Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The LAN-simulation: A Refactoring Teaching Example, , , , , , , , , and 3 other author(s). page 123-131. IEEE Press, (2005)Teaching FAMIX about the Preprocessor., , and . FAMOOSr@TOOLS, page 13-16. (2007)A Language Independent Approach for Detecting Duplicated Code., , and . ICSM, page 109-118. IEEE Computer Society, (1999)Class Composition for Specifying Framework Design., , , and . Theory Pract. Object Syst., 5 (2): 73-81 (1999)The LAN-simulation: A Refactoring Lab Session., , , and . WRT, page 52-53. (2007)The LAN-simulation: A Refactoring Teaching Example., , , , , , , , , and 3 other author(s). IWPSE, page 123-134. IEEE Computer Society, (2005)On the effectiveness of clone detection by string matching., , and . Journal of Software Maintenance, 18 (1): 37-58 (2006)On The Detection of Test Smells: A Metrics-Based Approach for General Fixture and Eager Test., , , and . IEEE Trans. Software Eng., 33 (12): 800-817 (2007)Visual Detection of Duplicated Code., and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 75-76. Springer, (1998)Design Pattern Restructuring., , and . ECOOP Workshops, volume 1357 of Lecture Notes in Computer Science, page 280-282. Springer, (1997)