Author of the publication

Assure High Quality Code Using Refactoring and Obfuscation Techniques.

, , , and . FCST, page 246-252. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workshop Proposal for CSMR 2012 - SQM 2012., and . CSMR, page 561-562. IEEE Computer Society, (2012)Assure High Quality Code Using Refactoring and Obfuscation Techniques., , , and . FCST, page 246-252. IEEE Computer Society, (2010)Partitioning Loops with Variable Dependence Distances., and . ICPP, page 209-218. IEEE Computer Society, (2000)Performance Visualizations using XML Representations., , and . IV, page 795-800. IEEE Computer Society, (2004)Protecting Privacy in the Cloud: Current Practices, Future Directions., , , , and . IEEE Computer, 49 (2): 68-72 (2016)Towards requirements-driven autonomic systems design., , , and . ACM SIGSOFT Software Engineering Notes, 30 (4): 1-7 (2005)CrowdService: serving the individuals through mobile crowdsourcing and service composition., , , , , , and . ASE, page 214-219. ACM, (2016)Visualizing the Iteration Space in PEFPT., , and . HPCN Europe, volume 1225 of Lecture Notes in Computer Science, page 908-915. Springer, (1997)Quality-Based Software Reuse., , , , and . CAiSE, volume 3520 of Lecture Notes in Computer Science, page 535-550. Springer, (2005)Requirements-driven design of autonomic application software., , , and . CASCON, page 80-94. IBM, (2006)