastic Petri Net., and . ICRA, page 2072-2077. IEEE Computer Society, (1995)A Stochastic Petri Net Synthesis Method with Known Lower Bound of the Second Donomat Eigenvalue., and . ICRA, page 2078-2083. IEEE Computer Society, (1995)Refactoring Java Software Product Lines., , and . SPLC (A), page 59-68. ACM, (2017)All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis., , , , and . Security and Communication Networks, (2019)Can undergraduates script their own refactorings?, , and . WRT@SPLASH, page 9-12. ACM, (2013)Improving refactoring speed by 10X., , , and . ICSE, page 1145-1156. ACM, (2016)Feature interactions, products, and composition., , and . GPCE, page 13-22. ACM, (2011)Emission spectroscopy of NaYF4:Eu nanorods optically trapped by Fresnel lens fibers, , , , , , , , , and 1 other author(s). Photonics Research, 10 (2): 332 (January 2022)Fuzzy integrated analytic hierarchy process approach for selecting strategic big-sized R&D programs in the sector of energy technology development., , , , and . FUZZ-IEEE, page 1432-1438. IEEE, (2009)Scripting parametric refactorings in Java to retrofit design patterns., , and . ICSME, page 211-220. IEEE Computer Society, (2015)