Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study on the Usage of Transformer Models for Code Completion., , , , , , , and . IEEE Trans. Software Eng., 48 (12): 4818-4837 (2022)Intelligent Software Tooling for Improving Software Development.. CoRR, (2023)Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques., , , , , and . CoRR, (2021)A confluence of new technology and the right to water: experience and potential from South Africa's constitution and commons., , and . Ethics Inf. Technol., 16 (2): 119-134 (2014)Studying the Usage of Text-To-Text Transfer Transformer to Support Code-Related Tasks., , , , , , and . ICSE, page 336-347. IEEE, (2021)An Empirical Study on the Usage of BERT Models for Code Completion., , , , , and . MSR, page 108-119. IEEE, (2021)Using Transfer Learning for Code-Related Tasks., , , , , , and . IEEE Trans. Software Eng., 49 (4): 1580-1598 (April 2023)A Systematic Literature Review on the Use of Deep Learning in Software Engineering Research., , , , and . CoRR, (2020)Ultra Low-Cost Printable Folding Robots., , , , , , and . IROS, page 3726-3731. IEEE, (2020)Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques., , , , , and . SP, page 614-631. IEEE, (2022)