Author of the publication

A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components.

, , , , , and . IEEE Trans. Software Eng., 34 (2): 271-286 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Could We Issue Driving Licenses to Autonomous Vehicles?, , and . SAFECOMP Workshops, volume 11094 of Lecture Notes in Computer Science, page 473-480. Springer, (2018)A Survey on the Business Relationship between Chinese Outsourcing Software Suppliers and Their Outsourcers., , , , , and . APSEC, page 470-477. IEEE Computer Society, (2007)A Tertiary Review on Blockchain and Sustainability With Focus on Sustainable Development Goals., , , , and . IEEE Access, (2022)The Impact of Test Driven Development on the Evolution of a Reusable Framework of Components - An Industrial Case Study, , , , , and . ICSEA '08: Proceedings of the 2008 The Third International Conference on Software Engineering Advances, page 214--223. Washington, DC, USA, IEEE Computer Society, (2008)A Study of Developer Attitude to Component Reuse in Three IT Companies., , , , , , and . PROFES, volume 3009 of Lecture Notes in Computer Science, page 538-552. Springer, (2004)Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review., , , and . ACM Comput. Surv., 54 (9): 190:1-190:35 (2022)Exploring the Relationship Between Data Science and Circular Economy: An Enhanced CRISP-DM Process Model., , , , and . I3E, volume 11701 of Lecture Notes in Computer Science, page 177-189. Springer, (2019)Understanding How Enterprise Architecture Contributes to Organizational Alignment., , , and . I3E, volume 12896 of Lecture Notes in Computer Science, page 383-396. Springer, (2021)Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding., , and . ISSRE, page 683-693. IEEE, (2023)Identifying and Counting Vehicles in Multiple Lanes by Using a Low-Cost Vehicle-Mounted Sensor for Intelligent Traffic Management Systems., , , and . HAIS, volume 12344 of Lecture Notes in Computer Science, page 598-611. Springer, (2020)