Author of the publication

Labeled topic detection of open source software from mining mass textual project profiles.

, , , and . Software Mining, page 17-24. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DRO+: A Systemic and Economical Approach to Improve Availability of Massive Database Systems., , , , and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 122-132. Springer, (2006)A SLA-Based Resource Donation Mechanism for Service Hosting Utility Center., , , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 719-724. Springer, (2005)An Efficient Clustering Scheme in Mobile Peer-to-Peer Networks., , , , and . ICOIN, page 1-5. IEEE, (2008)Towards High Performance and High Availability Clusters of Archived Stream., , , and . APWeb/WAIM, volume 4505 of Lecture Notes in Computer Science, page 876-883. Springer, (2007)A Scalable Mechanism for Semantic Service Discovery in Multi-ontology Environment., , and . GPC, volume 4459 of Lecture Notes in Computer Science, page 136-145. Springer, (2007)Corporation Architecture for Multiple Cloud Service Providers in JointCloud Computing., , , , , , and . ICDCS Workshops, page 294-298. IEEE Computer Society, (2017)JCLedger: A Blockchain Based Distributed Ledger for JointCloud Computing., , , , and . ICDCS Workshops, page 289-293. IEEE Computer Society, (2017)Research on Control Flags-based Weighted Authentication Trustworthiness Model., , , and . PRDC, page 369-373. IEEE Computer Society, (2005)Data Sparseness in Linear SVM., , , and . IJCAI, page 3628-3634. AAAI Press, (2015)On Trustworthy Reputation Evidence Establishment: Rating Analysis and Defense against Dishonesty., , , and . AICT, page 309-314. IEEE Computer Society, (2008)