Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An exploratory study of the evolution of communicated information about the execution of large software systems., , , , , , and . J. Softw. Evol. Process., 26 (1): 3-26 (2014)A Survey on Automated Software Vulnerability Detection Using Machine Learning and Deep Learning., , , , , and . CoRR, (2023)Has Your FaaS Application Been Decommissioned Yet? - A Case Study on the Idle Timeout in Function as a Service Infrastructure., , , and . CoRR, (2022)Assessing the Maturity of Model Maintenance Techniques for AIOps Solutions., , , and . CoRR, (2023)Towards a Change Taxonomy for Machine Learning Systems., , , , , and . CoRR, (2022)2nd International Workshop on Load Testing of Large Software Systems (LT 2013)., , , and . CASCON, page 353-354. IBM / ACM, (2013)Visualizing Clone Cohesion and Coupling., , and . APSEC, page 467-476. IEEE Computer Society, (2006)A Framework for Studying Clones In Large Software Systems., and . SCAM, page 203-212. IEEE Computer Society, (2007)Automated performance analysis of load tests., , , and . ICSM, page 125-134. IEEE Computer Society, (2009)Understanding Log Lines Using Development Knowledge., , , and . ICSME, page 21-30. IEEE Computer Society, (2014)