Author of the publication

An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law.

, , and . Agile Development Conference, page 11-20. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Examining Internet privacy policies within the context of user privacy values., , , and . IEEE Trans. Engineering Management, 52 (2): 227-237 (2005)Privacy Policy Representation in Web-based Healthcare., , and . AMCIS, page 323. Association for Information Systems, (2006)Prioritizing Legal Requirements., , and . RELAW, page 27-32. IEEE Computer Society, (2009)Addressing Legal Requirements in Requirements Engineering., and . RE, page 5-14. IEEE Computer Society, (2007)Aligning Requirements with HIPAA in the iTrust System., , and . RE, page 335-336. IEEE Computer Society, (2008)Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model., , , and . RE, page 94-101. IEEE Computer Society, (2001)An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law., , and . Agile Development Conference, page 11-20. IEEE Computer Society, (2004)A Prototype System for Transnational Information Sharing and Process Coordination., , , , , , , , , and 14 other author(s). DG.O, Digital Government Research Center, (2004)Assessing identification of compliance requirements from privacy policies., , and . RELAW, page 52-61. IEEE Computer Society, (2012)Tracking requirements evolution by using issue tickets: a case study of a document management and approval system., , , , and . ICSE Companion, page 245-254. ACM, (2014)