Author of the publication

Recommending when Design Technical Debt Should be Self-Admitted.

, , , , and . ICSME, page 216-226. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving network applications security: a new heuristic to generate stress testing data., , , , and . GECCO, page 1037-1043. ACM, (2005)AURA: a hybrid approach to identify framework evolution., , , and . ICSE (1), page 325-334. ACM, (2010)On feature traceability in object oriented programs., , , and . TEFSE@ASE, page 73-78. ACM, (2005)Adapting Function Points to Object-Oriented Information Systems., , , , and . CAiSE, volume 1413 of Lecture Notes in Computer Science, page 59-76. Springer, (1998)Analyzing cloning evolution in the Linux kernel., , , and . Inf. Softw. Technol., 44 (13): 755-765 (2002)Language modelling for efficient beam-search., , , and . Comput. Speech Lang., 9 (4): 353-379 (1995)Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories., , and . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-5 (2005)Factors Impacting the Inputs of Traceability Recovery Approaches., , and . Software and Systems Traceability, Springer, (2012)Requirements Traceability for Object Oriented Systems by Partitioning Source Code, , and . 18th Working Conf. on Reverse Engineering, page 45--54. IEEE Computer Society, (October 2011)Identification of behavioural and creational design motifs through dynamic analysis., , and . Journal of Software Maintenance, 22 (8): 597-627 (2010)