Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., and . SERE (Companion), page 229-230. IEEE, (2013)A systematic literature review to identify and classify software requirement errors., and . Inf. Softw. Technol., 51 (7): 1087-1109 (2009)Characterizing software architecture changes: A systematic review., and . Inf. Softw. Technol., 52 (1): 31-51 (2010)Claims about the use of software engineering practices in science: A systematic literature review., and . Inf. Softw. Technol., (2015)Can observational techniques help novices overcome the software inspection learning curve? An empirical investigation., , and . Empirical Software Engineering, 11 (4): 523-539 (2006)Step One Towards Science of Security., , and . SafeConfig@CCS, page 31-35. ACM, (2017)Theory-Software Translation: Research Challenges and Future Directions., , , , , , , , , and 3 other author(s). CoRR, (2019)Gender in Software Engineering., and . IEEE Softw., 36 (6): 76-78 (2019)