Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Calibrating use case points using bayesian analysis., , , and . ESEM, page 7:1-7:10. ACM, (2018)Applying Kanban to Manage Outsourced Maintenance Services: An Action Research in a Brazilian Government Agency., , , and . CIbSE, page 665-678. Curran Associates, (2017)Why there is still few women in Engineering? A perspective from female students and professors in an Engineering campus., , , , and . FIE, page 1-8. IEEE, (2018)Analyzing Software Security-related Size and its Relationship with Vulnerabilities in OSS., , , and . QRS, page 956-965. IEEE, (2021)Bridging Theory to Practice in Software Testing Teaching through Team-based Learning (TBL) and Open Source Software (OSS) Contribution., and . SEET@ICSE, page 72-81. ACM, (2024)Knowledge Transfer in a Management Process for Outsourced Agile Software Development., , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)The effects of required security on software development effort.. ICSE (Companion Volume), page 166-169. ACM, (2020)The Impact of Software Security Practices on Development Effort: An Initial Survey., , , , and . ESEM, page 1-12. IEEE, (2019)Academy-industry collaboration and the effects of the involvement of undergraduate students in real world activities., , , and . FIE, page 1-8. IEEE Computer Society, (2016)Costing Secure Software Development: A Systematic Mapping Study., , , and . ARES, page 9:1-9:11. ACM, (2019)