Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A review and comparison of methods for determining the best analogies in analogy-based software effort estimation., , , , , , and . SAC, page 1554-1557. ACM, (2016)Does coding in Pythonic zen peak performance?: preliminary experiments of nine Pythonic idioms at scale., , , , , and . ICPC, page 575-579. ACM, (2022)V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities., , , , , , , , , and . ASE, page 169:1-169:4. ACM, (2022)Contrasting Third-Party Package Management User Experience., , , , , and . ICSME, page 664-668. IEEE, (2021)Towards Smoother Library Migrations: A Look at Vulnerable Dependency Migrations at Function Level for npm JavaScript Packages., , , , , and . ICSME, page 559-563. IEEE Computer Society, (2018)What makes a good Node.js package? Investigating Users, Contributors, and Runnability., , , , , , and . CoRR, (2021)SōjiTantei: Function-Call Reachability Detection of Vulnerable Code for npm Packages., , , , , and . IEICE Trans. Inf. Syst., 105-D (1): 19-20 (2022)Code-Based Vulnerability Detection in Node.js Applications: How far are we?, , , , , , and . ASE, page 1199-1203. IEEE, (2020)On the Use of Refactoring in Security Vulnerability Fixes: An Exploratory Study on Maven Libraries., , , , , , and . EASE, page 288-293. ACM, (2022)Graph Clustering-Based Emerging Event Detection from Twitter Data Stream., , and . ICNCC, page 37-41. ACM, (2016)