Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual formalisms for configuration management.. CASCON, page 120-127. IBM, (1993)Clone detection by exploiting assembler., and . IWSC, page 77-78. ACM, (2010)Connecting architecture reconstruction frameworks., , and . Inf. Softw. Technol., 42 (2): 91-102 (2000)Facilitating software evolution research with kenyon., , , and . ESEC/SIGSOFT FSE, page 177-186. ACM, (2005)DocTer: documentation-guided fuzzing for testing deep learning API functions., , , , , , and . ISSTA, page 176-188. ACM, (2022)Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), , , and . vub-prog-tr-03-20. Programming Technology Lab, Vrije Universiteit Brussel, (2003)Toward a taxonomy of clones in source code: A case study, and . Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), page 67--78. (2003)Detecting Discontinuities in Large Scale Systems., , , , and . UCC, page 345-354. IEEE Computer Society, (2014)Storm prediction in a cloud., , , , , and . PESOS@ICSE, page 37-40. IEEE Computer Society, (2013)A comparison of bugs across the iOS and Android platforms of two open source cross platform browser apps., , , and . MOBILESoft@ICSE, page 76-86. IEEE / ACM, (2019)