Author of the publication

Is it a bug or an enhancement?: a text-based approach to classify change requests.

, , , , and . CASCON, page 23. IBM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm, , , , and . Proc. of the 19th Working Conference on Reverse Engineering, page 103 -112. IEEE, (October 2012)An exploratory study of the impact of antipatterns on class change- and fault-proneness., , , and . Empirical Software Engineering, 17 (3): 243-275 (2012)A genetiv programming approach to support the design of service compositions., , and . Comput. Syst. Sci. Eng., (2006)REPENT: Analyzing the Nature of Identifier Renamings., , , , , and . IEEE Trans. Software Eng., 40 (5): 502-532 (2014)Prompter - Turning the IDE into a self-confident programming assistant., , , , and . Empirical Software Engineering, 21 (5): 2190-2231 (2016)A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques., , , , , and . Empir. Softw. Eng., 19 (4): 1040-1074 (2014)License usage and changes: a large-scale study on gitHub., , , , , and . Empir. Softw. Eng., 22 (3): 1537-1577 (2017)Characterizing the evolution of statically-detectable performance issues of Android apps., , and . Empir. Softw. Eng., 25 (4): 2748-2808 (2020)There and back again: Can you compile that snapshot?, , , , , , and . J. Softw. Evol. Process., (2017)Special issue on source code analysis and manipulation (SCAM 2006)., and . J. Softw. Maintenance Res. Pract., 19 (4): 203-204 (2007)