Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining duplicate questions in stack overflow., , , and . MSR, page 402-412. ACM, (2016)Group awareness in distributed software development., , and . CSCW, page 72-81. ACM, (2004)Future Challenges of Model-Based Design., , , , , , and . DSV-IS, volume 3941 of Lecture Notes in Computer Science, page 261. Springer, (2005)An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques., , and . SCAM, page 62-73. IEEE, (2019)Blockchain Access Control Ecosystem for Big Data Security., , , and . iThings/GreenCom/CPSCom/SmartData, page 1373-1378. IEEE, (2018)Comparing Software Bugs in Clone and Non-clone Code: An Empirical Study, , , and . International Journal of Software Engineering and Knowledge Engineering, 27 (09n10): 1507?1527 (2017)Mining duplicate questions of stack overflow, , , and . 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), page 402?412. IEEE, (2016)How developers use exception handling in Java?, , , and . 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), page 516?519. IEEE, (2016)An empirical study on clone stability, , and . ACM SIGAPP Applied Computing Review, 12 (3): 20?36 (2012)CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation, , , , and . 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), page 1026?1037. IEEE, (2019)