From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Knowledge Management in Software Engineering, , , , , , , и . (2001)Empirical Findings in Agile Methods, , , , , , , , и . Second XP Universe and First Agile Universe Conference, LNCS 2418, стр. 197--207. Chicago, IL, USA, (августа 2002)An Extended Replication of an Experiment for Assessing Methods for Software Requirements Inspections., , , , , и . Empirical Software Engineering, 3 (4): 327-354 (1998)Connecting research and practice: an experience report on research infusion with software architecture visualization and evaluation., , , , , , , , и . Innov. Syst. Softw. Eng., 8 (4): 255-277 (2012)Lessons Learned about Structuring and Describing Experience for Three Experience Bases., , , и . LSO, том 2176 из Lecture Notes in Computer Science, стр. 106-119. Springer, (2001)Combating architectural degeneration: a survey., и . Inf. Softw. Technol., 47 (10): 643-656 (2005)Good Change and Bad Change: An Analysis Perspective on Software Evolution., , , , и . LNCS Trans. Found. Mastering Chang., (2016)Software Architecture-Driven Detection of Security Vulnerabilities., и . Software Engineering Research and Practice, стр. 595-599. CSREA Press, (2007)Automated Specification Extraction and Analysis with Specstractor., , и . SEFM, том 10886 из Lecture Notes in Computer Science, стр. 37-53. Springer, (2018)Detecting Security Vulnerabilities with Software Architecture Analysis Tools., , и . ICST Workshops, стр. 262-268. IEEE Computer Society, (2008)