Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Path Testing of Computer Programs with Loops Using a Tool for Simple Loop Patterns., and . Softw. Pract. Exp., 21 (10): 1075-1102 (1991)Editorial.. Softw. Test. Verification Reliab., 2 (2): 51-52 (1992)Editorial: Need for a Testing Metric - Error Detection Rate.. Softw. Test. Verification Reliab., 3 (2): 61-62 (1993)Editorial: What is the Developer-to-Tester Ratio?. Softw. Test. Verification Reliab., 8 (3): 111-112 (1998)Editorial: About the contents of this double issue - 'Testing Object-Oriented Software: A Survey' by Robert V. Binder.. Softw. Test. Verification Reliab., 6 (3/4): 123-124 (1996)Optimum concentrator location in telecommunications design.. ACM Annual Conference (1), page 534-542. ACM, (1972)Extended firewall for regression testing: an experience report., , , and . Journal of Software Maintenance, 20 (6): 419-433 (2008)Optimum Domination in Weighted Trees., and . Inf. Process. Lett., 7 (6): 261-265 (1978)Testing of User-Configurable Software Systems Using Firewalls., and . ISSRE, page 177-186. IEEE Computer Society, (2008)Correcting for unreliable regression integration testing., , and . ICSM, page 232-241. IEEE Computer Society, (1995)