Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing software architecture changes: A systematic review., and . Inf. Softw. Technol., 52 (1): 31-51 (2010)Claims about the use of software engineering practices in science: A systematic literature review., and . Inf. Softw. Technol., (2015)A systematic literature review to identify and classify software requirement errors., and . Inf. Softw. Technol., 51 (7): 1087-1109 (2009)Third international workshop on software engineering for computational science and engineering.. ICCS, volume 1 of Procedia Computer Science, page 1485-1486. Elsevier, (2010)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)A checklist for integrating student empirical studies with research and teaching goals., , , and . Empirical Software Engineering, 15 (1): 35-59 (2010)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., and . SERE (Companion), page 229-230. IEEE, (2013)Replications of software engineering experiments., , , and . Empirical Software Engineering, 19 (2): 267-276 (2014)