From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards an architectural treatment of software security: a connector-centric approach., , , и . SESS@ICSE, стр. 1-7. ACM, (2005)The hard life of open source software project newcomers., , , , и . CHASE, стр. 72-78. ACM, (2014)Extending the Meta-design Theory: Engaging Participants as Active Contributors in Virtual Worlds., , и . IS-EUD, том 6654 из Lecture Notes in Computer Science, стр. 264-269. Springer, (2011)Using critics to analyze evolving architectures., , и . ISAW/Viewpoints@FSE, стр. 90-93. ACM, (1996)Using HTML to create early prototypes., , и . CHI Extended Abstracts, стр. 232-233. ACM, (1999)Intertwining query construction and relevance evaluation., , и . CHI, стр. 55-62. ACM, (1991)Cognitive tools for locating and comprehending software objects for reuse., , и . ICSE, стр. 318-328. IEEE Computer Society / ACM Press, (1991)Software Architecture Critics in the Argo Design Environment, и . Knowledge-Based Systems, 11 (1): 47-60 (1998)Supporting Reflective Practitioners., и . ICSE, стр. 688-690. IEEE Computer Society, (2004)Understanding cheap talk and the emergence of trust in global software engineering: An evolutionary game theory perspective., и . CHASE@ICSE, стр. 149-152. IEEE Computer Society, (2013)