Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Un enfoque basado en valor para la refactorización software., , , and . JISBD, page 77-86. IBERGARCETA Pub. S.L., (2010)Improving Object-Oriented Micro Architectural Design Through Knowledge Systematization., and . ER (Workshops), volume 3770 of Lecture Notes in Computer Science, page 444-453. Springer, (2005)Principles and Patterns in the Object Oriented Design., and . OOIS, page 15-24. Springer, (2001)Applicability of Security Patterns., , , , , and . OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, page 672-684. Springer, (2010)Maintenance cost of a software design: A value-based approach., , and . ICEIS (1), page 384-389. (2007)Leadership Styles in Agile Teams: An Analysis Based on Experience., , , and . IEEE Access, (2022)A case study of software process improvement with CMMI-DEV and Scrum in Spanish companies., and . J. Softw. Evol. Process., 25 (12): 1325-1333 (2013)Object Oriented Design Knowledge: Ontology and Measurement of Impact., and . OOIS, volume 2425 of Lecture Notes in Computer Science, page 153-159. Springer, (2002)Beyond Object Oriented Design Patterns., and . ICEIS, page 811-814. (2002)Towards a Pattern-based Security Methodology to Build Secure Information Systems., , , and . WOSIS, page 59-69. SciTePress, (2011)