Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Influence Diagrams to Aid the Management of Software Change., , , , and . Requir. Eng., 6 (3): 173-182 (2001)Building a system failure rate estimator by identifying component failure rates., , and . ISSRE, page 32-41. IEEE Computer Society, (1999)A Constant Perturbation Method for Evaluation of Structural Diversity in Multiversion Software., , and . SAFECOMP, volume 1943 of Lecture Notes in Computer Science, page 63-73. Springer, (2000)Empirical Assessment of Software On-Line Diagnostics Using Fault Injection., , and . SAFECOMP, volume 1943 of Lecture Notes in Computer Science, page 14-26. Springer, (2000)Reliability estimation from appropriate testing of plant protection software., , and . Softw. Eng. J., 10 (6): 206-218 (1995)Evidential Volume Approach for Certification., and . Ada-Europe, volume 2655 of Lecture Notes in Computer Science, page 246-257. Springer, (2003)Reasonable Design.. Journal of Information, Law and Technology, (1999)Assessment of the Benefit of Redundant Systems., , and . SAFECOMP, volume 2434 of Lecture Notes in Computer Science, page 151-162. Springer, (2002)Estimation of Software Diversity by Fault Simulation and Failure Searching., , and . ISSRE, page 122-131. IEEE Computer Society, (2001)Decision-Support for Certification by Calculating the Evidential Volume of a Product., and . DSN, page 15-24. IEEE Computer Society, (2003)