Author of the publication

Why Novice Programmers Fall into a Pitfall?: Coding Pattern Analysis in Programming Exercise.

, , , , and . IWESEP, page 46-51. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fushida, Kyohei
add a person with the name Fushida, Kyohei
 

Other publications of authors with the same name

SHINOBI: A Tool for Automatic Code Clone Detection in the IDE., , , , , , and . WCRE, page 313-314. IEEE Computer Society, (2009)Experimental Study of Quantitative Analysis of Maintenance Effort Using Program Slicing-Based Metrics., , , and . APSEC Workshops, page 50-57. IEEE, (2012)Revisiting software development effort estimation based on early phase development activities., , , , , and . MSR, page 429-438. IEEE Computer Society, (2013)Micro process analysis of maintenance effort: an open source software case study using metrics based on program slicing., , , and . Journal of Software: Evolution and Process, 25 (9): 935-955 (2013)Using Trac for Empirical Data Collection and Analysis in Developing Small and Medium-Sized Enterprise Systems., , , , , , , , and . ESEM, page 206-214. IEEE Computer Society, (2015)Analysis of Bug Fixing Processes Using Program Slicing Metrics., , , and . PROFES, volume 6156 of Lecture Notes in Business Information Processing, page 32-46. Springer, (2010)Code Clone Graph Metrics for Detecting Diffused Code Clones., , , , , and . APSEC, page 373-380. IEEE Computer Society, (2009)A Software Process Tailoring System Focusing to Quantitative Management Plans., , , and . PROFES, volume 4034 of Lecture Notes in Computer Science, page 441-446. Springer, (2006)Why Novice Programmers Fall into a Pitfall?: Coding Pattern Analysis in Programming Exercise., , , , and . IWESEP, page 46-51. IEEE Computer Society, (2012)An Authentication Method with Spatiotemporal Interval and Partial Matching., , , , , , and . SNPD, page 535-542. IEEE Computer Society, (2013)