Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study on the Usage of Transformer Models for Code Completion., , , , , , , and . IEEE Trans. Software Eng., 48 (12): 4818-4837 (2022)Stable LM 2 1.6B Technical Report., , , , , , , , , and 9 other author(s). CoRR, (2024)A confluence of new technology and the right to water: experience and potential from South Africa's constitution and commons., , and . Ethics Inf. Technol., 16 (2): 119-134 (2014)Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques., , , , , and . CoRR, (2021)Intelligent Software Tooling for Improving Software Development.. CoRR, (2023)An Empirical Study on the Usage of BERT Models for Code Completion., , , , , and . MSR, page 108-119. IEEE, (2021)Studying the Usage of Text-To-Text Transfer Transformer to Support Code-Related Tasks., , , , , , and . ICSE, page 336-347. IEEE, (2021)A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research., , , , and . ACM Trans. Softw. Eng. Methodol., 31 (2): 32:1-32:58 (2022)Can We Automatically Fix Bugs by Learning Edit Operations?, , , and . SANER, page 782-792. IEEE, (2022)V2S: A Tool for Translating Video Recordings of Mobile App Usages into Replayable Scenarios., , , , , and . ICSE (Companion Volume), page 65-68. IEEE, (2021)