Khaled El Emam
Khaled El Emam
CHEO Research Institute / University of Ottawa
Verified email at ehealthinformation.ca - Homepage
Title
Cited by
Cited by
Year
Preliminary guidelines for empirical research in software engineering
BA Kitchenham, SL Pfleeger, LM Pickard, PW Jones, DC Hoaglin, ...
IEEE Transactions on software engineering 28 (8), 721-734, 2002
16082002
The confounding effect of class size on the validity of object-oriented metrics
K El Emam, S Benlarbi, N Goel, SN Rai
IEEE Transactions on Software Engineering 27 (7), 630-650, 2001
4692001
A replicated survey of IT software project failures
K El Emam, AG Koru
IEEE software 25 (5), 84-90, 2008
4612008
SPICE: The theory and practice of software process improvement and capability determination
KE Emam, W Melo, JN Drouin
IEEE Computer Society Press, 1997
4451997
The prediction of faulty classes using object-oriented design metrics
K El Emam, W Melo, JC Machado
Journal of systems and software 56 (1), 63-75, 2001
4362001
An assessment and comparison of common software cost estimation modeling techniques
LC Briand, K El Emam, D Surmann, I Wieczorek, KD Maxwell
Proceedings of the 1999 International Conference on Software Engineering …, 1999
3711999
On the application of measurement theory in software engineering
L Briand, K El Emam, S Morasca
Empirical Software Engineering 1 (1), 61-88, 1996
2711996
Who's using PDAs? Estimates of PDA use by health care providers: a systematic review of surveys
C Garritty, K El Emam
Journal of medical Internet research 8 (2), e7, 2006
2692006
Protecting privacy using k-anonymity
K El Emam, FK Dankar
Journal of the American Medical Informatics Association 15 (5), 627-637, 2008
2522008
Software cost estimation with incomplete data
K Strike, K El Emam, N Madhavji
IEEE Transactions on Software Engineering 27 (10), 890-908, 2001
2502001
A systematic review of re-identification attacks on health data
K El Emam, E Jonker, BM Luk Arbuckle
PloS one 6 (12), 2011
2262011
A globally optimal k-anonymity method for the de-identification of health data
K El Emam, FK Dankar, R Issa, E Jonker, D Amyot, E Cogo, JP Corriveau, ...
Journal of the American Medical Informatics Association 16 (5), 670-682, 2009
2142009
COBRA: a hybrid method for software cost estimation, benchmarking, and risk assessment
LC Briand, K El Emam, F Bomarius
Proceedings of the 20th international conference on Software engineering …, 1998
2061998
A field study of requirements engineering practices in information systems development
K El Emam, NH Madhavji
Proceedings of 1995 IEEE International Symposium on Requirements Engineering …, 1995
2051995
A comprehensive evaluation of capture-recapture models for estimating software defect content
LC Briand, K El Emam, BG Freimut, O Laitenberger
IEEE Transactions on Software Engineering 26 (6), 518-540, 2000
1912000
Comparing case-based reasoning classifiers for predicting high risk software components
K El Emam, S Benlarbi, N Goel, SN Rai
Journal of Systems and Software 55 (3), 301-320, 2001
1852001
An experimental comparison of reading techniques for defect detection in UML design documents
O Laitenberger, C Atkinson, M Schlich, K El Emam
Journal of Systems and Software 53 (2), 183-204, 2000
1672000
Theoretical and empirical validation of software product measures
L Briand, K El Emam, S Morasca
International Software Engineering Research Network, Technical Report ISERN …, 1995
1621995
“Not all my friends need to know”: a qualitative study of teenage patients, privacy, and social media
M Van Der Velden, K El Emam
Journal of the American Medical Informatics Association 20 (1), 16-24, 2013
1612013
Validating the ISO/IEC 15504 measure of software requirements analysis process capability
K El Emam, A Birk
IEEE transactions on Software Engineering 26 (6), 541-566, 2000
1612000
The system can't perform the operation now. Try again later.
Articles 1–20