


default search action
Paul Wernick
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [i3]Rana Siadati, Paul Wernick, Vito Veneziano:
Modelling the Political Context in Requirements Engineering. The System is made for Man, not Man for the System. CoRR abs/1902.00883 (2019) - 2018
- [j16]Shallaw Mohammed Ali, Martina A. Doolan, Paul Wernick, Ed Wakelam:
Developing an agent-based simulation model of software evolution. Inf. Softw. Technol. 96: 126-140 (2018) - 2017
- [c20]Paul Wernick, Bruce Christianson
, Joseph Spring
:
Simulating Perceptions of Security. Security Protocols Workshop 2017: 60-68 - [c19]Paul Wernick:
Simulating Perceptions of Security (Transcript of Discussion). Security Protocols Workshop 2017: 69-75 - [i2]Rana Siadati, Paul Wernick, Vito Veneziano:
Modelling politics in requirements engineering: adding emoji to existing notations. CoRR abs/1703.06101 (2017) - 2016
- [c18]Paul Wernick, Bruce Christianson:
The Price of Belief: Insuring Credible Trust? Security Protocols Workshop 2016: 35-38 - 2015
- [c17]Andrew Pyper, Mariana Lilley
, Paul Wernick, Amanda Jefferies:
The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments. HCI (24) 2015: 271-278 - [c16]Paul Wernick, Bruce Christianson:
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past". Security Protocols Workshop 2015: 307-313 - [c15]Paul Wernick:
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion). Security Protocols Workshop 2015: 314-324 - 2011
- [j15]Gerardo Canfora, Darren Dalcher
, David Raffo, Victor R. Basili, Juan Fernández-Ramil, Václav Rajlich, Keith H. Bennett, Liz Burd, Malcolm Munro, Sophia Drossopoulou, Barry W. Boehm, Susan Eisenbach, Greg Michaelson, Peter Ross, Paul Wernick, Dewayne E. Perry:
In memory of Manny Lehman, 'Father of Software Evolution'. J. Softw. Maintenance Res. Pract. 23(3): 137-144 (2011) - [c14]Min Zhang, Nathan Baddoo, Paul Wernick, Tracy Hall
:
Prioritising Refactoring Using Code Bad Smells. ICST Workshops 2011: 458-464 - 2010
- [c13]Tracy Hall
, David Bowes
, Gernot Armin Liebchen, Paul Wernick:
Evaluating Three Approaches to Extracting Fault Data from Software Change Repositories. PROFES 2010: 107-115
2000 – 2009
- 2009
- [j14]Michel Wermelinger, Paul Wernick, Ciarán Bryce:
Report on the 4th international ERCIM workshop on software evolution and evolvability (Evol '08). ACM SIGSOFT Softw. Eng. Notes 34(2): 25-27 (2009) - 2008
- [j13]Paul Wernick, Tracy Hall
, Chrystopher L. Nehaniv
:
Software evolutionary dynamics modelled as the activity of an actor-network. IET Softw. 2(4): 321-336 (2008) - [j12]Rizwan Ahmed, Tracy Hall
, Paul Wernick, Stewart Robinson
, Mahmood Hussain Shah
:
Software process simulation modelling: A survey of practice. J. Simulation 2(2): 91-102 (2008) - [c12]Min Zhang, Tracy Hall
, Nathan Baddoo, Paul Wernick:
Do bad smells indicate "trouble" in code? DEFECTS 2008: 43-44 - [c11]Stephen Cook, Keiichi Nakata
, Paul Wernick:
European Laboratory for Software Evolution (ELSE) : Vision statement. ASE Workshops 2008: 92-95 - [c10]Michel Wermelinger, Paul Wernick, Ciarán Bryce:
4th International ERCIM Workshop on Software Evolution and Evolvability (Evol'08). ASE 2008: 533-534 - [c9]Michel Wermelinger, Paul Wernick, Ciarán Bryce:
Introduction to the 4th international ERCIM workshop on software evolution and evolvability (Evol '08). ASE Workshops 2008 - [c8]Min Zhang, Nathan Baddoo, Paul Wernick, Tracy Hall
:
Improving the Precision of Fowler's Definitions of Bad Smells. SEW 2008: 161-166 - 2007
- [j11]Paul Wernick:
SPIP Special Issue on SPW/ProSim 2006. Softw. Process. Improv. Pract. 12(5): 373-375 (2007) - 2006
- [j10]Stephen Cook, Rachel Harrison, Paul Wernick:
Information system evolvability, feedback and pattern languages. IEE Proc. Softw. 153(4): 137-148 (2006) - [j9]Stephen Cook, Rachel Harrison, Meir M. Lehman, Paul Wernick:
Evolution in software systems: foundations of the SPE classification scheme. J. Softw. Maintenance Res. Pract. 18(1): 1-35 (2006) - [c7]Shmuel Ur, Elad Yom-Tov
, Paul Wernick:
An Open Source Simulation Model of Software Development and Testing. Haifa Verification Conference 2006: 124-137 - [c6]Dorota Jagielska, Paul Wernick, Mick Wood, Steve Bennett:
How natural is natural language?: how well do computer science students write use cases? OOPSLA Companion 2006: 914-924 - [e1]Qing Wang, Dietmar Pfahl, David M. Raffo, Paul Wernick:
Software Process Change, International Software Process Workshop and International Workshop on Software Process Simulation and Modeling, SPW/ProSim 2006, Shanghai, China, May 20-21, 2006, Proceedings. Lecture Notes in Computer Science 3966, Springer 2006, ISBN 3-540-34199-4 [contents] - 2005
- [c5]Rizwan Ahmed, Tracy Hall
, Paul Wernick, Stewart Robinson
:
Evaluating a rapid simulation modelling process (RSMP) through controlled experiments. ISESE 2005: 325-334 - [i1]Sue Black, Steve Counsell, Tracy Hall, Paul Wernick:
Using Program Slicing to Identify Faults in Software. Beyond Program Slicing 2005 - 2004
- [j8]Paul Wernick, Tracy Hall
:
Can Thomas Kuhn's paradigms help us understand software engineering? Eur. J. Inf. Syst. 13(3): 235-243 (2004) - [j7]Dietmar Pfahl, David Raffo, Ioana Rus, Paul Wernick:
Report on ProSim'04: the 5th international workshop on software process simulation and modeling. ACM SIGSOFT Softw. Eng. Notes 29(5): 1-6 (2004) - [j6]Paul Wernick, Walt Scacchi:
Special Issue on ProSim 2003, The 4th International Workshop on Software Process Simulation and Modeling, Portland, OR, May 2003. Softw. Process. Improv. Pract. 9(2): 51-53 (2004) - [c4]Dietmar Pfahl, Ioana Rus, David Raffo, Paul Wernick:
ProSim'04 - The 5th International Workshop on Software Process Simulation and Modeling. ICSE 2004: 777-778 - [c3]Paul Wernick, Tracy Hall
:
The Impact of Using Pair Programming on System Evolution: A Simulation-Based Study. ICSM 2004: 422-426 - 2002
- [j5]Paul Wernick, Tracy Hall:
Simulating global software evolution processes by combining simple models: an initial study. Softw. Process. Improv. Pract. 7(3-4): 113-126 (2002) - 2001
- [j4]David Raffo, Paul Wernick:
Software Process Simulation Modelling. J. Syst. Softw. 59(3): 223-225 (2001) - [j3]Goel Kahen, Meir M. Lehman, Juan F. Ramil, Paul Wernick:
System dynamics modelling of software evolution processes for policy investigation: Approach and example. J. Syst. Softw. 59(3): 271-281 (2001) - 2000
- [j2]B. W. Chatters, Meir M. Lehman, Juan F. Ramil, Paul Wernick:
Modelling a software evolution process: a long-term case study. Softw. Process. Improv. Pract. 5(2-3): 91-102 (2000)
1990 – 1999
- 1999
- [j1]Paul Wernick, Meir M. Lehman:
Software process white box modelling for FEAST/1. J. Syst. Softw. 46(2-3): 193-201 (1999) - 1997
- [c2]Meir M. Lehman, Juan F. Ramil, Paul Wernick, Dewayne E. Perry, Wladyslaw M. Turski:
Metrics and Laws of Software Evolution - The Nineties View. IEEE METRICS 1997: 20- - 1996
- [c1]Shaw-Cheng Chuang, Paul Wernick:
A credibility-based model of computer system security. NSPW 1996: 53-58
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint