Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calibrating use case points using bayesian analysis., , , and . ESEM, page 7:1-7:10. ACM, (2018)Applying Kanban to Manage Outsourced Maintenance Services: An Action Research in a Brazilian Government Agency., , , and . CIbSE, page 665-678. Curran Associates, (2017)Why there is still few women in Engineering? A perspective from female students and professors in an Engineering campus., , , , and . FIE, page 1-8. IEEE, (2018)How SonarQube-identified technical debt is prioritized: An exploratory case study., , , , and . Inf. Softw. Technol., (April 2023)Costing Secure Software Development: A Systematic Mapping Study., , , and . ARES, page 9:1-9:11. ACM, (2019)Using Scrum in Outsourced Government Projects: An Action Research., , , , and . HICSS, page 5447-5456. IEEE Computer Society, (2016)Knowledge Transfer in a Management Process for Outsourced Agile Software Development., , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Organizational Strategies for End-User Development - A Systematic Literature Mapping., , , , , and . Informatics, 8 (1): 15 (2021)The Impact of Software Security Practices on Development Effort: An Initial Survey., , , , and . ESEM, page 1-12. IEEE, (2019)The effects of required security on software development effort.. ICSE (Companion Volume), page 166-169. ACM, (2020)