From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Third international workshop on software engineering for computational science and engineering.. ICCS, том 1 из Procedia Computer Science, стр. 1485-1486. Elsevier, (2010)Replications of software engineering experiments., , , и . Empirical Software Engineering, 19 (2): 267-276 (2014)Guidelines for Systematic Mapping Studies in Security Engineering., и . CoRR, (2018)Can observational techniques help novices overcome the software inspection learning curve? An empirical investigation., , и . Empirical Software Engineering, 11 (4): 523-539 (2006)Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements., , и . Software Engineering Research and Practice, стр. 966-971. CSREA Press, (2006)Step One Towards Science of Security., , и . SafeConfig@CCS, стр. 31-35. ACM, (2017)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., и . SERE (Companion), стр. 229-230. IEEE, (2013)A systematic literature review to identify and classify software requirement errors., и . Inf. Softw. Technol., 51 (7): 1087-1109 (2009)Characterizing software architecture changes: A systematic review., и . Inf. Softw. Technol., 52 (1): 31-51 (2010)Claims about the use of software engineering practices in science: A systematic literature review., и . Inf. Softw. Technol., (2015)