Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hypothesis-based concept assignment in software maintenance., and . IEE Proceedings - Software, 149 (4): 103-110 (2002)Approaches to program comprehension., , , and . Journal of Systems and Software, 14 (2): 79-84 (1991)A Model for a Broadband Cellular Wireless Network for Digital Communications., , and . Computer Networks and ISDN Systems, 26 (4): 391-402 (1993)Message Transport on the Cambridge Ring-A Simulation study., and . Softw., Pract. Exper., 11 (7): 711-716 (1981)New co-editor for journal of software maintenance.. Journal of Software Maintenance, 4 (4): 181 (1992)Formal methods for legacy systems., and . Journal of Software Maintenance, 7 (3): 203-219 (1995)Private Information Retrieval in the Presence of Malicious Failures., , and . COMPSAC, page 805-812. IEEE Computer Society, (2002)Do Program Transformations Help Reverse Engineering?. ICSM, page 247-. IEEE Computer Society, (1998)An Architectural Model for Service-Based Software with Ultra Rapid Evolution., , , , , and . ICSM, page 292-300. IEEE Computer Society, (2001)Prototype Implementations of an Architectural Model for Service-Based Flexible Software., , , , , , , and . HICSS, page 76. IEEE Computer Society, (2002)