default search action
Michaela Greiler
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Nicole Forsgren, Eirini Kalliamvakou, Abi Noda, Michaela Greiler, Brian Houck, Margaret-Anne D. Storey:
DevEx in Action. Commun. ACM 67(6): 42-51 (2024) - [j8]Nicole Forsgren, Eirini Kalliamvakou, Abi Noda, Michaela Greiler, Brian Houck, Margaret-Anne D. Storey:
DevEx in Action: A study of its tangible impacts. ACM Queue 21(6): 47-77 (2024) - 2023
- [j7]Abi Noda, Margaret-Anne D. Storey, Nicole Forsgren, Michaela Greiler:
DevEX: What Actually Drives Productivity? Commun. ACM 66(11): 44-49 (2023) - [j6]Abi Noda, Margaret-Anne D. Storey, Nicole Forsgren, Michaela Greiler:
DevEx: What Actually Drives Productivity: The developer-centric approach to measuring and improving productivity. ACM Queue 21(2): 35-53 (2023) - [j5]Michaela Greiler, Margaret-Anne D. Storey, Abi Noda:
An Actionable Framework for Understanding and Improving Developer Experience. IEEE Trans. Software Eng. 49(4): 1411-1425 (2023) - 2022
- [i1]Michaela Greiler, Margaret-Anne D. Storey, Abi Noda:
An Actionable Framework for Understanding and Improving Developer Experience. CoRR abs/2205.06352 (2022)
2010 – 2019
- 2018
- [j4]Gabriele Bavota, Michaela Greiler:
Introduction to the special issue on source code analysis and manipulation. Empir. Softw. Eng. 23(4): 2359-2361 (2018) - [j3]Jacek Czerwonka, Michaela Greiler, Christian Bird, Lucas Panjer, Terry Coatta:
CodeFlow: Improving the Code Review Process at Microsoft. ACM Queue 16(5): 20 (2018) - [j2]Laura MacLeod, Michaela Greiler, Margaret-Anne D. Storey, Christian Bird, Jacek Czerwonka:
Code Reviewing in the Trenches: Challenges and Best Practices. IEEE Softw. 35(4): 34-42 (2018) - 2015
- [c13]Jacek Czerwonka, Michaela Greiler, Jack Tilford:
Code Reviews Do Not Find Bugs. How the Current Code Review Best Practice Slows Us Down. ICSE (2) 2015: 27-28 - [c12]Kim Herzig, Michaela Greiler, Jacek Czerwonka, Brendan Murphy:
The Art of Testing Less without Sacrificing Quality. ICSE (1) 2015: 483-493 - [c11]Michaela Greiler, Kim Herzig, Jacek Czerwonka:
Code Ownership and Software Quality: A Replication Study. MSR 2015: 2-12 - [c10]Amiangshu Bosu, Michaela Greiler, Christian Bird:
Characteristics of Useful Code Reviews: An Empirical Study at Microsoft. MSR 2015: 146-156 - [c9]Christian Bird, Trevor Carnahan, Michaela Greiler:
Lessons Learned from Building and Deploying a Code Review Analytics Platform. MSR 2015: 191-201 - 2013
- [j1]Michaela Greiler, Arie van Deursen:
What your plug-in test suites really test: an integration perspective on test suite understanding. Empir. Softw. Eng. 18(5): 859-900 (2013) - [c8]Michaela Greiler, Arie van Deursen, Margaret-Anne D. Storey:
Automated Detection of Test Fixture Strategies and Smells. ICST 2013: 322-331 - [c7]Michaela Greiler, Andy Zaidman, Arie van Deursen, Margaret-Anne D. Storey:
Strategies for avoiding text fixture smells during software evolution. MSR 2013: 387-396 - 2012
- [c6]Michaela Greiler, Arie van Deursen, Margaret-Anne D. Storey:
Test confessions: A study of testing practices for plug-in systems. ICSE 2012: 244-254 - [c5]Michaela Greiler, Arie van Deursen, Andy Zaidman:
Measuring Test Case Similarity to Support Test Suite Understanding. TOOLS (50) 2012: 91-107 - 2010
- [c4]Michaela Greiler, Hans-Gerhard Gross, Arie van Deursen:
Evaluation of online testing for services: a case study. PESOS 2010: 36-42 - [c3]Michaela Greiler, Hans-Gerhard Groß, Arie van Deursen:
Understanding Plug-in Test Suites from an Extensibility Perspective. WCRE 2010: 67-76
2000 – 2009
- 2009
- [c2]Stefan Rass, Peter Schartner, Michaela Greiler:
Quantum Coin-Flipping-Based Authentication. ICC 2009: 1-5 - 2008
- [c1]Michaela Greiler, Peter Schartner:
Secure Resource Sharing in Ad hoc Networks. Security and Management 2008: 278-284
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-01 20:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint