Author of the publication

Should fixing these failures be delegated to automated program repair?

, , and . ISSRE, page 427-437. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network-Clustered Multi-Modal Bug Localization., , , and . IEEE Trans. Software Eng., 45 (10): 1002-1023 (2019)Should I follow this fault localization tool's output? - Automated prediction of fault localization effectiveness., , and . Empirical Software Engineering, 20 (5): 1237-1274 (2015)Rule-based specification mining leveraging learning to rank., , , and . Autom. Softw. Eng., 25 (3): 501-530 (2018)Towards Mining Comprehensive Android Sandboxes., , , , and . ICECCS, page 51-60. IEEE Computer Society, (2018)Will this localization tool be effective for this bug? Mitigating the impact of unreliability of information retrieval based bug localization tools., , and . Empirical Software Engineering, 22 (4): 2237-2279 (2017)Deep specification mining., and . ISSTA, page 106-117. ACM, (2018)Mining sandboxes: Are we there yet?, , and . SANER, page 445-455. IEEE Computer Society, (2018)RCLinker: automated linking of issue reports and commits leveraging rich contextual information., , , and . ICPC, page 36-47. IEEE Computer Society, (2015)Dynamic Inference of Change Contracts., , , , and . ICSME, page 451-455. IEEE Computer Society, (2014)DSM: a specification mining tool using recurrent neural network based language model., , and . ESEC/SIGSOFT FSE, page 896-899. ACM, (2018)