Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Executing Action Semantic Descriptions using ASF+SDF., and . AMAST, page 413-414. Springer, (1993)Identifying Crosscutting Concerns Using Fan-in Analysis, , and . CoRR, (2006)An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns, , , and . Proceedings of the International Conference on Software Maintenance, page 200--209. (2004)On the Use of Clone Detection for Identifying Cross Cutting Concern Code, , , and . 31 (10): 804--818 (2005)Identifying Objects Using Cluster and Concept Analysis., and . ICSE, page 246-255. ACM, (1999)Exception handling bug hazards in Android - Results from a mining study and an exploratory survey., , , , and . Empirical Software Engineering, 22 (3): 1264-1304 (2017)Towards Understanding Machine Learning Testing in Practise., , and . CAIN, page 117-118. IEEE, (2023)The Prevalence of Code Smells in Machine Learning projects., , , and . WAIN@ICSE, page 35-42. IEEE, (2021)Retrain AI Systems Responsibly! Use Sustainable Concept Drift Adaptation Techniques., , , , and . GREENS@ICSE, page 17-18. IEEE, (2023)A Collaborative Approach to Teaching Software Architecture., , , , , , and . SIGCSE, page 591-596. ACM, (2017)