Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Replications of software engineering experiments., , , and . Empirical Software Engineering, 19 (2): 267-276 (2014)A systematic literature review to identify and classify software requirement errors., and . Inf. Softw. Technol., 51 (7): 1087-1109 (2009)Characterizing software architecture changes: A systematic review., and . Inf. Softw. Technol., 52 (1): 31-51 (2010)Claims about the use of software engineering practices in science: A systematic literature review., and . Inf. Softw. Technol., (2015)Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)Third international workshop on software engineering for computational science and engineering.. ICCS, volume 1 of Procedia Computer Science, page 1485-1486. Elsevier, (2010)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements., , and . Software Engineering Research and Practice, page 966-971. CSREA Press, (2006)Can observational techniques help novices overcome the software inspection learning curve? An empirical investigation., , and . Empirical Software Engineering, 11 (4): 523-539 (2006)