Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Noise in Mylyn interaction traces and its impact on developers and recommendation systems., , , and . Empirical Software Engineering, 23 (2): 645-692 (2018)AURA: a hybrid approach to identify framework evolution., , , and . ICSE (1), page 325-334. ACM, (2010)Automatic mutation test input data generation via ant colony., , and . GECCO, page 1074-1081. ACM, (2007)Improving network applications security: a new heuristic to generate stress testing data., , , , and . GECCO, page 1037-1043. ACM, (2005)Adapting Function Points to Object-Oriented Information Systems., , , , and . CAiSE, volume 1413 of Lecture Notes in Computer Science, page 59-76. Springer, (1998)Factors Impacting the Inputs of Traceability Recovery Approaches., , and . Software and Systems Traceability, Springer, (2012)Recognizing Words from Source Code Identifiers using Speech Recognition Techniques, , , , and . Proc. of the Conf. on Software Maintenance and Reengineering, page 69--78. IEEE, (2010)Identification of behavioural and creational design motifs through dynamic analysis., , and . Journal of Software Maintenance, 22 (8): 597-627 (2010)Requirements Traceability for Object Oriented Systems by Partitioning Source Code, , and . 18th Working Conf. on Reverse Engineering, page 45--54. IEEE Computer Society, (October 2011)Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories., , and . ACM SIGSOFT Softw. Eng. Notes, 30 (4): 1-5 (2005)