Author of the publication

Exploring the Application of Blockchain Technology to Combat the Effects of Social Loafing in Cross Functional Group Projects.

, , , , , and . OpenSym, page 13:1-13:8. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methodology for Semantic Representing of Product Data in XML., , , and . AWCC, volume 3309 of Lecture Notes in Computer Science, page 380-387. Springer, (2004)What Permissions Should This Android App Request?, , , and . SATE, page 36-41. IEEE, (2016)LTF: A Model-Based Load Testing Framework for Web Applications., , and . QSIC, page 154-163. IEEE, (2014)An Error-Resilient and Tunable Distributed Indexing Scheme for Wireless Data Broadcast., , , , and . IEEE Trans. Knowl. Data Eng., 18 (2): 392-404 (2006)Why My Code Summarization Model Does Not Work: Code Comment Improvement with Category Prediction., , , , and . ACM Trans. Softw. Eng. Methodol., 30 (2): 25:1-25:29 (2021)Don't Do That! Hunting Down Visual Design Smells in Complex UIs against Design Guidelines., , , , , and . ICSE, page 761-772. IEEE, (2021)Does Miner Pooling Impact Bitcoin's Ability to Stay Decentralized?, , , , , and . OpenSym, page 25:1-25:4. ACM, (2017)Combining Software Metrics and Text Features for Vulnerable File Prediction., , , , , and . ICECCS, page 40-49. IEEE Computer Society, (2015)On reliability of patch correctness assessment., , , , , and . ICSE, page 524-535. IEEE / ACM, (2019)Is using deep learning frameworks free?: characterizing technical debt in deep learning frameworks., , , , , and . ICSE-SEIS, page 1-10. ACM, (2020)