Author of the publication

ProSim'04 - The 5th International Workshop on Software Process Simulation and Modeling.

, , , and . ICSE, page 777-778. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion).. Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 314-324. Springer, (2015)Metrics and Laws of Software Evolution - The Nineties View., , , , and . IEEE METRICS, page 20-. IEEE Computer Society, (1997)Simulating Perceptions of Security., , and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 60-68. Springer, (2017)The Price of Belief: Insuring Credible Trust?, and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 35-38. Springer, (2016)4th International ERCIM Workshop on Software Evolution and Evolvability (Evol'08)., , and . ASE, page 533-534. IEEE Computer Society, (2008)Introduction to the 4th international ERCIM workshop on software evolution and evolvability (Evol '08)., , and . ASE Workshops, IEEE, (2008)A credibility-based model of computer system security., and . NSPW, page 53-58. ACM, (1996)Developing an agent-based simulation model of software evolution., , , and . Inf. Softw. Technol., (2018)The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments., , , and . HCI (24), volume 9192 of Lecture Notes in Computer Science, page 271-278. Springer, (2015)How natural is natural language?: how well do computer science students write use cases?, , , and . OOPSLA Companion, page 914-924. ACM, (2006)