Author of the publication

Functional change impact analysis in use cases: An approach based on COSMIC functional size measurement.

, , and . Sci. Comput. Program., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A guideline for software architecture selection based on ISO 25010 quality related characteristics., , , and . Int. J. Syst. Assur. Eng. Manag., 8 (2s): 886-909 (2017)Software enhancement effort estimation using correlation-based feature selection and stacking ensemble method., , and . Clust. Comput., 25 (4): 2779-2792 (2022)Towards a Software Requirements Change Classification using Support Vector Machine., , and . LPKM, volume 2279 of CEUR Workshop Proceedings, CEUR-WS.org, (2018)An Ontology-Based Approach for Preventing Incompatibility Problems of Quality Requirements During Cloud SLA Establishment., , , and . ICCCI (1), volume 11683 of Lecture Notes in Computer Science, page 663-675. Springer, (2019)Metrology, Measurement and Metrics in Software Engineering., , and . IEEE METRICS, page 2-. IEEE Computer Society, (2003)Improving the Structural Size Measurement Method Through the Assessment of Nested (Multi-Level) Control Structures in UML Sequence Diagram., , , and . IWSM-Mensura, volume 2725 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)Predicting the functional change status in UML activity diagram from the use case diagram., , and . AICCSA, page 1-8. IEEE Computer Society, (2016)Automated COSMIC-Based Analysis and Consistency Verification of UML Activity and Component Diagrams., , and . ENASE (Selected Papers), volume 417 of Communications in Computer and Information Science, page 48-63. Springer, (2013)Analyzing UML Activity and Component Diagrams - An Approach based on COSMIC Functional Size Measurement., , and . ENASE, page 36-44. SciTePress, (2013)Managing vulnerabilities during the development of a secure ETL processes., , , and . Int. J. Inf. Comput. Secur., 18 (1/2): 75-104 (2022)