Author of the publication

Modelling a software evolution process: a long-term case study.

, , , and . Softw. Process. Improv. Pract., 5 (2-3): 91-102 (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion).. Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 314-324. Springer, (2015)Metrics and Laws of Software Evolution - The Nineties View., , , , and . IEEE METRICS, page 20-. IEEE Computer Society, (1997)The Price of Belief: Insuring Credible Trust?, and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 35-38. Springer, (2016)Simulating Perceptions of Security., , and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 60-68. Springer, (2017)4th International ERCIM Workshop on Software Evolution and Evolvability (Evol'08)., , and . ASE, page 533-534. IEEE Computer Society, (2008)A credibility-based model of computer system security., and . NSPW, page 53-58. ACM, (1996)Developing an agent-based simulation model of software evolution., , , and . Inf. Softw. Technol., (2018)The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments., , , and . HCI (24), volume 9192 of Lecture Notes in Computer Science, page 271-278. Springer, (2015)Introduction to the 4th international ERCIM workshop on software evolution and evolvability (Evol '08)., , and . ASE Workshops, IEEE, (2008)Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past"., and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 307-313. Springer, (2015)