Author of the publication

How do Practitioners Perceive the Relevance of Requirements Engineering Research? An Ongoing Study.

, , , , , , , , , and . RE, page 382-387. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automating Systematic Literature Review., and . Contemporary Empirical Methods in Software Engineering, Springer, (2020)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)Step One Towards Science of Security., , and . SafeConfig@CCS, page 31-35. ACM, (2017)Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements., , and . Software Engineering Research and Practice, page 966-971. CSREA Press, (2006)Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)Educating Students to be Better Citizens of Tech Communities., and . SIGCSE (2), page 1053. ACM, (2022)Enabling Citizen Roboticists., , and . Enabling Intelligence through Middleware, volume WS-10-09 of AAAI Technical Report, AAAI, (2010)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., and . SERE (Companion), page 229-230. IEEE, (2013)Using a Cognitive Psychology Perspective on Errors to Improve Requirements Quality: An Empirical Investigation., , , , and . ISSRE, page 65-76. IEEE Computer Society, (2016)