Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying opaque behavioural changes., and . ICSE, page 995-997. ACM, (2011)Language impact on productivity for industrial end users: A case study from Programmable Logic Controllers., , , , , , , and . J. Comput. Lang., (2022)Training industrial end-user programmers with interactive tutorials., , , , , , , , , and . Softw. Pract. Exp., 53 (3): 729-747 (March 2023)Customized awareness: recommending relevant external change events., and . ICSE (1), page 465-474. ACM, (2010)Task-specific source code dependency investigation., and . VISSOFT, page 100-107. IEEE Computer Society, (2007)Nudging student learning strategies using formative feedback in automatically graded assessments., , and . SPLASH-E, page 1-11. ACM, (2020)Automatically Recommending Triage Decisions for Pragmatic Reuse Tasks., , , and . ASE, page 397-408. IEEE Computer Society, (2009)Method-level Bug Prediction: Problems and Promises., , , and . ACM Trans. Softw. Eng. Methodol., 33 (4): 98:1-98:31 (May 2024)Proactive detection of collaboration conflicts., , , and . SIGSOFT FSE, page 168-178. ACM, (2011)Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size., , , , , , , and . ASE, page 237-249. IEEE, (2020)