Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transition from a plan-driven process to Scrum: a longitudinal case study on software quality., , and . ESEM, ACM, (2010)Observations on versioning of off-the-shelf components in industrial projects (short paper)., and . SCM, page 33-42. ACM, (2005)A Survey of Software Development with Open Source Components in Chinese Software Industry., , , , , and . ICSP, volume 4470 of Lecture Notes in Computer Science, page 208-220. Springer, (2007)An Industrial Survey of Software Outsourcing in China., , , , , and . PROFES, volume 4589 of Lecture Notes in Computer Science, page 5-19. Springer, (2007)Electronic Homework on the WWW., , , , , and . Web Intelligence, volume 2198 of Lecture Notes in Computer Science, page 540-548. Springer, (2001)Testing and verification of neural-network-based safety-critical control software: A systematic literature review., and . Inf. Softw. Technol., (2020)Tiny Machine Learning: A New Technique for AI Security., and . ERCIM News, 2022 (129): 0 (2022)High-Performance Asynchronous Byzantine Fault Tolerance Consensus Protocol., , , , and . Blockchain, page 476-483. IEEE, (2021)Attention-guided Temporal Convolutional Network for Non-intrusive Load Monitoring., , , , and . SmartGridComm, page 419-425. IEEE, (2022)Perceived Trust in Blockchain Systems: An Interview-based Survey., , , , , , and . EASE, page 386-393. ACM, (2023)