Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Constant Perturbation Method for Evaluation of Structural Diversity in Multiversion Software., , and . SAFECOMP, volume 1943 of Lecture Notes in Computer Science, page 63-73. Springer, (2000)Empirical Assessment of Software On-Line Diagnostics Using Fault Injection., , and . SAFECOMP, volume 1943 of Lecture Notes in Computer Science, page 14-26. Springer, (2000)Reliability estimation from appropriate testing of plant protection software., , and . Softw. Eng. J., 10 (6): 206-218 (1995)Semiconductor litigation in Australia.. Comput. Law Secur. Rev., 8 (4): 162-165 (1992)Using Influence Diagrams to Aid the Management of Software Change., , , , and . Requir. Eng., 6 (3): 173-182 (2001)Industrial restructuring in Eastern Europe : Policies and prospects, and . European Economic Review, 36 (2-3): 670--676 (April 1992)Housing markets, unemployment and labour market flexibility in the UK, and . European Economic Review, 31 (3): 615--641 (April 1987)Australian E-commerce legislative initiatives.. Comput. Law Secur. Rev., 15 (5): 324-327 (1999)Building a system failure rate estimator by identifying component failure rates., , and . ISSRE, page 32-41. IEEE Computer Society, (1999)Evidential Volume Approach for Certification., and . Ada-Europe, volume 2655 of Lecture Notes in Computer Science, page 246-257. Springer, (2003)