Author of the publication

Are One-Time Contributors Different? A Comparison to Core and Periphery Developers in FLOSS Repositories.

, and . ESEM, page 1-10. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements., , and . Software Engineering Research and Practice, page 966-971. CSREA Press, (2006)Step One Towards Science of Security., , and . SafeConfig@CCS, page 31-35. ACM, (2017)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)Automating Systematic Literature Review., and . Contemporary Empirical Methods in Software Engineering, Springer, (2020)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., and . SERE (Companion), page 229-230. IEEE, (2013)Educating Students to be Better Citizens of Tech Communities., and . SIGCSE (2), page 1053. ACM, (2022)Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)Enabling Citizen Roboticists., , and . Enabling Intelligence through Middleware, volume WS-10-09 of AAAI Technical Report, AAAI, (2010)Observational Studies to Accelerate Process Experience in Classroom Studies: An Evaluation., , and . ISESE, page 72-79. IEEE Computer Society, (2003)