Author of the publication

Towards understanding an open-source bounty: Analysis of Bountysource.

, , , and . SANER, page 577-578. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effect of Weak Hyperopia on Stereoscopic Vision., , , , , , , , , and . HCI (13), volume 6773 of Lecture Notes in Computer Science, page 354-362. Springer, (2011)didiffff: a viewer for comparing changes in both code and execution traces., , and . ICPC, page 528-532. ACM, (2022)Towards understanding an open-source bounty: Analysis of Bountysource., , , and . SANER, page 577-578. IEEE Computer Society, (2017)Near-Omniscient Debugging for Java Using Size-Limited Execution Trace., , , and . ICSME, page 398-401. IEEE, (2019)A Study of Practical Education Program on AI, Big Data, and Cloud Computing through Development of Automatic Ordering System., , , , , , , and . BCD, page 31-36. IEEE Computer Society, (2018)Estimating product evolution graph using Kolmogorov complexity., , and . IWPSE, page 66-72. ACM, (2015)Comparison of Developer's Work Efficiency between Different Editors., , and . APSEC, page 572-573. IEEE, (2022)PyVerDetector: A Chrome Extension Detecting the Python Version of Stack Overflow Code Snippets., , , , and . ICPC, page 25-29. IEEE, (2023)Software ingredients: detection of third-party component reuse in Java software release., , , , and . MSR, page 339-350. ACM, (2016)A Method to Detect License Inconsistencies in Large-Scale Open Source Projects., , , , and . MSR, page 324-333. IEEE Computer Society, (2015)