Author of the publication

Locating need-to-translate constant strings in web applications.

, , , , and . SIGSOFT FSE, page 87-96. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CGA: Combining cluster analysis with genetic algorithm for regression suite reduction of microprocessors., , , , and . SoCC, page 207-212. IEEE, (2011)Approach for malware identification using dynamic behaviour and outcome triggering., , , , and . IET Inf. Secur., 8 (2): 140-151 (2014)An empirical study on API usages from code search engine and local library., and . Empir. Softw. Eng., 28 (3): 63 (June 2023)What's (Not) Working in Programmer User Studies?, , , , , and . ACM Trans. Softw. Eng. Methodol., 32 (5): 120:1-120:32 (September 2023)Leveraging Code Generation to Improve Code Retrieval and Summarization via Dual Learning., , , , , and . WWW, page 2309-2319. ACM / IW3C2, (2020)TestMig: migrating GUI test cases from iOS to Android., , and . ISSTA, page 284-295. ACM, (2019)PExReport-Maven: Creating Pruned Executable Cross-Project Failure Reports in Maven Build System., and . ISSTA, page 1523-1526. ACM, (2023)Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE., , and . ISSTA, page 199-210. ACM, (2015)GUILeak: tracing privacy policy claims on user input data for Android applications., , , , , and . ICSE, page 37-47. ACM, (2018)Toward A Code Pattern Based Vulnerability Measurement Model., , and . SACMAT, page 209-211. ACM, (2018)