Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A simplified model for software inspection., , and . Journal of Software: Evolution and Process, 26 (12): 1297-1315 (2014)Gamifying learning experiences: Practical implications and outcomes, , , , , and . Computers & Education, (2013)Enhancing Misuse Cases With Risk Assessment for Safety Requirements., , , and . IEEE Access, (2020)A survey and meta-analysis of application-layer distributed denial-of-service attack., , , , and . Int. J. Commun. Syst., (2020)Enhancing input value selection in parametric software cost estimation models through second level cost drivers., , and . Softw. Qual. J., 14 (4): 339-357 (2006)Accessibility Of Digital Content of Information Systems in Europe: Moving Action from Technicians to Users., , , and . ISD, Universitat Politècnica de València / Association for Information Systems, (2021)Accessible platforms for e-learning: A case study., , , , , , and . Comput. Appl. Eng. Educ., 25 (6): 1018-1037 (2017)Proposal for a maintenance management system in industrial environments based on ISO 9001 and ISO 14001 standards., , , and . Comput. Stand. Interfaces, (2021)FOSSES: Framework for open-source software evaluation and selection., , , and . Softw. Pract. Exp., 49 (5): 780-812 (2019)Automated Recovery and Visualization of Test-to-Code Traceability (TCT) Links: An Evaluation., , , and . IEEE Access, (2021)