Author of the publication

The effects of openness to experience on pair programming in a higher education context.

, , and . CSEE&T, page 149-158. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information visualisation utilising 3D computer game engines case study: a source code comprehension tool., , , and . CHINZ, volume 94 of ACM International Conference Proceeding Series, page 53-60. ACM, (2005)Subsuming Methods: Finding New Optimisation Opportunities in Object-Oriented Software., , , and . ICPE, page 175-186. ACM, (2015)A Generic Technique for Domain-Specific Visual Language Model Refactoring to Patterns., , and . ECEASST, (2010)Providing Integrated Support for Multiple Development Notations, and . CAiSE, volume 932 of Lecture Notes in Computer Science, page 255-268. Springer, (1995)Generating Reusable Visual Notations Using Model Transformation., , and . International Journal of Software Engineering and Knowledge Engineering, 25 (2): 277-306 (2015)Building Digital Ink Recognizers Using Data Mining: Distinguishing between Text and Shapes in Hand Drawn Diagrams., , , and . IEA/AIE (1), volume 6096 of Lecture Notes in Computer Science, page 358-367. Springer, (2010)Building Multi-Device, Component-based, Thin-client Groupware: Issues and Experiences., , and . AUIC, volume 7 of CRPIT, page 71-80. Australian Computer Society, (2002)What Influences Usability Defect Reporting? - A Survey of Software Development Practitioners., , , and . APSEC, page 17-24. IEEE Computer Society, (2016)A comparative analysis of design principles for project-based IT courses.. ACSE, volume 2 of ACM International Conference Proceeding Series, page 170-177. ACM, (1997)An Information-Theoretic and Contrastive Learning-based Approach for Identifying Code Statements Causing Software Vulnerability., , , , , , , and . CoRR, (2022)