Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsunoda, Masateru
add a person with the name Tsunoda, Masateru
 

Other publications of authors with the same name

Examining Software Engineering Beliefs about System Testing Defects., , , and . IT Prof., 19 (2): 58-64 (2017)Software development productivity of Japanese enterprise applications., , , , and . Inf. Technol. Manag., 10 (4): 193-205 (2009)Preliminary Analysis of the Influence of the Stereotype Threat on Computer Programming., and . APSEC, page 487-491. IEEE, (2022)Clone Detection Method Selection Based on Bandit Algorithm: a Preliminary Analysis., , , , , , , und . IWSC, Seite 53-54. IEEE, (2022)Modeling Software Project Monitoring with Stakeholders., , und . ACIS-ICIS, Seite 723-728. IEEE Computer Society, (2010)Identifying Spoofing Accounts on Twitter Based on Relationships of Accounts., , , und . BCD, Seite 85-90. IEEE Computer Society, (2018)How Does Grit Affect the Performance of Software Developers?, und . APSEC, Seite 568-569. IEEE, (2022)Relationship between Gender and Code Reading Speed in Software Development., , , und . CoRR, (2022)Standardizing the Software Tag in Japan for Transparency of Development., , , , , , und . PROFES, Volume 6156 von Lecture Notes in Business Information Processing, Seite 220-233. Springer, (2010)Assessing the Differences of Clone Detection Methods Used in the Fault-Prone Module Prediction., , und . IWSC@SANER, Seite 15-16. IEEE Computer Society, (2016)