Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARIES: Refactoring support environment based on code clone analysis., , , and . IASTED Conf. on Software Engineering and Applications, page 222-229. IASTED/ACTA Press, (2004)MPAnalyzer: a tool for finding unintended inconsistencies in program source code., and . ASE, page 843-846. ACM, (2014)On Software Maintenance Process Improvement Based on Code Clone Analysis., , , , and . PROFES, volume 2559 of Lecture Notes in Computer Science, page 185-197. Springer, (2002)Revealing Purity and Side Effects on Functions for Reusing Java Libraries., , , and . ICSR, volume 8919 of Lecture Notes in Computer Science, page 314-329. Springer, (2015)An Empirical Study on the Impact of Duplicate Code., , , , and . Adv. Softw. Eng., (2012)ARIES: Refactoring Support Environment Based on Code Clone Analysis, , , and . Proc. IASTED Intl'l Conf. Software Engineering and Applications, page 222--229. (2002)Simultaneous Modification Support based on Code Clone Analysis., , , and . APSEC, page 262-269. IEEE Computer Society, (2007)How Compact Will My System Be? A Fully-Automated Way to Calculate LoC Reduced by Clone Refactoring., , , and . APSEC, page 284-291. IEEE, (2019)An empirical study of security warnings from static application security testing tools., , , , and . J. Syst. Softw., (2019)On tracking Java methods with Git mechanisms., , and . J. Syst. Softw., (2020)