Author of the publication

An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW.

, , and . SCAM, page 101-110. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring Software Systems. Faculty of Natural Sciences, Mathematics, and Computer Science, University of Amsterdam, (December 2002)Identifying Aspects Using Fan-In Analysis., , and . WCRE, page 132-141. IEEE Computer Society, (2004)Exploring Legacy Systems using Types., and . WCRE, page 32-41. IEEE Computer Society, (2000)International Workshop on Code Based Software Security Assessments - CoBaSSA 2007., and . WCRE, page 300. IEEE Computer Society, (2007)An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW., , and . SCAM, page 101-110. IEEE Computer Society, (2007)Prioritizing Software Inspection Results using Static Profiling., and . SCAM, page 149-160. IEEE Computer Society, (2006)Exploring the Effects of History Length and Age on Mining Software Change Impact., , , and . SCAM, page 207-216. IEEE Computer Society, (2016)Towards Extending the Range of Bugs That Automated Program Repair Can Handle., and . QRS, page 209-220. IEEE, (2022)2nd International Workshop on Advanced Software Development Tools and Techniques (WASDeTT): Tools for software maintenance, visualization, and reverse engineering., , , and . ICSM, page 408-409. IEEE Computer Society, (2008)The ASF+SDF Meta-environment: A Component-Based Language Development Environment., , , , , , , , , and 3 other author(s). CC, volume 2027 of Lecture Notes in Computer Science, page 365-370. Springer, (2001)