Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessment of portlet quality: Collecting real experience., , , and . Comput. Stand. Interfaces, 31 (2): 336-347 (2009)Improving the teaching of object-oriented design knowledge., and . ACM SIGCSE Bull., 39 (4): 108-112 (2007)Applicability of Security Patterns., , , , , and . OTM Conferences (1), volume 6426 of Lecture Notes in Computer Science, page 672-684. Springer, (2010)Maintenance cost of a software design: A value-based approach., , and . ICEIS (1), page 384-389. (2007)Object Oriented Design Knowledge: Ontology and Measurement of Impact., and . OOIS, volume 2425 of Lecture Notes in Computer Science, page 153-159. Springer, (2002)Beyond Object Oriented Design Patterns., and . ICEIS, page 811-814. (2002)An Ontology for Understanding and Applying Object-Oriented Design Knowledge., and . International Journal of Software Engineering and Knowledge Engineering, 17 (3): 407-421 (2007)Leadership Styles in Agile Teams: An Analysis Based on Experience., , , and . IEEE Access, (2022)A case study of software process improvement with CMMI-DEV and Scrum in Spanish companies., and . J. Softw. Evol. Process., 25 (12): 1325-1333 (2013)Towards a Pattern-based Security Methodology to Build Secure Information Systems., , , and . WOSIS, page 59-69. SciTePress, (2011)