[4] | Application of Validation Obligations to Security Concerns (Sebastian Stock, Atif Mashkoor, Alexander Egyed), (Gabriele Kotsis, A. Min Tjoa, Ismail Khalil, Bernhard Moser, Alfred Taudes, Atif Mashkoor, Johannes Sametinger, Jorge Martinez-Gil, Florian Sobieczky, Lukas Fischer, Rudolf Ramler, Maqbool Khan, Gerald Czech, eds.), Springer International Publishing, 2022.
[bib] |
[3] | Smell Patterns as Indicators of Design Degradation: Do Developers Agree? (Anderson Oliveira, Willian Oizumi, Leonardo Sousa, Wesley K. G. Assunção, Alessandro Garcia, Carlos Lucena, Diego Cedrim), Association for Computing Machinery, 2022.
[bib] [doi] |
[2] | Assembly Precedence Graph Mining Based on Similar Products (Ouijdane Guiza, Christoph Mayr-Dorn, Michael Mayrhofer, Alexander Egyed, Heinz RiegerFrank Brandt), 2022.
[bib] [doi] |
[1] | On the Influential Interactive Factors on Degrees of Design Decay: A Multi-Project Study (Daniel Coutinho, Anderson Uchôa, Caio Barbosa, Vinícius Soares, Alessandro Garcia, Marcelo Schots, Juliana Pereira, Wesley K. G. Assunção), 2022.
[bib] [doi] |