default search action
Bee Bee Chua
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j1]Bee Bee Chua, Ying Zhang:
Applying a Systematic Literature Review and Content Analysis Method to Analyse Open Source Developers' Forking Motivation Interpretation, Categories and Consequences. Australas. J. Inf. Syst. 24 (2020)
2010 – 2019
- 2019
- [c17]Bee Bee Chua, Ying Zhang:
Predicting open source programming language repository file survivability from forking data. OpenSym 2019: 2:1-2:8 - 2017
- [c16]Bee Bee Chua:
A Survey Paper on Open Source Forking Motivation Reasons and Challenges. PACIS 2017: 75 - 2015
- [c15]Danilo Valeros Bernardo, Bee Bee Chua:
Introduction and Analysis of SDN and NFV Security Architecture (SN-SECA). AINA 2015: 796-801 - [c14]Jordan Hall, Bee Bee Chua:
Analysing Yammer Usage Pattern in the Context of Social Collaborative Activity Performance by Knowledge Workers. HCI (14) 2015: 127-137 - 2014
- [c13]Bee Bee Chua:
Applying the Submission Multiple Tier (SMT) Matrix to Detect Impact on Developer Interest on Open Source Project Survivability. OSS 2014: 70-75 - 2013
- [c12]Bee Bee Chua:
Analyzing Version Control Open Source Software Survivability. DMS 2013: 61-65 - [c11]Bee Bee Chua, Danilo Valeros Bernardo:
Open Source Developer Download Tiers: A Survival Framework. ICITCS 2013: 1-5 - [c10]Danilo Valeros Bernardo, Bee Bee Chua:
Random validation and fault detection method in systems implementations. ISDA 2013: 172-176 - 2011
- [c9]Bee Bee Chua, June M. Verner:
Evaluating Software Maintenance Effort: The COME Matrix. FGIT-ASEA/DRBC/EL 2011: 120-136 - [c8]Bee Bee Chua:
Role Playing for Scholarly Articles. FGIT-ASEA/DRBC/EL 2011: 662-674 - [c7]Bee Bee Chua, Danilo Valeros Bernardo:
Integrating scholarly articles within e-learning courses: a framework. ITiCSE 2011: 392 - 2010
- [c6]Bee Bee Chua:
Rework Requirement Changes in Software Maintenance. ICSEA 2010: 252-258 - [c5]Bee Bee Chua, Danilo Valeros Bernardo, June M. Verner:
Understanding the Use of Elicitation Approaches for Effective Requirements Gathering. ICSEA 2010: 325-330 - [i1]Bee Bee Chua, June M. Verner:
Examining Requirements Change Rework Effort: A Study. CoRR abs/1007.5126 (2010)
2000 – 2009
- 2009
- [c4]Danilo Valeros Bernardo, Bee Bee Chua, Doan B. Hoang:
Quantitative Security Risk Assessment (SRA) Method: An Empirical Case Study. NaBIC 2009: 972-977 - 2008
- [c3]Bee Bee Chua, Danilo Valeros Bernardo, June M. Verner:
Criteria for Estimating Effort for Requirements Changes. EuroSPI 2008: 36-46 - 2006
- [c2]Bee Bee Chua, June M. Verner, Darren Dalcher:
A Framework for Predicting Person-Effort on Requirements Changes. SoMeT 2006: 439-451 - 2005
- [c1]Bee Bee Chua, June M. Verner:
IT Practitioner's Perspective on Australian Risk Management Practices and Tools for Software Development Projects: A Pilot Study. SoMeT 2005: 111-125
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint