From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Do Developers Update Their Library Dependencies? An Empirical Study on the Impact of Security Advisories on Library Migration., , , , и . CoRR, (2017)Experimental evaluation of software reliability growth models., , , и . FTCS, стр. 148-153. IEEE Computer Society, (1988)Investigating Vector-Based Detection of Code Clones Using BigCloneBench., , , и . APSEC, стр. 699-700. IEEE, (2018)Measuring Copying of Java Archives., , , и . ECEASST, (2014)Towards an Analysis of Who Creates Clone and Who Reuses it., , , , , и . ECEASST, (2014)Automated Inference of Software Library Usage Patterns., , , , , и . CoRR, (2016)Revision control system using delta script of syntax tree., , и . SCM, стр. 133-149. ACM, (2005)Button Selection for General GUIs Using Eye and Hand Together., , , , и . Advanced Visual Interfaces, стр. 270-273. ACM Press, (2000)Principles of software evolution: 5th international workshop on principles of software evolution (IWPSE 2002)., , и . ICSE, стр. 657-658. ACM, (2002)Distributed Process Management System Based on Object-Centered Process Modeling., , , и . WWCA, том 1368 из Lecture Notes in Computer Science, стр. 108-119. Springer, (1998)