Author of the publication

Predicting Requirements Changes by Focusing on the Social Relations.

, and . APCCM, volume 154 of CRPIT, page 65-70. Australian Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Analyzing the Context of Stakeholders and their Requirements., and . ICSOFT EA, page 357-362. SciTePress, (2014)Information Flow Diagram and Analysis Method for Unexpected Obstacle Specification of Embedded Software., , , , , , and . JCKBSE, volume 140 of Frontiers in Artificial Intelligence and Applications, page 115-124. IOS Press, (2006)A Method for Extracting Unexpected Scenarios of Embedded Systems., , , , , and . JCKBSE, volume 140 of Frontiers in Artificial Intelligence and Applications, page 41-50. IOS Press, (2006)Toward the Decision Tree for Inferring Requirements Maturation Types., , , , , and . IEICE Trans. Inf. Syst., 95-D (4): 1021-1030 (2012)Requirements Engineering Based on REBOK (Requirements Engineering Body Of Knowledge) and Its Practice., , , and . APSEC (2), page 79-80. IEEE Computer Society, (2013)Predicting Fault Proneness of Programs with CNN., and . ICAART (1), page 321-328. SciTePress, (2019)Quantitative Observations on Object Evolution.. IWPSE, page 154-157. ACM, (2001)Generating Scenarios with Access Permission from a Conceptual Model., , , and . JCKBSE, page 127-136. Springer, (2018)Moral Education for Adults for Information Ethics to Effect the Unknown Problem., and . JCKBSE, page 43-52. Springer, (2018)A method to generate traverse paths for eliciting missing requirements., , , and . ACSW, page 54:1-54:10. ACM, (2019)