Author of the publication

Simulating the Behavior of Software Modules by Trace Rewriting.

, and . IEEE Trans. Software Eng., 20 (10): 750-759 (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating a Test Oracle from Program Documentation (Work in Progress)., and . ISSTA, page 58-65. ACM, (1994)Inspection of Safety-Critical Software Using Program-Function Tables.. IFIP Congress (3), volume A-53 of IFIP Transactions, page 270-277. North-Holland, (1994)Design and Specification of the Minimal Subset of an Operating System Family., , and . IEEE Trans. Software Eng., 2 (4): 301-307 (1976)Some Theorems We Should Prove.. HUG, volume 780 of Lecture Notes in Computer Science, page 155-162. Springer, (1993)Trace Rewriting Systems., and . CTRS, volume 656 of Lecture Notes in Computer Science, page 343-356. Springer, (1992)Information Distribution Aspects of Design Methodology.. IFIP Congress (1), page 339-344. North-Holland, (1971)"Formal methods" technology transfer will fail.. J. Syst. Softw., 40 (3): 195-198 (1998)Using Test Oracles Generated from Program Documentation., and . IEEE Trans. Software Eng., 24 (3): 161-173 (1998)Software Aging.. ICSE, page 279-287. IEEE Computer Society / ACM Press, (1994)Response to Undesired Events in Software Systems., and . ICSE, page 437-446. IEEE Computer Society, (1976)