Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing a software management discipline.. COMPSAC, page 666. IEEE, (1979)Software Cost Estimation with COCOMO II, , , , , , , , and . Prentice Hall, (2000)Addressing Malicious Code in COTS: A Protection Framework., , , , and . ICCBSS, volume 3412 of Lecture Notes in Computer Science, page 157-167. Springer, (2005)How to Get the Most out of Extreme Programming/Agile Methods.. XP/Agile Universe, volume 2418 of Lecture Notes in Computer Science, page 185-196. Springer, (2002)The smart stub as a software management tool.. ACM SIGSOFT Softw. Eng. Notes, 1 (2): 4-8 (1976)Report: 4th ACM Conference On Computer and Communications Security.. ACM SIGSOFT Softw. Eng. Notes, 22 (4): 32-33 (1997)Software management.. AFIPS National Computer Conference, volume 49 of AFIPS Conference Proceedings, page 667. AFIPS Press, (1980)Automated aids fob reliable software.. Reliable Software, page 131-142. ACM, (1975)Is the Software Engineering State of the Practice Getting Closer to the State of the Art?. IEEE Software, 20 (6): 78-83 (2003)Special Feature a Glossary of Software Tool and Techniques., and . Computer, 10 (7): 52-60 (1977)