Author of the publication

Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction.

, , , , , , , and . MSR, page 670-681. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SHINOBI: A Tool for Automatic Code Clone Detection in the IDE., , , , , , and . WCRE, page 313-314. IEEE Computer Society, (2009)Code Clone Graph Metrics for Detecting Diffused Code Clones., , , , , and . APSEC, page 373-380. IEEE Computer Society, (2009)Proactive-Reactive Auto-Scaling Mechanism for Unpredictable Load Change., , and . IIAI-AAI, page 861-866. IEEE Computer Society, (2016)Using Bandit Algorithms for Selecting Feature Reduction Techniques in Software Defect Prediction., , , , , , , and . MSR, page 670-681. ACM, (2022)Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices., , , , and . ICCCN, page 1-7. IEEE, (2018)Fault Localization in Server-Side Applications Using Spectrum-Based Fault Localization., , and . SANER, page 1139-1146. IEEE, (2022)Investigating Tendencies in Callback Method Implementations in Android Applications., , and . IWESEP, page 23-28. IEEE Computer Society, (2017)Detecting functionally similar code within the same project., , and . IWSC, page 51-57. IEEE Computer Society, (2018)An Empirical Study of Fault Prediction with Code Clone Metrics., , , , , , , and . IWSM/Mensura, page 55-61. IEEE Computer Society, (2011)