Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collective intelligence for the common good: cultivating the seeds for an intentional collaborative enterprise., , , and . AI Soc., 33 (1): 1-13 (2018)Can Language Models Employ the Socratic Method? Experiments with Code Debugging., , , and . CoRR, (2023)How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool., , , , and . IEEE Trans. Software Eng., 45 (9): 877-897 (2019)Paradise unplugged: identifying barriers for female participation on stack overflow., , , and . SIGSOFT FSE, page 846-857. ACM, (2016)A Business-Rules Approach for Departmental Advising., , , , , , and . FLAIRS, page 305-309. AAAI Press, (2002)Towards Ethical Data-Driven Software: Filling the Gaps in Ethics Research & Practice., and . SEthics@ICSE, page 18-25. IEEE, (2021)An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework., , , and . NCS, page 1-7. IEEE, (2018)Identifying successful strategies for resolving static analysis notifications.. ICSE (Companion Volume), page 662-664. ACM, (2016)Flower: Navigating program flow in the IDE., , and . VL/HCC, page 19-23. IEEE Computer Society, (2017)A Case Study of Software Security Red Teams at Microsoft., , and . VL/HCC, page 1-10. IEEE, (2020)