Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the selection of software defect estimation techniques., , , and . Softw. Test. Verification Reliab., 21 (2): 125-152 (2011)A Learning Model for Software Development Processes., and . IASTED Conf. on Software Engineering, page 474-479. IASTED/ACTA Press, (2005)A Segment Based Approach for the Reduction of the Number of Test Cases for Performance Evaluation of Components., , and . International Journal of Software Engineering and Knowledge Engineering, 19 (4): 481-505 (2009)Reducing the Number of Test Cases for Performance Evaluation of Components., , and . SEKE, page 145-150. Knowledge Systems Institute Graduate School, (2007)Issues and challenges in securing VoIP., , , and . Comput. Secur., 28 (8): 743-753 (2009)Penetration Testing for Spam Filters., , and . COMPSAC (2), page 410-415. IEEE Computer Society, (2009)978-0-7695-3726-9.Automatic Stress and Load Testing for Embedded Systems., and . COMPSAC (2), page 229-233. IEEE Computer Society, (2006)0-7695-2655-1.Dynamic Control of Worm Propagation., , and . ITCC (1), page 419-423. IEEE Computer Society, (2004)Quantifying Reciprocity in Social Networks., , and . CSE (4), page 1031-1035. IEEE Computer Society, (2009)Software Modelling, Simulation, and Optimization Convergence Assessment of the Calibration Algorithm for the State Variable Model of the Software Test Process.. Applied Informatics, page 1167-1172. IASTED/ACTA Press, (2003)