Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of recurring software vulnerabilities., , , and . ASE, page 447-456. ACM, (2010)Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection., , , , and . FASE, volume 5503 of Lecture Notes in Computer Science, page 440-455. Springer, (2009)What Do Developers Ask About ML Libraries? A Large-scale Study Using Stack Overflow., , , and . CoRR, (2019)Boa: Ultra-Large-Scale Software Repository and Source-Code Mining., , , and . ACM Trans. Softw. Eng. Methodol., 25 (1): 7:1-7:34 (2015)A statistical semantic language model for source code., , , and . ESEC/SIGSOFT FSE, page 532-542. ACM, (2013)Mining source code repositories with boa., , , and . SPLASH (Companion Volume), page 13-14. ACM, (2013)A Language-agnostic Framework for Mining Static Analysis Rules from Code Changes., , , , and . ICSE-SEIP, page 327-339. IEEE, (2023)ClemanX: Incremental clone detection tool for evolving software., , , , and . ICSE Companion, page 437-438. IEEE, (2009)Candoia: a platform for building and sharing mining software repositories tools as apps., , , and . MSR, page 53-63. IEEE Computer Society, (2017)Operation-Based, Fine-Grained Version Control Model for Tree-Based Representation., , , and . FASE, volume 6013 of Lecture Notes in Computer Science, page 74-90. Springer, (2010)