Author of the publication

Using source code metrics to predict change-prone web services: A case-study on ebay services.

, , and . MaLTeSQuE@SANER, page 1-7. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Structured Text Source Code Metrics and Artificial Neural Networks to Predict Change Proneness at Code Tab and Program Organization Level., and . ISEC, page 172-180. ACM, (2017)Empirical Analysis on Effectiveness of Source Code Metrics for Predicting Change-Proneness., , and . ISEC, page 4-14. ACM, (2017)Setting the Foundation for Scientific Inquiry and Computational Thinking in Early Childhood using Lego Machines and Mechanism Education Kit, and . (Dec 21, 2017)Using tabu best-response search to find pure strategy nash equilibria in normal form games., and . AAMAS, page 1023-1029. ACM, (2005)How healthy are ACM SIGWEB sponsored conferences?, , and . SIGWEB Newsl., 2017 (Spring): 4:1-4:17 (2017)Kernel Based Sequential Data Anomaly Detection in Business Process Event Logs.. CoRR, (2015)Computing the outcome of proxy bidding in combinatorial auctions extended abstract., , and . EC, page 242-243. ACM, (2003)Investigating the Potential of Aggregated Tweets as Surrogate Data for Forecasting Civil Protests., and . CODS, page 8:1-8:6. ACM, (2016)Pariket: Mining Business Process Logs for Root Cause Analysis of Anomalous Incidents., , and . DNIS, volume 8999 of Lecture Notes in Computer Science, page 244-263. Springer, (2015)A Topical Crawler for Uncovering Hidden Communities of Extremist Micro-Bloggers on Tumblr., and . #MSM, volume 1395 of CEUR Workshop Proceedings, page 26-27. CEUR-WS.org, (2015)