Author of the publication

Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.

, , and . Software Engineering Research and Practice, page 966-971. CSREA Press, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing Software Architecture Changes: An Initial Study., and . ESEM, page 410-419. ACM / IEEE Computer Society, (2007)Human Subject Evaluation of Computer-Security Training Recommender., , , and . COMPSAC, page 251-256. IEEE Computer Society, (2016)Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities., , and . HASE, page 69-76. IEEE Computer Society, (2017)A study examining relationships between micro patterns and security vulnerabilities., , and . Software Quality Journal, 27 (1): 5-41 (2019)A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities., , and . COMPSAC, page 257-262. IEEE Computer Society, (2016)Technical debt prioritization using predictive analytics., and . ICSE (Companion Volume), page 704-706. ACM, (2016)Examination of the software architecture change characterization scheme using three empirical studies., and . Empirical Software Engineering, 19 (3): 419-464 (2014)Functionality and structure of the service broker in advanced service architectures., , , , and . Bell Labs Technical Journal, 10 (1): 17-30 (2005)The Correspondence Between Software Quality Models and Technical Debt Estimation Approaches., , , , , and . MTD@ICSME, page 19-26. IEEE Computer Society, (2014)High false positive detection of security vulnerabilities: a case study., , and . ACM Southeast Regional Conference, page 359-360. ACM, (2012)