Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approaches to program comprehension., , , and . J. Syst. Softw., 14 (2): 79-84 (1991)Using Web Service Technologies to Create an Information Broker: An Experience Report., , , , , , , , , and . ICSE, page 552-561. IEEE Computer Society, (2004)The Data-Gathering Broker - A User-Based Approach to Viable EPR Systems., , , , , , , , , and . MIE, volume 116 of Studies in Health Technology and Informatics, page 905-910. IOS Press, (2005)Developing a model to manage the software maintenance process., and . ICSM, page 174-182. IEEE Computer Society, (1992)An Algorithm for Resource Location in a Loosely Linked Distributed Computer System., and . ACM SIGOPS Oper. Syst. Rev., 15 (2): 16-20 (1981)Model-based tools to record program understanding., and . WPC, page 87-95. IEEE, (1993)A Model for a Broadband Cellular Wireless Network for Digital Communications., , and . Computer Networks and ISDN Systems, 26 (4): 391-402 (1993)An Architectural Model for Service-Based Software with Ultra Rapid Evolution., , , , , and . ICSM, page 292-300. IEEE Computer Society, (2001)Do Program Transformations Help Reverse Engineering?. ICSM, page 247-. IEEE Computer Society, (1998)Extension of a Transformation System for Maintenance: Dealing with Data-Intensive Programs., and . ICSM, page 344-353. IEEE Computer Society, (1994)