Author of the publication

Comparing traceability through information retrieval, commits, interaction logs, and tags.

, , and . SST@ICSE, page 21-28. IEEE / ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Addressed Challenges, , , , , , , , and . Managed Software Evolution, (2019)A field study of the requirements engineering practice in Australian software industry., , , and . Requir. Eng., 12 (3): 145-162 (July 2007)How to Improve Decision Documentation in Software Evolution?, , , and . Software Engineering (Workshops), volume 1129 of CEUR Workshop Proceedings, page 14-15. CEUR-WS.org, (2014)The Vital Few and Trivial Many: An Empirical Analysis of the Pareto Distribution of Defects., and . Software Engineering, volume P-143 of LNI, page 151-162. GI, (2009)MOQARE: misuse-oriented quality requirements engineering, and . Requirements Engineering, 13 (1): 73--86 (2008)Boundary Objects for Value-based Requirements Engineering., and . SIGSAND-EUROPE, volume P-129 of LNI, page 11-24. GI, (2008)Das virtuelle Software-Engineering-Kompetenznetz software-kompetenz.de., and . GI Jahrestagung (1), volume P-93 of LNI, page 288-294. GI, (2006)Reengineering Conventional Data and Process Models with Business Object Models: A Case Study Based on SAP R/3 and UML., , and . ER, volume 1507 of Lecture Notes in Computer Science, page 393-406. Springer, (1998)Requirements Engineering (RE) for Social Good: RE Cares Requirements., , , , , , , , , and 10 other author(s). IEEE Softw., 36 (1): 86-94 (2019)Documenting and Exploiting Software Feature Knowledge through Tags., and . SEKE, page 754-777. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)