Author of the publication

Characterizing Software Architecture Changes: An Initial Study.

, and . ESEM, page 410-419. ACM / IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., and . SERE (Companion), page 229-230. IEEE, (2013)Enabling Citizen Roboticists., , and . Enabling Intelligence through Middleware, volume WS-10-09 of AAAI Technical Report, AAAI, (2010)Educating Students to be Better Citizens of Tech Communities., and . SIGCSE (2), page 1053. ACM, (2022)Using a Cognitive Psychology Perspective on Errors to Improve Requirements Quality: An Empirical Investigation., , , , and . ISSRE, page 65-76. IEEE Computer Society, (2016)Understanding the impressions, motivations, and barriers of one time code contributors to FLOSS projects: a survey., , and . ICSE, page 187-197. IEEE / ACM, (2017)Parallel Programmer Productivity: A Case Study of Novice Parallel Programmers., , , , and . SC, page 35. IEEE Computer Society, (2005)Automating Systematic Literature Review., and . Contemporary Empirical Methods in Software Engineering, Springer, (2020)Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)