Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assessing defect detection performance of interacting teams in object-oriented design inspection., , and . Inf. Softw. Technol., 46 (13): 875-886 (2004)Identifying Compiler and Optimization Options from Binary Code using Deep Learning Approaches., and . ICSME, page 232-242. IEEE, (2020)A sentence-matching method for automatic license identification of source code files, , and . Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, page 437--446. (April 2010)Experimental evaluation of software reliability growth models., , , and . FTCS, page 148-153. IEEE Computer Society, (1988)Do Developers Update Their Library Dependencies? An Empirical Study on the Impact of Security Advisories on Library Migration., , , , and . CoRR, (2017)Investigating Vector-Based Detection of Code Clones Using BigCloneBench., , , and . APSEC, page 699-700. IEEE, (2018)Distributed Process Management System Based on Object-Centered Process Modeling., , , and . WWCA, volume 1368 of Lecture Notes in Computer Science, page 108-119. Springer, (1998)Towards an Analysis of Who Creates Clone and Who Reuses it., , , , , and . ECEASST, (2014)Measuring Copying of Java Archives., , , and . ECEASST, (2014)Implementing and Analysis of Compile-time Garbage Collection., and . New Generation Comput., 10 (1): 101-120 (1991)