From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Eliciting Environmental Opposites for Requirements-Based Testing., , , и . RE Workshops, стр. 10-13. IEEE, (2022)RF Metasurface Based 'Add-Ons' for Boosting Signal-To-Noise Ratio of 1.5T MRI Scans., , , , и . NCC, стр. 1-4. IEEE, (2023)Predicting Vulnerability for Requirements., , , , и . IRI, стр. 160-167. IEEE, (2021)Completeness of Natural Language Requirements: A Comparative Study of User Stories and Feature Descriptions., , , , и . IRI, стр. 52-57. IEEE, (2023)SecureChange: An Automated Framework to Guide Programmers in Fixing Vulnerability., , и . SEKE, стр. 560-565. KSI Research Inc., (2020)Automated generation of creative software requirements: a data-driven approach., и . WASPI@ESEC/SIGSOFT FSE, стр. 9-12. ACM, (2018)Portability as an aspect: rethinking modularity in mobile game development., , и . AOSD (Companion), стр. 3-4. ACM, (2011)An empirical study of text-based machine learning models for vulnerability detection., , и . Empir. Softw. Eng., 28 (2): 38 (марта 2023)Automated Support to Capture Environment Assertions for Requirements-Based Testing., , , и . IRI, стр. 123-130. IEEE, (2021)Foraging-Theoretic Tool Composition: An Empirical Study on Vulnerability Discovery., , , , , и . IRI, стр. 139-146. IEEE, (2021)