Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigating the use of duration-based windows and estimation by analogy for COCOMO., , , , and . J. Softw. Evol. Process., (2019)Incremental Process Modeling through Stakeholder-Based Hybrid Process Simulation., , and . ICSP, volume 5543 of Lecture Notes in Computer Science, page 280-292. Springer, (2009)Monitoring Interactions Across Multi Business Processes with Token Carried Data., , , , , and . IEEE Trans. Serv. Comput., 12 (6): 941-954 (2019)Effective API recommendation without historical software repositories., , and . ASE, page 282-292. ACM, (2018)Developing a SSE-CMM-based security risk assessment process for patient-centered healthcare systems., , and . WoSQ@ICSE, page 11-16. ACM, (2008)Linking Source Code to Untangled Change Intents., , , and . ICSME, page 393-403. IEEE Computer Society, (2018)An empirical assessment of a systematic search process for systematic reviews., , , , and . EASE, page 56-65. IET - The Institute of Engineering and Technology / IEEE Xplore, (2011)Investigating a NASA Cyclomatic Complexity Policy on Maintenance Risk of a Critical System., , and . ICSE-SEIP, page 211-221. IEEE, (2023)SPT-Code: Sequence-to-Sequence Pre-Training for Learning Source Code Representations., , , , , and . ICSE, page 1-13. ACM, (2022)A Value-Based Process for Achieving Software Dependability.. ISPW, volume 3840 of Lecture Notes in Computer Science, page 108-121. Springer, (2005)