Author of the publication

A Method for Open Source License Compliance of Java Applications.

, and . IEEE Softw., 29 (3): 58-63 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threats on building models from CVS and Bugzilla repositories: the Mozilla case study., , , and . CASCON, page 215-228. IBM, (2007)The Evolution of Project Inter-Dependencies in a Software Ecosystem: the Case of Apache, , , , and . Proceedings of the 2013 IEEE International Conference on Software Maintenance, page 280--289. (September 2013)There and Back Again: Can you Compile that Snapshot?, , , , , , and . Journal of Software: Evolution and Process, 29 (4): e1838 (April 2017)Relationship between design patterns defects and crosscutting concern scattering degree: an empirical study., , and . IET Softw., 3 (5): 395-409 (2009)Characterizing the evolution of statically-detectable performance issues of Android apps., , and . Empir. Softw. Eng., 25 (4): 2748-2808 (2020)A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques., , , , , and . Empir. Softw. Eng., 19 (4): 1040-1074 (2014)License usage and changes: a large-scale study on gitHub., , , , , and . Empir. Softw. Eng., 22 (3): 1537-1577 (2017)REPENT: Analyzing the Nature of Identifier Renamings., , , , , and . IEEE Trans. Software Eng., 40 (5): 502-532 (2014)Prompter - Turning the IDE into a self-confident programming assistant., , , , and . Empirical Software Engineering, 21 (5): 2190-2231 (2016)Guest editorial: Special section on mining software repositories., and . Empirical Software Engineering, 21 (2): 301-302 (2016)