Author of the publication

Identifying Error-Prone Software - An Empirical Study.

, , , and . IEEE Trans. Software Eng., 11 (4): 317-324 (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Building Software Process Models Under the Lamppost., , , and . ICSE, page 96-105. ACM Press, (1987)Transforming web pages to become standard-compliant through reverse engineering., and . W4A, volume 134 of ACM International Conference Proceeding Series, page 14-22. ACM, (2006)An analytic resource model for large-scale software development., and . Inf. Process. Manag., 20 (1-2): 293-315 (1984)Hash-Bucket Search: A Fast Technique for Searching an English Spelling Dictionary., and . Softw. Pract. Exp., 12 (7): 669-682 (1982)Setting Access Permission through Transitive Relationship in Web-based Social Networks., and . SWKM, volume 356 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)The Effect of Modularization and Comments on Program Comprehension., , and . ICSE, page 215-223. IEEE Computer Society, (1981)Task-Specific Utility Assessment Models and their Role in the Development of Software Engineering Handbooks., and . Experimental Software Engineering Issues, volume 706 of Lecture Notes in Computer Science, page 151-157. Springer, (1992)A Quality of Service Aware Routing Using Multiple Paths for TDMA-Based Ad hoc Networks., , and . IJWA, 2 (1): 35-44 (2010)An Analysis of Several Software Defect Models., , and . IEEE Trans. Software Eng., 14 (9): 1261-1270 (1988)SMDC: An interactive software metrics data collection and analysis system., , , and . J. Syst. Softw., 8 (1): 39-46 (1988)