default search action
Syed Muhammad Ali Shah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i1]Michael Unterkalmsteiner, Pekka Abrahamsson, Xiaofeng Wang, Anh Nguyen-Duc, Syed M. Ali Shah, Sohaib Shahid Bajwa, Guido H. Baltes, Kieran Conboy, Eoin Cullina, Denis Dennehy, Henry Edison, Carlos Fernández-Sánchez, Juan Garbajosa, Tony Gorschek, Eriks Klotins, Laura Hokkanen, Fabio Kon, Ilaria Lunesu, Michele Marchesi, Lorraine Morgan, Markku Oivo, Christoph Selig, Pertti Seppänen, Roger Sweetman, Pasi Tyrväinen, Christina Ungerer, Agustín Yagüe:
Software Startups - A Research Agenda. CoRR abs/2308.12816 (2023)
2010 – 2019
- 2019
- [j7]Markus Borg, Panagiota Chatzipetrou, Krzysztof Wnuk, Emil Alégroth, Tony Gorschek, Efi Papatheocharous, Syed Muhammad Ali Shah, Jakob Axelsson:
Selecting component sourcing options: A survey of software engineering's broader make-or-buy decisions. Inf. Softw. Technol. 112: 18-34 (2019) - 2018
- [j6]Efi Papatheocharous, Krzysztof Wnuk, Kai Petersen, Séverine Sentilles, Antonio Cicchetti, Tony Gorschek, Syed Muhammad Ali Shah:
The GRADE taxonomy for supporting decision-making of asset selection in software-intensive system development. Inf. Softw. Technol. 100: 1-17 (2018) - [j5]Kai Petersen, Deepika Badampudi, Syed Muhammad Ali Shah, Krzysztof Wnuk, Tony Gorschek, Efi Papatheocharous, Jakob Axelsson, Séverine Sentilles, Ivica Crnkovic, Antonio Cicchetti:
Choosing Component Origins for Software Intensive Systems: In-House, COTS, OSS or Outsourcing? - A Case Survey. IEEE Trans. Software Eng. 44(3): 237-261 (2018) - 2016
- [j4]Syed Muhammad Ali Shah, Daniel Sundmark, Birgitta Lindström, Sten F. Andler:
Robustness Testing of Embedded Software Systems: An Industrial Interview Study. IEEE Access 4: 1859-1871 (2016) - [j3]Michael Unterkalmsteiner, Pekka Abrahamsson, Xiaofeng Wang, Anh Nguyen-Duc, Syed M. Ali Shah, Sohaib Shahid Bajwa, Guido H. Baltes, Kieran Conboy, Eoin Cullina, Denis Dennehy, Henry Edison, Carlos Fernández-Sánchez, Juan Garbajosa, Tony Gorschek, Eriks Klotins, Laura Hokkanen, Fabio Kon, Ilaria Lunesu, Michele Marchesi, Lorraine Morgan, Markku Oivo, Christoph Selig, Pertti Seppänen, Roger Sweetman, Pasi Tyrväinen, Christina Ungerer, Agustín Yagüe:
Software Startups - A Research Agenda. e Informatica Softw. Eng. J. 10(1): 89-124 (2016) - [c15]Anh Nguyen-Duc, Syed Muhammad Ali Shah, Pekka Abrahamsson:
Towards an Early Stage Software Startups Evolution Model. SEAA 2016: 120-127 - [c14]Mohammad Mahdi Hassan, Wasif Afzal, Birgitta Lindström, Syed Muhammad Ali Shah, Sten F. Andler, Martin Blom:
Testability and software performance: a systematic mapping study. SAC 2016: 1566-1569 - 2015
- [c13]Efi Papatheocharous, Kai Petersen, Antonio Cicchetti, Séverine Sentilles, Syed Muhammad Ali Shah, Tony Gorschek:
Decision support for choosing architectural assets in the development of software-intensive systems: The GRADE taxonomy. ECSA Workshops 2015: 48:1-48:7 - [c12]Syed Muhammad Ali Shah, Efi Papatheocharous, Jaana Nyfjord:
Measuring productivity in agile software development process: a scoping study. ICSSP 2015: 102-106 - 2014
- [b1]Syed Muhammad Ali Shah:
Empirical characterization of software quality. Polytechnic University of Turin, Italy, 2014 - [j2]Syed Muhammad Ali Shah, Marco Torchiano, Antonio Vetrò, Maurizio Morisio:
Exploratory Testing as a Source of Technical Debt. IT Prof. 16(3): 44-51 (2014) - [j1]Syed Muhammad Ali Shah, Çigdem Gencel, Usman Sattar Alvi, Kai Petersen:
Towards a hybrid testing process unifying exploratory testing and scripted testing. J. Softw. Evol. Process. 26(2): 220-250 (2014) - [c11]Syed Muhammad Ali Shah, Usman Sattar Alvi, Çigdem Gencel, Kai Petersen:
Comparing a Hybrid Testing Process with Scripted and Exploratory Testing: An Experimental Study with Practitioners. XP 2014: 187-202 - 2013
- [c10]Syed Muhammad Ali Shah, Maurizio Morisio, Marco Torchiano:
Software defect density variants: A proposal. WETSoM 2013: 56-61 - [c9]Syed Muhammad Ali Shah, Jens Dietrich, Catherine McCartin:
On the Automation of Dependency-Breaking Refactorings in Java. ICSM 2013: 160-169 - 2012
- [c8]Jens Dietrich, Catherine McCartin, Ewan D. Tempero, Syed M. Ali Shah:
On the Existence of High-Impact Refactoring Opportunities in Programs. ACSC 2012: 37-48 - [c7]Syed Muhammad Ali Shah, Maurizio Morisio, Marco Torchiano:
An Overview of Software Defect Density: A Scoping Study. APSEC 2012: 406-415 - [c6]Syed M. Ali Shah, Jens Dietrich, Catherine McCartin:
Making Smart Moves to Untangle Programs. CSMR 2012: 359-364 - [c5]Syed Muhammad Ali Shah, Maurizio Morisio, Marco Torchiano:
The impact of process maturity on defect density. ESEM 2012: 315-318 - [c4]Syed Muhammad Ali Shah, Jens Dietrich, Catherine McCartin:
On the Automated Modularisation of Java Programs Using Service Locators. SC@TOOLS 2012: 132-147 - 2010
- [c3]Jens Dietrich, Catherine McCartin, Ewan D. Tempero, Syed M. Ali Shah:
Barriers to Modularity - An Empirical Study to Assess the Potential for Modularisation of Java Programs. QoSA 2010: 135-150
2000 – 2009
- 2008
- [c2]Muhammad Ainan Sadiq, Syed Muhammad Ali Shah:
Shared Storage in J2ME: A Multi-agent System Approach. COMPSAC 2008: 569-574 - [c1]Syed Muhammad Ali Shah, Naseer Gul, Hafiz Farooq Ahmad, Rami Bahsoon:
Secure Storage and Communication in J2ME Based Lightweight Multi-Agent Systems. KES-AMSTA 2008: 887-896
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint