Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-Person Inspection Method to Improve Programming Productivity., and . IEEE Trans. Software Eng., 15 (10): 1294-1304 (1989)Disk Drive I/O Commands and Write Blocking., , and . IFIP Int. Conf. Digital Forensics, volume 242 of IFIP, page 163-177. Springer, (2007)Application of the pointer state subgraph to static program slicing., and . J. Syst. Softw., 40 (1): 17-27 (1998)A strategy for testing hardware write block devices.. Digit. Investig., 3 (Supplement): 3-9 (2006)If error rate is such a simple concept, why don't I have one for my forensic tool yet?. Digit. Investig., 7 (Supplement): S135-S139 (2010)Dataset construction challenges for digital forensics., and . Digit. Investig., (2021)Implementation of Language Enhancements., and . Comput. Lang., 6 (3/4): 139-153 (1981)Issues with imaging drives containing faulty sectors., and . Digit. Investig., 4 (Supplement): 13-15 (2007)Using Program Slicing in Software Maintenance., and . IEEE Trans. Software Eng., 17 (8): 751-761 (1991)The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary (Keynote).. IMF, volume P-97 of LNI, page 6-13. GI, (2006)