![]() | ![]() |
2006 | ||
---|---|---|
8 | EE | Stephen F. Owens, Reuven R. Levary: An adaptive expert system approach for intrusion detection. IJSN 1(3/4): 206-217 (2006) |
2000 | ||
7 | EE | Michael S. McCoy, Reuven R. Levary: A rule-based pilot performance model. Int. J. System Science 31(6): 713-729 (2000) |
1998 | ||
6 | Brian C. Behrens, Reuven R. Levary: Practical Legal Aspects of Software Reverse Engineering. Commun. ACM 41(2): 27-29 (1998) | |
1991 | ||
5 | Reuven R. Levary, Chi Y. Lin: Modelling the Software Development Process Using an Expert Simulation System Having Fuzzy Logic. Softw., Pract. Exper. 21(2): 133-148 (1991) | |
1989 | ||
4 | EE | Chi Y. Lin, Reuven R. Levary: Computer-Aided Software Development Process Design. IEEE Trans. Software Eng. 15(9): 1025-1037 (1989) |
1988 | ||
3 | EE | Steven R. Irvine, Reuven R. Levary: A discrete-event simulation of the McDonnell douglas health information systems on-line executive. Computers & OR 15(6): 535-549 (1988) |
1986 | ||
2 | Reuven R. Levary, William D. Edwards: Analysing the Impact of Adding a New Software System on Main Memory Usage. Comput. J. 29(6): 522-526 (1986) | |
1985 | ||
1 | EE | Reuven R. Levary, William D. Edwards: Planning computer memory allocation: A simulation case study. Computers & OR 12(1): 107-115 (1985) |
1 | Brian C. Behrens | [6] |
2 | William D. Edwards | [1] [2] |
3 | Steven R. Irvine | [3] |
4 | Chi Y. Lin | [4] [5] |
5 | Michael S. McCoy | [7] |
6 | Stephen F. Owens | [8] |