Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transition from centralized to decentralized version control systems: a case study on reasons, barriers, and outcomes., , , and . ICSE, page 334-344. ACM, (2014)Data analytics for game development., , , and . ICSE, page 940-943. ACM, (2011)What Drives People: Creating Engagement Profiles of Players from Game Log Data., , , , , , and . CHI PLAY, page 369-379. ACM, (2015)Myths in Software Engineering: From the Other Side.. TAP@TOOLS, volume 6143 of Lecture Notes in Computer Science, page 3-5. Springer, (2010)Neural Knowledge Extraction From Cloud Service Incidents., , , , , and . CoRR, (2020)A Tale of Two Cities: Software Developers Working from Home During the COVID-19 Pandemic., , , , , , , , and . CoRR, (2020)SoftNER: Mining knowledge graphs from cloud incidents., , , , and . Empir. Softw. Eng., 27 (4): 93 (2022)Automatic Static Bug Detection for Machine Learning Libraries: Are We There Yet?, , , , and . CoRR, (2023)Who Ate My Memory? Towards Attribution in Memory Management., , , and . CoRR, (2022)Automatic Static Vulnerability Detection for Machine Learning Libraries: Are We There Yet?, , , , and . ISSRE, page 795-806. IEEE, (2023)