Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SePaS: Word sense disambiguation by sequential patterns in sentences., , and . Nat. Lang. Eng., 21 (2): 251-269 (2015)Design-level metrics estimation based on code metrics., and . SAC, page 2531-2535. ACM, (2010)Employing secure coding practices into industrial applications: a case study., , , , , , and . Empir. Softw. Eng., 21 (1): 4-16 (2016)An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples., , , , , and . CoRR, (2019)Characterization and Prediction of Questions without Accepted Answers on Stack Overflow., , and . ICPC, page 59-70. IEEE, (2021)How Do Users Answer MATLAB Questions on Q&A Sites? A Case Study on Stack Overflow and MathWorks., , , and . SANER, page 526-530. IEEE, (2021)Investigating Markers and Drivers of Gender Bias in Machine Translations., and . CoRR, (2024)Entropy-based outlier detection using semi-supervised approach with few positive examples., and . Pattern Recognit. Lett., (2014)A statistical unsupervised method against false data injection attacks: A visualization-based approach., , and . Expert Syst. Appl., (2017)DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers., , and . ISeCure, 5 (1): 71-82 (2013)