Author of the publication

Identifying high perceived value practices of CMMI level 2: An empirical study.

, and . Inf. Softw. Technol., 51 (8): 1231-1243 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and evaluation of adaptive system for big data cyber security analytics., , and . Expert Syst. Appl., (2022)Applying empirical software engineering to software architecture: challenges and lessons learned., , , and . Empir. Softw. Eng., 15 (3): 250-276 (2010)Applying empirical software engineering to software architecture: challenges and lessons learned., , , and . CoRR, (2017)Toward a Reference Architecture for Software Supply Chain Metadata Management., , and . CoRR, (2023)Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges., , and . CoRR, (2020)Identifying high perceived value practices of CMMI level 2: An empirical study., and . Inf. Softw. Technol., 51 (8): 1231-1243 (2009)Identifying relevant studies in software engineering., , and . Inf. Softw. Technol., 53 (6): 625-637 (2011)An empirical investigation of the influence of persona with personality traits on conceptual design., , , , , and . J. Syst. Softw., (2017)A Study on Early & Non-Intrusive Security Assessment for Container Images., and . ENASE, page 640-647. SCITEPRESS, (2023)On the Role of Architectural Design Decisions in Software Product Line Engineering., and . ECSA, volume 5292 of Lecture Notes in Computer Science, page 241-255. Springer, (2008)