From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Does BERT Understand Code? - An Exploratory Study on the Detection of Architectural Tactics in Code., , , и . ECSA, том 12292 из Lecture Notes in Computer Science, стр. 220-228. Springer, (2020)Bringing Architecture Thinking into Developers' Daily Activities., , и . ACM SIGSOFT Softw. Eng. Notes, 41 (6): 24-26 (2016)Tracing architecturally significant requirements: a decision-centric approach.. ICSE, стр. 1126-1127. ACM, (2011)Automated training-set creation for software architecture traceability problem., , , , и . Empir. Softw. Eng., 22 (3): 1028-1062 (2017)Automated Characterization of Software Vulnerabilities., , и . ICSME, стр. 135-139. IEEE, (2019)A Landscape Study of Open Source and Proprietary Tools for Software Bill of Materials (SBOM)., , , , , , , и . CoRR, (2024)2nd international workshop on the twin peaks of requirements and architecture (TwinPeaks 2013)., , , , , , и . ICSE, стр. 1556-1557. IEEE Computer Society, (2013)1st International Workshop on Establishing the Community-Wide Infrecaseructure for Architecture-Based Software Engineering (ECASE 2017)., , , и . ECASE@ICSE, стр. 1. IEEE, (2017)A Methodological Approach to Verify Architecture Resiliency., , , и . ECSA (Tracks and Workshops), том 13928 из Lecture Notes in Computer Science, стр. 321-336. Springer, (2022)On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks., , и . ICSE, стр. 1609-1621. IEEE, (2023)