Author of the publication

Resolution trend of just-in-time requirements in open source software development.

, and . JITRE, page 17-20. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study examining relationships between micro patterns and security vulnerabilities., , and . Softw. Qual. J., 27 (1): 5-41 (2019)Eliciting Environmental Opposites for Requirements-Based Testing., , , and . RE Workshops, page 10-13. IEEE, (2022)RF Metasurface Based 'Add-Ons' for Boosting Signal-To-Noise Ratio of 1.5T MRI Scans., , , , and . NCC, page 1-4. IEEE, (2023)SecureChange: An Automated Framework to Guide Programmers in Fixing Vulnerability., , and . SEKE, page 560-565. KSI Research Inc., (2020)Predicting Vulnerability for Requirements., , , , and . IRI, page 160-167. IEEE, (2021)Completeness of Natural Language Requirements: A Comparative Study of User Stories and Feature Descriptions., , , , and . IRI, page 52-57. IEEE, (2023)Designing a Methodological Framework for the Empirical Evaluation of Self-Protecting Systems., , , and . ACSOS Companion, page 218-223. IEEE, (2020)Automated support to capture verbal just-in-time requirements via audio mining and cluster-based visualization., , and . J. Ind. Inf. Integr., (2019)Modular development and verification of domain requirements via model checking., , and . ACM Southeast Regional Conference, page 58. ACM, (2010)A Preliminary Critical Review of the Impact of Three Popular Development Practices on Source Code Maintainability., , and . COMPSAC, page 1633-1637. IEEE, (2023)