Get my own profile
Public access
View all9 articles
4 articles
available
not available
Based on funding mandates
Co-authors
James R CordyQueen's University at KingstonVerified email at queensu.ca
Chanchal RoyProfessor, University of SaskatchewanVerified email at cs.usask.ca
Arie van DeursenProfessor of Software Engineering, Delft University of TechnologyVerified email at tudelft.nl
Jens KrinkeAssociate Professor in Computer Science, University College LondonVerified email at ucl.ac.uk
Leon MoonenFull Professor, Simula Research Laboratory & BI Norwegian Business SchoolVerified email at computer.org
Jochen QuanteRobert Bosch GmbH, Stuttgart, GermanyVerified email at de.bosch.com
Giuliano (Giulio) AntoniolRetired -- Former Professor at DGIGL -- Polytechnique MontréalVerified email at polymtl.ca
Karsten SohrUniversität Bremen, GermanyVerified email at tzi.de
Tobias RoehmTU MunichVerified email at in.tum.de
Walid MaalejUniversity of HamburgVerified email at informatik.uni-hamburg.de
Stan JarzabekBialystok University of TechnologyVerified email at pb.edu.pl
Wasim SaidVerified email at de.bosch.com
Margaret-Anne StoreyProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Hamid Abdul BasitPrince Sultan UniversityVerified email at psu.edu.sa
Minhaz F. ZibranAssociate Professor, Idaho State University, USAVerified email at isu.edu
Susan Elliott SimUniversity of TorontoVerified email at drsusansim.org
Andy ZaidmanProfessor of Software Engineering, Delft University of TechnologyVerified email at tudelft.nl
Yoshiki HigoOsaka University, JapanVerified email at ist.osaka-u.ac.jp
Andrew WalensteinDirector, Security R&D, BlackBerryVerified email at blackberry.com
Muhammad HammadEindhoven University of Technology, The NetherlandsVerified email at tue.nl