Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing the Benefits of Incorporating Function Clone Detection in a Development Process., , , , and . ICSM, page 314-321. IEEE Computer Society, (1997)Measuring clone based reengineering opportunities, , , , and . page 292--303. IEEE Press, (November 1999)Software assessment using metrics: A comparison across large C++ and Java systems., , , , and . Ann. Softw. Eng., (2000)A Generalization of Some Policing Mechanisms., , and . INFOCOM, page 767-775. IEEE Computer Society, (1992)An Analysis Framework for Understanding Layered Software Architectures., , , , and . IWPC, page 37-44. IEEE Computer Society, (1998)EMERALD: a case study in enhancing software reliability., , and . ISSRE Case Studies, page 85-91. IEEE, (1997)A leaky bucket with memory., , and . Broadband Communications, volume C-4 of IFIP Transactions, page 275-285. North-Holland, (1992)A heuristic framework for source policing in ATM networks., and . IEEE/ACM Trans. Netw., 2 (4): 387-397 (1994)On the capability of the policing function to release an ATM connection., , and . Telecommun. Syst., 2 (1): 239-259 (1993)Datrix™ source code model and its interchange format: lessons learned and considerations for future work., , and . ACM SIGSOFT Softw. Eng. Notes, 26 (1): 53-56 (2001)