Author of the publication

Transforming trace information in architectural documents into re-usable and effective traceability links.

, and . SHARK@ICSE, page 45-52. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings., , , , and . IEEE Trans. Software Eng., 39 (12): 1736-1752 (2013)A Novel Approach to Identify Security Controls in Source Code., , , , and . CoRR, (2023)Empirical Validation of Automated Vulnerability Curation and Characterization., , , , , , and . IEEE Trans. Software Eng., 49 (5): 3241-3260 (2023)How could ULS systems achieve architecture benefits?, , and . ULSSIS@ICSE, page 41-44. ACM, (2008)Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities., , and . ICSA, page 31-40. IEEE, (2019)Automatic classification of software artifacts in open-source applications., , , , , and . MSR, page 414-425. ACM, (2018)Predicting the severity and exploitability of vulnerability reports using convolutional neural nets., and . EnCyCriS@ICSE, page 1-8. ACM, (2022)DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests., , , , , , , and . ASE, page 287-298. IEEE, (2020)A Grounded Theory Based Approach to Characterize Software Attack Surfaces., , and . ICSE, page 13-24. ACM, (2022)A Dataset of Open-Source Android Applications., , , , , , and . MSR, page 522-525. IEEE Computer Society, (2015)