Author of the publication

Characterizing Experimentation in Continuous Deployment: A Case Study on Bing.

, , , and . ICSE-SEIP, page 123-132. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying Natural Language Sentences for Policy., and . POLICY, page 33-36. IEEE Computer Society, (2012)Proposing regulatory-driven automated test suites for electronic health record systems., , , and . SEHC@ICSE, page 46-49. IEEE Computer Society, (2013)In support of student pair-programming., and . SIGCSE, page 327-331. ACM, (2001)Note to self: make assignments meaningful., , and . SIGCSE, page 459-463. ACM, (2007)Infiltrating security into development: exploring the world's largest software security study., , , and . ESEC/SIGSOFT FSE, page 1326-1336. ACM, (2021)The rising tide lifts all boats: the advancement of science in cyber security (invited talk).. ESEC/SIGSOFT FSE, page 1. ACM, (2017)Personality types, learning styles, and an agile approach to software engineering education., , and . SIGCSE, page 428-432. ACM, (2006)An Initial Study of a Lightweight Process for Change Identification and Regression Test Selection When Source Code Is Not Available., , , and . ISSRE, page 225-234. IEEE Computer Society, (2005)Access Control Policy Evolution: An Empirical Study., , , and . ISSRE, page 245-254. IEEE Computer Society, (2014)Characterizing Experimentation in Continuous Deployment: A Case Study on Bing., , , and . ICSE-SEIP, page 123-132. IEEE Computer Society, (2017)