Author of the publication

Outcomes of a community workshop to identify and rank barriers to the systematic literature review process.

, , , and . EASE, page 31:1-31:10. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Executable Slicing to Improve Rogue Software Detection Algorithms., , , , and . Int. J. Secur. Softw. Eng., 2 (2): 53-64 (2011)Clone evolution: a systematic review., , and . Journal of Software: Evolution and Process, 25 (3): 261-283 (2013)Automatically Identifying the Quality of Developer Chats for Post Hoc Use., , , and . ACM Trans. Softw. Eng. Methodol., 30 (4): 48:1-48:28 (2021)Grammar Recovery from Parse Trees and Metrics-Guided Grammar Refactoring., , and . IEEE Trans. Software Eng., 35 (6): 780-794 (2009)Quantifying the similiarities between source code lexicons., and . ACM Southeast Regional Conference, page 80-85. ACM, (2011)Measuring the Efficacy of Code Clone Information in a Bug Localization Task: An Empirical Study., , , , and . ESEM, page 20-29. IEEE Computer Society, (2011)Modeling Changeset Topics., , , and . MUD@ICSME, page 6-10. IEEE Computer Society, (2014)A Framework for Estimating Interest on Technical Debt by Monitoring Developer Activity Related to Code Comprehension., , and . MTD@ICSME, page 27-30. IEEE Computer Society, (2014)Recovering traceability links between source code and fixed bugs via patch analysis., , , and . EFSE@ICSE, page 31-37. ACM, (2011)New features for duplicate bug detection., , and . MSR, page 324-327. ACM, (2014)