Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Recurring Faulty Functions in Field Traces of a Large Industrial Software System., , , and . IEEE Trans. Reliab., 64 (1): 269-283 (2015)Emerging Technologies that Support a Software Process Life Cycle., , , , , and . IBM Syst. J., 33 (3): 501-529 (1994)Cloud meets classroom: experience report on using IBM Bluemix in a software architectures course., and . CASCON, page 95-102. IBM / ACM, (2017)Application Experiments.. EWSPT, volume 913 of Lecture Notes in Computer Science, page 54. Springer, (1995)A Systematic, View-Based Approach to Eliciting Process Models., and . EWSPT, volume 1149 of Lecture Notes in Computer Science, page 276-282. Springer, (1996)Requirements and Systems Architecture Interaction in a Prototypical Project: Emerging Results., , , , , and . REFSQ, volume 6182 of Lecture Notes in Computer Science, page 23-29. Springer, (2010)Impediments to Requirements-Compliance., , , and . REFSQ, volume 7195 of Lecture Notes in Computer Science, page 30-36. Springer, (2012)A Case Study of Software Requirements Changes Due to External Factors, and . page 161--180. (2006)Eliciting formal models of software engineering processes., , , and . CASCON, page 28. IBM, (1994)An iterative, multi-level, and scalable approach to comparing execution traces., , , , , and . ESEC/SIGSOFT FSE, page 537-540. ACM, (2007)