Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dependency Practices for Vulnerability Mitigation., , , and . CoRR, (2023)Dependency Update Strategies and Package Characteristics., , , and . CoRR, (2023)Studying re-opened bugs in open source software., , , , , , , and . Empir. Softw. Eng., 18 (5): 1005-1042 (2013)Using Analytics to Quantify Interest of Self-Admitted Technical Debt., , , and . QuASoQ/TDA@APSEC, volume 1771 of CEUR Workshop Proceedings, page 68-71. CEUR-WS.org, (2016)Why do developers use trivial packages? an empirical case study on npm., , , , and . ESEC/SIGSOFT FSE, page 385-395. ACM, (2017)Prioritizing the devices to test your app on: a case study of Android game apps., , , and . SIGSOFT FSE, page 610-620. ACM, (2014)Subject Cross Validation in Human Activity Recognition., , and . CoRR, (2019)Class imbalance evolution and verification latency in just-in-time software defect prediction., , , and . ICSE, page 666-676. IEEE / ACM, (2019)Is using deep learning frameworks free?: characterizing technical debt in deep learning frameworks., , , , , and . ICSE-SEIS, page 1-10. ACM, (2020)Bots for Pull Requests: The Good, the Bad, and the Promising., , , , , , and . ICSE, page 274-286. ACM, (2022)