Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental evaluation of software reliability growth models., , , and . FTCS, page 148-153. IEEE Computer Society, (1988)Investigating Vector-Based Detection of Code Clones Using BigCloneBench., , , and . APSEC, page 699-700. IEEE, (2018)Towards an Analysis of Who Creates Clone and Who Reuses it., , , , , and . ECEASST, (2014)Measuring Copying of Java Archives., , , and . ECEASST, (2014)Revision control system using delta script of syntax tree., , and . SCM, page 133-149. ACM, (2005)Button Selection for General GUIs Using Eye and Hand Together., , , , and . Advanced Visual Interfaces, page 270-273. ACM Press, (2000)Principles of software evolution: 5th international workshop on principles of software evolution (IWPSE 2002)., , and . ICSE, page 657-658. ACM, (2002)Distributed Process Management System Based on Object-Centered Process Modeling., , , and . WWCA, volume 1368 of Lecture Notes in Computer Science, page 108-119. Springer, (1998)Implementing and Analysis of Compile-time Garbage Collection., and . New Generation Comput., 10 (1): 101-120 (1991)Do Developers Update Their Library Dependencies? An Empirical Study on the Impact of Security Advisories on Library Migration., , , , and . CoRR, (2017)