Author of the publication

Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database.

, , , and . ICDE, page 1024-1035. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Contract Security: A Practitioners' Perspective: The Artifact of a Paper Accepted in the 43rd IEEE/ACM International Conference on Software Engineering (ICSE 2021)., , , , , and . ICSE (Companion Volume), page 227-228. IEEE, (2021)How practitioners perceive coding proficiency., , , and . ICSE, page 924-935. IEEE / ACM, (2019)Comprehensive evaluation of association measures for fault localization., , , and . ICSM, page 1-10. IEEE Computer Society, (2010)Practitioners' Expectations on Automated Code Comment Generation., , , , , and . ICSE, page 1693-1705. ACM, (2022)Customer satisfaction feedback in an IT outsourcing company: a case study on the insigma Hengtian company., , , and . EASE, page 34:1-34:5. ACM, (2015)FFL: Fine-grained Fault Localization for Student Programs via Syntactic and Semantic Reasoning., , , , , , and . ICSME, page 151-162. IEEE, (2022)NICHE: A Curated Dataset of Engineered Machine Learning Projects in Python., , , , , , , , , and 1 other author(s). MSR, page 62-66. IEEE, (2023)CoLeFunDa: Explainable Silent Vulnerability Fix Identification., , , , , , and . ICSE, page 2565-2577. IEEE, (2023)Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension., , , , , and . ICSE, page 1933-1945. IEEE, (2023)Synergizing Specification Miners through Model Fissions and Fusions (T)., , , and . ASE, page 115-125. IEEE Computer Society, (2015)