Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Requirements to Architecture.. SoMeT, volume 217 of Frontiers in Artificial Intelligence and Applications, page 3-36. IOS Press, (2010)Software Aging.. ICSE, page 279-287. IEEE Computer Society / ACM Press, (1994)Response to Undesired Events in Software Systems., and . ICSE, page 437-446. IEEE Computer Society, (1976)The Design of Program Families. IEEE Transactions on Software Engineering, 2 (1): 1--9 (1976)University Programmes in Software Development.. SEUH, page 9-10. dpunkt, (2001)Design and Specification of the Minimal Subset of an Operating System Family., , and . IEEE Trans. Software Eng., 2 (4): 301-307 (1976)Inspection of Safety-Critical Software Using Program-Function Tables.. IFIP Congress (3), volume A-53 of IFIP Transactions, page 270-277. North-Holland, (1994)Generating a Test Oracle from Program Documentation (Work in Progress)., and . ISSTA, page 58-65. ACM, (1994)"Formal methods" technology transfer will fail.. J. Syst. Softw., 40 (3): 195-198 (1998)Another view of the Dijkstra-dMLP controversy.. ACM SIGSOFT Softw. Eng. Notes, 3 (4): 20-21 (1978)