Author of the publication

An empirical investigation of the evaluators' scoring of vendors' responses to an RFP of a large healthcare system.

, , , and . SEHS@ICSE, page 33-38. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using entropy measures for comparison of software traces., , , and . Inf. Sci., (2012)Using entropy measures for comparison of software traces, , , and . CoRR, (2010)Discovering the Fault Origin from Field Traces., , and . ISSRE, page 295-296. IEEE Computer Society, (2008)Total ADS: Automated Software Anomaly Detection System., , , and . SCAM, page 83-88. IEEE Computer Society, (2014)On the use of hidden Markov model to predict the time to fix bugs., , , and . ICSE, page 700. ACM, (2018)Monitoring system calls for anomaly detection in modern operating systems., , , , and . ISSRE (Supplemental Proceedings), page 19-20. IEEE Computer Society, (2013)How to Effectively Train IBM Watson: Classroom Experience., , , and . HICSS, page 1663-1670. IEEE Computer Society, (2016)Diagnosing new faults using mutants and prior faults., , , and . ICSE, page 960-963. ACM, (2011)F007: finding rediscovered faults from the field using function-level failed traces of software in the field., , , and . CASCON, page 57-71. ACM, (2010)Regex-augmented Domain Transfer Topic Classification based on a Pre-trained Language Model: An application in Financial Domain., , , and . CoRR, (2023)