Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Inference of Software Library Usage Patterns., , , , , and . CoRR, (2016)Mining Software Specifications.. Encyclopedia of Data Warehousing and Mining, IGI Global, (2009)Extended comprehensive study of association measures for fault localization., , , , and . Journal of Software: Evolution and Process, 26 (2): 172-219 (2014)Mining message sequence graphs., , , and . ICSE, page 91-100. ACM, (2011)Condensing class diagrams by analyzing design and network metrics using optimistic classification., , , and . ICPC, page 110-121. ACM, (2014)Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps., , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 678-690. Springer, (2017)Why reinventing the wheels? An empirical study on library reuse and re-implementation., , , , and . Empirical Software Engineering, 25 (1): 755-789 (2020)Automating App Review Response Generation., , , , , and . CoRR, (2020)Why Do Smart Contracts Self-Destruct? Investigating the Selfdestruct Function on Ethereum., , , and . CoRR, (2020)AndroEvolve: Automated Android API Update with Data Flow Analysis and Variable Denormalization., , , , , , , and . CoRR, (2020)