Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architectural support in industry: a reflection using C-POSH., , and . J. Softw. Maintenance Res. Pract., 17 (1): 3-25 (2005)Removal of all Faulty Nodes from a Fault-Tolerant Service by means of Distributed Diagnosis with Imperfect Fault Coverage., , and . EDCC, volume 1150 of Lecture Notes in Computer Science, page 385-402. Springer, (1996)Interactive Consistency in Quasi-Asynchronous Systems., and . ICECCS, page 2-9. IEEE Computer Society, (1996)Distributed cryptographic function application protocols., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 435-439. Springer, (1997)A method for module architecture verification and its application on a large component-based system.. Inf. Softw. Technol., 45 (4): 171-194 (2003)Component Replacement in a Long-Living Architecture: The 3RDBA Approach., , and . WICSA, page 89-100. IEEE Computer Society, (2004)A Two-Phase Process for Software Architecture Improvement., , , , and . ICSM, page 371-380. IEEE Computer Society, (1999)An Architectural Connectivity Metric and Its Support for Incremental Re-Architecting of Large Legacy Systems., and . IWPC, page 269-280. IEEE Computer Society, (2001)Measuring Architecting Effort., , and . WICSA, page 229-230. IEEE Computer Society, (2005)Embedding architectural support in industry., , and . ICSM, page 348-357. IEEE Computer Society, (2003)