Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost Models for Future Software Life Cycle Processes: COCOMO 2.0, , , , , and . Annals of Software Engineering, (1995)Manufacturing an Erasure Wiretap Channel from Channel Sounding Measurements., , , , , , and . ISIT, page 320-324. IEEE, (2019)Physical-Layer Security: Does it Work in a Real Environment?, , , , , and . ICC, page 1-7. IEEE, (2019)Physical-Layer Security: Does it Work in a Real Environment?, , , , , and . CoRR, (2018)Calibrating the COCOMO II Post-Architecture Model., , and . ICSE, page 477-480. IEEE Computer Society, (1998)Software Cost Estimation with COCOMO II, , , , , , , , and . Prentice Hall, (2000)Simple empirical software effort estimation model., , , and . ESEM, page 43:1-43:4. ACM, (2014)US DoD Application Domain Empirical Software Cost Analysis., , , , and . ESEM, page 392-395. IEEE Computer Society, (2011)Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSS., , , and . QRS, page 956-965. IEEE, (2021)Software Cost Estimation with Cocomo II (with CD-ROM), , , , , , , , and . Prentice Hall PTR, New Jersey, (January 2000)