Author of the publication

TMAP: Discovering relevant API methods through text mining of API documentation.

, , , , and . J. Softw. Evol. Process., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiences in applying agile software development practices in new product development., , , , and . IASTED Conf. on Software Engineering and Applications, page 501-506. IASTED/ACTA Press, (2004)Experiments with Industry's "Pair-Programming" Model in the Computer Science Classroom., and . Computer Science Education, 11 (1): 7-20 (2001)How have we evaluated software pattern application? A systematic mapping study of research design practices., , and . Inf. Softw. Technol., (2015)Source Code Properties of Defective Infrastructure as Code Scripts., and . CoRR, (2018)Cost-aware Vulnerability Prediction: the HARMLESS Approach., , , , and . CoRR, (2018)Software Engineering for Internet Applications.. The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)Socio-technical developer networks: should we trust our measurements?, and . ICSE, page 281-290. ACM, (2011)An empirical model to predict security vulnerabilities using code complexity metrics., and . ESEM, page 315-317. ACM, (2008)Evaluating access control of open source electronic health record systems., and . SEHC@ICSE, page 63-70. ACM, (2011)Building forensics in: supporting the investigation of digital criminal activities (invited talk).. SERF@ESEC/SIGSOFT FSE, page 1. ACM, (2017)