Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clone detection by exploiting assembler., and . IWSC, page 77-78. ACM, (2010)Connecting architecture reconstruction frameworks., , and . Inf. Softw. Technol., 42 (2): 91-102 (2000)Visual formalisms for configuration management.. CASCON, page 120-127. IBM, (1993)Toward a taxonomy of clones in source code: A case study, and . Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), page 67--78. (2003)Proc. Int'l Workshop on Evolution of Large Scale Industrial Software Architectures (ELISA), , , and . vub-prog-tr-03-20. Programming Technology Lab, Vrije Universiteit Brussel, (2003)Facilitating software evolution research with kenyon., , , and . ESEC/SIGSOFT FSE, page 177-186. ACM, (2005)DocTer: documentation-guided fuzzing for testing deep learning API functions., , , , , , and . ISSTA, page 176-188. ACM, (2022)A Study of Cloning in the Linux SCSI Drivers., and . SCAM, page 95-104. IEEE Computer Society, (2011)An Exploratory Study of the Evolution of Communicated Information about the Execution of Large Software Systems., , , , , , and . WCRE, page 335-344. IEEE Computer Society, (2011)Storm prediction in a cloud., , , , , and . PESOS@ICSE, page 37-40. IEEE Computer Society, (2013)