nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A gamification solution for improving Scrum adoption
|
Marques, Rita |
|
|
25 |
4 |
p. 2583-2629 |
artikel |
2 |
An approach and benchmark to detect behavioral changes of commits in continuous integration
|
Danglot, Benjamin |
|
|
25 |
4 |
p. 2379-2415 |
artikel |
3 |
An empirical analysis of error propagation in critical software systems
|
Cinque, Marcello |
|
|
25 |
4 |
p. 2450-2484 |
artikel |
4 |
An empirical investigation of performance overhead in cross-platform mobile development frameworks
|
Biørn-Hansen, Andreas |
|
|
25 |
4 |
p. 2997-3040 |
artikel |
5 |
Building the perfect game – an empirical study of game modifications
|
Lee, Daniel |
|
|
25 |
4 |
p. 2485-2518 |
artikel |
6 |
Characterizing the evolution of statically-detectable performance issues of Android apps
|
Das, Teerath |
|
|
25 |
4 |
p. 2748-2808 |
artikel |
7 |
Code and commit metrics of developer productivity: a study on team leaders perceptions
|
Oliveira, Edson |
|
|
25 |
4 |
p. 2519-2549 |
artikel |
8 |
Explicit programming strategies
|
LaToza, Thomas D. |
|
|
25 |
4 |
p. 2416-2449 |
artikel |
9 |
How does combinatorial testing perform in the real world: an empirical study
|
Hu, Linghuan |
|
|
25 |
4 |
p. 2661-2693 |
artikel |
10 |
How software engineering research aligns with design science: a review
|
Engström, Emelie |
|
|
25 |
4 |
p. 2630-2660 |
artikel |
11 |
On (Mis)perceptions of testing effectiveness: an empirical study
|
Vegas, Sira |
|
|
25 |
4 |
p. 2844-2896 |
artikel |
12 |
PHANTOM: Curating GitHub for engineered software projects using time-series clustering
|
Pickerill, Peter |
|
|
25 |
4 |
p. 2897-2929 |
artikel |
13 |
RePOR: Mimicking humans on refactoring tasks. Are we there yet?
|
Morales, Rodrigo |
|
|
25 |
4 |
p. 2960-2996 |
artikel |
14 |
Retraction Note: Retraction note to: The smell of fear: on the relation between test smells and flaky tests
|
Palomba, Fabio |
|
|
25 |
4 |
p. 3041 |
artikel |
15 |
Software provenance tracking at the scale of public source code
|
Rousseau, Guillaume |
|
|
25 |
4 |
p. 2930-2959 |
artikel |
16 |
Using machine learning to assist with the selection of security controls during security assessment
|
Bettaieb, Seifeddine |
|
|
25 |
4 |
p. 2550-2582 |
artikel |
17 |
What am I testing and where? Comparing testing procedures based on lightweight requirements annotations
|
Pudlitz, Florian |
|
|
25 |
4 |
p. 2809-2843 |
artikel |
18 |
What do Programmers Discuss about Deep Learning Frameworks
|
Han, Junxiao |
|
|
25 |
4 |
p. 2694-2747 |
artikel |