Author of the publication

1st international workshop on the engineering of mobile-enabled systems (MOBS 2013).

, , , , , and . ICSE, page 1533-1534. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Analytics to Quantify Interest of Self-Admitted Technical Debt., , , and . QuASoQ/TDA@APSEC, volume 1771 of CEUR Workshop Proceedings, page 68-71. CEUR-WS.org, (2016)Why do developers use trivial packages? an empirical case study on npm., , , , and . ESEC/SIGSOFT FSE, page 385-395. ACM, (2017)Prioritizing the devices to test your app on: a case study of Android game apps., , , and . SIGSOFT FSE, page 610-620. ACM, (2014)On the impact of using trivial packages: an empirical case study on npm and PyPI., , , and . Empir. Softw. Eng., 25 (2): 1168-1204 (2020)An empirical study of Android Wear user complaints., , , , and . Empir. Softw. Eng., 23 (6): 3476-3502 (2018)Studying high impact fix-inducing changes., , and . Empir. Softw. Eng., 21 (2): 605-641 (2016)On the Removal of Feature Toggles., , , , and . Empir. Softw. Eng., 26 (1): 15 (2021)Studying re-opened bugs in open source software., , , , , , , and . Empir. Softw. Eng., 18 (5): 1005-1042 (2013)Report of the 2013 ICSE 1st international workshop on engineering mobile-enabled systems (MOBS 2013): 12., , , , , and . ACM SIGSOFT Softw. Eng. Notes, 38 (5): 55-58 (2013)Dependency Practices for Vulnerability Mitigation., , , and . CoRR, (2023)