Author of the publication

Predicting failures with developer networks and social network analysis.

, , , and . SIGSOFT FSE, page 13-23. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taxonomy-Based Human Error Assessment for Senior Software Engineering Students., and . SIGCSE (1), page 840-846. ACM, (2024)On preparing students for distributed software development with a synchronous, collaborative development platform., and . SIGCSE, page 529-533. ACM, (2009)On the Use of Issue Tracking Annotations for Improving Developer Activity Metrics., and . Adv. Softw. Eng., (2010)Validating software metrics: A spectrum of philosophies., , and . ACM Trans. Softw. Eng. Methodol., 21 (4): 24:1-24:28 (2012)Interactive churn metrics: socio-technical variants of code churn., and . ACM SIGSOFT Softw. Eng. Notes, 37 (6): 1-6 (2012)An insider threat activity in a software security course., , and . FIE, page 1-6. IEEE Computer Society, (2015)Vulnerability of the day: concrete demonstrations for software engineering undergraduates., and . ICSE, page 1154-1157. IEEE Computer Society, (2013)The impact of cross-platform development approaches for mobile applications from the user's perspective., , and . WAMA@SIGSOFT FSE, page 43-49. ACM, (2016)Examining the relationship between security metrics and user ratings of mobile apps: a case study., , , and . WAMA@SIGSOFT FSE, page 8-14. ACM, (2016)Systematization of Vulnerability Discovery Knowledge: Review Protocol., and . CoRR, (2019)