Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Real Time Contextual Advertising., , and . WISE (2), volume 8787 of Lecture Notes in Computer Science, page 445-459. Springer, (2014)Electronic bulletin board distributed questionnaires for exploratory research., , , , and . J. Inf. Sci., 22 (2): 107-115 (1996)Inferring Extended Probabilistic Finite-State Automaton Models from Software Executions., and . ACM Trans. Softw. Eng. Methodol., 27 (1): 4:1-4:39 (2018)Changing Programming Paradigm - An Empirical Investigation., , , , and . Software Quality and Productivity, volume 3 of IFIP Conference Proceedings, page 62-65. Chapman & Hall, (1994)Evaluating inheritance depth on the maintainability of object-oriented software., , , , and . Empirical Software Engineering, 1 (2): 109-132 (1996)Automated cookie collection testing., and . ACM Trans. Softw. Eng. Methodol., 23 (1): 3:1-3:40 (2014)Further Experiences with Scenarios and Checklists., , and . Empirical Software Engineering, 3 (1): 37-64 (1998)Centroidal Voronoi Tessellations - A New Approach to Random Testing., , and . IEEE Trans. Software Eng., 39 (2): 163-183 (2013)Detecting visually similar Web pages: Application to phishing detection., , and . ACM Trans. Internet Techn., 10 (2): 5:1-5:38 (2010)Estimating the Number of Remaining Defects after Inspection.. Softw. Test. Verification Reliab., 9 (3): 167-189 (1999)