Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian-Networks-Based Misuse and Anomaly Prevention System., , , and . ICEIS (2), page 62-69. (2008)The role of process improvement in IT departments: experiences and lessons learned., , and . Softw. Process. Improv. Pract., 11 (3): 309-317 (2006)MI - An Object Oriented Environment for Integration of Scientific Applications., , , and . OOPSLA, page 212-222. ACM, (1994)OOPSLA'94, Addendum to the Proceedings: OOPS Messenger 5(4) October 1994.System testing of repository-style software: an experience report.. ICSE (Companion Volume), page 172-181. ACM, (2016)The Quality Matrix: A Management Tool for Software Quality Evaluation.. IASTED Conf. on Software Engineering, page 394-399. IASTED/ACTA Press, (2005)A causal modelling framework for the simulation and explanation of the behaviour of structures., , and . Artif. Intell. Eng., 11 (3): 205-216 (1997)Engineering models and software quality models: an example and a discussion., and . MiSE, page 39-44. ACM, (2008)The evolution of Information Systems a case study on document management.. ICSM, page 428-437. IEEE Computer Society, (2011)Modeling of information systems as systems of systems through DSM.. SESoS@ICSE, page 8-11. ACM, (2016)Safety testing of computerized provider order entry systems.. SEHC@ICSE, page 74-82. ACM, (2010)