Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Engineering for Internet Applications.. The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)Socio-technical developer networks: should we trust our measurements?, and . ICSE, page 281-290. ACM, (2011)Early estimation of defect density using an in-process Haskell metrics model., , , and . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-6 (2005)An empirical model to predict security vulnerabilities using code complexity metrics., and . ESEM, page 315-317. ACM, (2008)Building forensics in: supporting the investigation of digital criminal activities (invited talk).. SERF@ESEC/SIGSOFT FSE, page 1. ACM, (2017)Evaluating access control of open source electronic health record systems., and . SEHC@ICSE, page 63-70. ACM, (2011)In Support of Pair Programming in the Introductory Computer Science Course., , , , and . Comput. Sci. Educ., 12 (3): 197-212 (2002)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)Strengthening the Case for Pair Programming., , , and . IEEE Software, 17 (4): 19-25 (2000)How have we evaluated software pattern application? A systematic mapping study of research design practices., , and . Inf. Softw. Technol., (2015)