Author of the publication

Metrics and Laws of Software Evolution - The Nineties View.

, , , , and . IEEE METRICS, page 20-. IEEE Computer Society, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to the 4th international ERCIM workshop on software evolution and evolvability (Evol '08)., , and . ASE Workshops, IEEE, (2008)Modelling politics in requirements engineering: adding emoji to existing notations., , and . CoRR, (2017)A credibility-based model of computer system security., and . NSPW, page 53-58. ACM, (1996)Developing an agent-based simulation model of software evolution., , , and . Inf. Softw. Technol., (2018)The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments., , , and . HCI (24), volume 9192 of Lecture Notes in Computer Science, page 271-278. Springer, (2015)Modelling a software evolution process: a long-term case study., , , and . Softw. Process. Improv. Pract., 5 (2-3): 91-102 (2000)Software Process Simulation Modelling., and . J. Syst. Softw., 59 (3): 223-225 (2001)Software process simulation modelling: A survey of practice., , , , and . J. Simulation, 2 (2): 91-102 (2008)Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past"., and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 307-313. Springer, (2015)Simulating Perceptions of Security (Transcript of Discussion).. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 69-75. Springer, (2017)