Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Discontinuities in Large Scale Systems., , , , and . UCC, page 345-354. IEEE Computer Society, (2014)Storm prediction in a cloud., , , , , and . PESOS@ICSE, page 37-40. IEEE Computer Society, (2013)A comparison of bugs across the iOS and Android platforms of two open source cross platform browser apps., , , and . MOBILESoft@ICSE, page 76-86. IEEE / ACM, (2019)An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems., , , , , , and . WCRE, page 335-344. IEEE Computer Society, (2011)Connecting architecture reconstruction frameworks., , and . Inf. Softw. Technol., 42 (2): 91-102 (2000)Clone detection by exploiting assembler., and . IWSC, page 77-78. ACM, (2010)Visual formalisms for configuration management.. CASCON, page 120-127. IBM, (1993)Facilitating software evolution research with kenyon., , , and . ESEC/SIGSOFT FSE, page 177-186. ACM, (2005)DocTer: documentation-guided fuzzing for testing deep learning API functions., , , , , , and . ISSTA, page 176-188. ACM, (2022)Toward a taxonomy of clones in source code: A case study, and . Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), page 67--78. (2003)