Author of the publication

"Breaking the code", moving between private and public work in collaborative software development.

, , and . GROUP, page 105-114. ACM, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards an architectural treatment of software security: a connector-centric approach., , , and . SESS@ICSE, page 1-7. ACM, (2005)The hard life of open source software project newcomers., , , , and . CHASE, page 72-78. ACM, (2014)An empirical study of software developers' management of dependencies and changes., and . ICSE, page 241-250. ACM, (2008)Extending the Meta-design Theory: Engaging Participants as Active Contributors in Virtual Worlds., , and . IS-EUD, volume 6654 of Lecture Notes in Computer Science, page 264-269. Springer, (2011)Using critics to analyze evolving architectures., , and . ISAW/Viewpoints@FSE, page 90-93. ACM, (1996)Cognitive tools for locating and comprehending software objects for reuse., , and . ICSE, page 318-328. IEEE Computer Society / ACM Press, (1991)Software Architecture Critics in the Argo Design Environment, and . Knowledge-Based Systems, 11 (1): 47-60 (1998)Analyzing a socio-technical visualization tool using usability inspection methods., , , and . VL/HCC, page 78-81. IEEE Computer Society, (2008)Supporting Reflective Practitioners., and . ICSE, page 688-690. IEEE Computer Society, (2004)Bridging the gap between technical and social dependencies with Ariadne., , , and . eTX, page 26-30. ACM, (2005)