Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to avoid drastic software process change (using stochastic stability)., , , and . ICSE, page 540-550. IEEE, (2009)Privacy and utility for defect prediction: Experiments with MORPH., and . ICSE, page 189-199. IEEE Computer Society, (2012)Goldfish bowl panel: Software development analytics., and . ICSE, page 1032-1033. IEEE Computer Society, (2012)2nd international workshop on realizing artificial intelligence synergies in software engineering (RAISE 2013)., , , , , , and . ICSE, page 1543-1544. IEEE Computer Society, (2013)Text is Software Too., , and . MSR, page 22-26. (2004)Evaluating a Qualitative Reasoner., , and . Australian Joint Conference on Artificial Intelligence, volume 1342 of Lecture Notes in Computer Science, page 505-514. Springer, (1997)LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction., , and . ICSE (1), page 801-811. IEEE Computer Society, (2015)Foreword., , and . DAPSE@ICSE, page iii-iv. IEEE, (2013)Learning to change projects., and . PROMISE, page 11-18. ACM, (2012)Can we build software faster and better and cheaper?, , , and . PROMISE, page 2. ACM, (2009)