Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Comparative Evaluation of Test Prioritization Approaches in an Industrial Study., , , , and . QRS Companion, page 35-44. IEEE, (2023)Requirement Development Life Cycle: The Industry Practices., , , , , , , , and . SERA, page 12-16. IEEE Computer Society, (2011)Contributions to Improving Feedback and Trust in Automated Testing and Continuous Integration and Delivery.. Linköping University, Sweden, (2022)Requirements Development Life Cycle with Respect to Geographically Distributed Stakeholders: The "V" Model., , , , , and . ITNG, page 1076-1077. IEEE Computer Society, (2011)Hypothesis-Driven Deep Learning for Out of Distribution Detection., , , , , and . CoRR, (2024)Software professionals' information needs in continuous integration and delivery., , and . SAC, page 1513-1520. ACM, (2021)A Multi-factor Approach for Flaky Test Detection and Automated Root Cause Analysis., , , , and . APSEC, page 338-348. IEEE, (2021)An Evaluation of Machine Learning Methods for Predicting Flaky Tests., , and . QuASoQ@APSEC, volume 2767 of CEUR Workshop Proceedings, page 37-46. CEUR-WS.org, (2020)A Multi-token Authorization Strategy for Secure Mobile Cloud Computing., , and . MobileCloud, page 136-141. IEEE Computer Society, (2014)Security Concerns in Cloud Computing., , , and . ITNG, page 411-416. IEEE Computer Society, (2013)